SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. (1.) Financial (2.) Customer (3.) Internal processes (4.) Innovation / Learning
Audit Methodologies
The 4-item focus of a Balanced Scorecard
OSI: Transport Layer
Resource details
2. (1.) Feasibility (2.) Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation
Sampling Risk
Compliance Testing
OSI Layer 5: Session
The 7 phases and their order in the SDLC
3. A programmer is updating an application that saves passwords in plaintext. In this case - Passwords should be stored in a _____. This makes it impossible for any person to retrieve a password - which could lead to account compromise.
Notify the Audit Committee
Hash
Current and most up-to-date
Employee termination process
4. (1.) Monitoring (2.) Control Environment (3.) Risk Assessment and Control (4.) Information and Communication
A Server Cluster
Three Types of Controls
Elements of the COSO pyramid
Disaster Recovery
5. The annual expected loss to an asset. It is calculated as the single loss expectancy (SLE) X the annualized rate of occurrence (ARO.)
Annualized Loss Expectance (ALE)
The two Categories of Controls
The 7 phases and their order in the SDLC
Geographic location
6. A representation of how closely a sample represents an entire population.
Blade Computer Architecture
Balanced Scorecard
Formal waterfall
Precision means
7. A collection of two or more servers that is designed to appear as a single server.
Release management
Separate administrative accounts
Emergency Changes
Server cluster
8. The highest number of errors that can exist without a result being materially misstated.
Capability Maturity Model Integration (CMMI)
IT Services Financial Management
Tolerable Error Rate
(1.) Man-made (2.) Natural
9. An organization has discovered that some of its employees have criminal records. The best course of action for the organization to take - The organization should have ___________________ on all of its existing employees and also begin instituting bac
Employee termination process
Formal waterfall
To identify the tasks that are responsible for project delays
Background checks performed
10. A sampling technique where items are chosen at random; each item has a statistically equal probability of being chosen.
The Steering Committee
Statement of Impact
(1.) Polices (2.) Procedures (3.) Standards
Statistical Sampling
11. (1.) Executive Summary (2.) Framework (3.) Reporting to External Parties (4.) Evaluation Tools
Split custody
Expected Error Rate
Volumes of COSO framework
Power system controls
12. A CMM helps an organization to _______________ - which is an important first step to any large-scale process improvement effort.
Rating Scale for Process Maturity
Employee termination process
Types of sampling an auditor can perform.
Assess the maturity of its business processes
13. The IS auditor should act as a SME in the control self-assessment - but should not play a major role in the process.
Concentrate on samples known to represent high risk
Business Continuity
Split custody
The appropriate role of an IS auditor in a control self-assessment
14. The result of strategic planning - process development - and systems development - which all contribute towards a launch of business operations to reach a set of business objectives.
OSI: Physical Layer
Capability Maturity Model Integration (CMMI)
The Release process
Business Realization
15. An audit of an accounting system - accounting department processes - and procedures to determine if business controls are sufficient to ensure the integrity of financial statements.
Tolerable Error Rate
IT executives and the Board of Directors
A Financial Audit
Referential Integrity
16. 1.) Executive Support (2.) Well-defined roles and responsibilities.
Tolerable Error Rate
Types of sampling an auditor can perform.
Testing activities
Information security policy
17. An IS auditor has discovered a high-risk exception during control testing. The best course of action for the IS auditor to take - The IS auditor should immediately ________________ when any high-risk situation is discovered.
OSI Layer 5: Session
Inform the auditee
Employee termination process
Detection Risk
18. An auditor is examining a key management process and has found that the IT department is not following its split-custody procedure. As a result - Someone may be in possession of the _________________.
Volumes of COSO framework
Department Charters
Discovery Sampling
Entire password for an encryption key
19. Defines internal controls and provides guidance for assessing and improving internal control systems.
Judgmental sampling
Input validation checking
Statement of Impact
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
20. The risk that a material error exists that will not be prevented or detected by the organization's control framework - The possibility that a process or procedure will be unable to prevent or deter serious errors and wrongdoing.
Antivirus software on the email servers
The two Categories of Controls
Buffers
Control Risk
21. (1.) Developers (2.) Architects (3.) Analysts (4.) Users
Personnel involved in the requirements phase of a software development project
Current and most up-to-date
Risk Management
Referential Integrity
22. The memory locations in the CPU where arithmetic values are stored.
A Forensic Audit
Registers
Sampling
The 5 types of Evidence that the auditor will collect during an audit.
23. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - as the numeric inverse of the confidence coefficient.
Concentrate on samples known to represent high risk
Stay current with technology
The Release process
Sampling Risk
24. A four-step quality control process known as PDSA - or PDCA. Steps: (1.) Plan (2.) Do (3.) Study (4.) Act
A Financial Audit
Examples of IT General Controls
Inform the auditee
Deming Cycle
25. Concerned with electrical and physical specifications for devices. No frames or packets involved.
Sample Standard Deviation
Incident Management
OSI: Physical Layer
Business impact analysis
26. Gantt: used to display ______________.
Resource details
Annualized Loss Expectance (ALE)
Sampling Risk
Project change request
27. An active - instance of a server operating system running on a machine that is designed to house two or more such virtual servers.
A Virtual Server
Substantive Testing (test of transaction integrity)
Disaster Recovery
TCP/IP Transport Layer packet delivery
28. Used to control connections that are established between systems (1.) TCP (2.) IPC (3.) SIP (Session Initiation Protocol) (4.) RPC (Remote Procedure Call) (5.) NetBIOS
The audit program
OSI Layer 5: Session
Department Charters
OSI: Transport Layer
29. A technique that is used to identify the most critical path in a project to understand which tasks are most likely to affect the project schedule.
Critical Path Methodology
The availability of IT systems
Elements of the COSO pyramid
Network Layer Protocols
30. Describes the effect on the business if a process is incapacitated for any appreciable time
Compliance Testing
The Release process
Statement of Impact
Formal waterfall
31. Used to illustrate the relationship between planned activities. PERT diagrams show multiple routes through the project activities - as necessary for accomplishing a goal.
PERT Diagram?
Separate administrative accounts
Inform the auditee
Concentrate on samples known to represent high risk
32. The portion of IT management that tracks the financial value of IT services that support organizational objectives. It includes 4 activities: (1.) Budgeting (2.) Capital Investment (3.) Expense Management (4.) Project accounting and project ROI (Ret
IT Services Financial Management
OSI Layer 7: Application
Sampling Risk
OSI: Network Layer
33. Guide program execution through organization of resources and development of clear project objectives.
Recovery time objective
Project Management Strategies
Sampling Risk
Documentation and interview personnel
34. An IS auditor is examining the IT standards document for an organization that was last reviewed two years earlier. The best course of action for the IS auditor is: Report that the ____________________________. Two years is far too long between revie
IT standards are not being reviewed often enough
Data Link Layer Standards
Configuration Management
OSI: Network Layer
35. (1.) Develop a BC Policy (2.) Conduct BIA (3.) Perform critical analysis (4.) Establish recovery targets (5.) Develop recovery and continuity strategies and plans (6.) Test recovery and continuity plans and procedures Train personnel Maintain strateg
The Release process
Business Realization
The BCP process
TCP/IP Transport Layer packet delivery
36. Used for several types of system changes: (1.) Incidents and problem resolution (bug fixes.) (2.) Enhancements (new functionality.) (3.) Subsystem patches and changes (require testing similar to when changes are made to the application itself.)
Judgmental sampling
The Release process
An Administrative
Three Types of Controls
37. A condition that is the result of multiple incidents that exhibit common symptoms e.g. A web application is displaying information incorrectly and many users have contacted the IT service desk.
OSI: Transport Layer
Server cluster
A Problem
Primary security features of relational databases
38. A database administrator has been asked to configure a database management system so that it records all changes made by users - The DBA should implement ___________. This will cause the database to record every change that is made to it.
Audit logging
Application Layer protocols
Personnel involved in the requirements phase of a software development project
Capability Maturity Model
39. PERT: shows the ______________ critical path.
Gantt Chart
Current and most up-to-date
Transport Layer Protocols
Department Charters
40. A sampling technique used to study the characteristics of a population to determine how many samples possess a specific characteristic.
Segregation of duties issue in a high value process
Attribute Sampling
Reduced sign-on
The BCP process
41. Used to determine which business processes are the most critical - by ranking them in order of criticality
Elements of the COSO pyramid
TCP/IP Transport Layer
Criticality analysis
An Administrative
42. An organization that has experienced a sudden increase in its long-distance charges has asked an auditor to investigate. The auditor is most likely to suspect that intruders have discovered a ______________________and is committing toll fraud.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
43. A sampling technique used to study the characteristics of a population to determine the numeric total of a specific attribute from the entire population.
Sampling Risk
OSI: Network Layer
Variable Sampling
Volumes of COSO framework
44. (1.) MPLS (2.) SONET (3.) T-Carrier (4.) Frame Relay (5.) ISDN (6.) X.25
General Controls
WAN Protocols
Risk Management
Testing activities
45. Information is arranged in frames and transported across the medium. Collision detection. Checksum verification of delivery.
Frameworks
OSI: Data Link Layer
Information security policy
Detection Risk
46. (1.) TCP (2.) UDP
Transport Layer Protocols
Personnel involved in the requirements phase of a software development project
Resource details
Data Link Layer Standards
47. n audit strategy and plans that include: (1.) Scope (2.) Objectives (3.) Resources (4.) Procedures used to evaluation controls and processes
The audit program
TCP/IP Link Layer
The Business Process Life Cycle
Split custody
48. Should include 4 steps: (1.) Emergency Approval (2.) Implementation (3.) Verification (4.) Review
Emergency Changes
OSI Layer 7: Application
The audit program
Critical Path Methodology
49. The means by which management establishes and measures processes by which organizational objectives are achieved
SDLC Phases
Judgmental sampling
Controls
OSI: Network Layer
50. Use of a set of monitoring and review activities that confirm whether IS operations is providing service to its customers.
Grid Computing
Examples of Application Controls
Service Level Management
Compliance Testing