SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What activity involves the identification of potential risk and the appropriate response for each threat based on impact assessment using qualitative and/or quantitative measures for an enterprise-wide risk management strategy?
Risk Management
A Problem
A Server Cluster
A Service Provider audit
2. (1.) IP (2.) ICMP (3.) RRC (Radio Resource Control) (4.) AppleTalk
(1.) Man-made (2.) Natural
List of systems examined
Control Risk
Network Layer Protocols
3. Contains programs that communicate directly with the end user.
Business Continuity
OSI Layer 7: Application
OSI: Data Link Layer
Capability Maturity Model Integration (CMMI)
4. Concerns the reliability of data transfer between systems. (1.) Connection Oriented (2.) Guaranteed Delivery (3.) Order of Delivery
OSI: Transport Layer
TCP/IP Transport Layer packet delivery
The Software Program Library
An Integrated Audit
5. The probability that a sample selected actually represents the entire population. This is usually expressed as a percentage.
Categories of risk treatment
Confidence coefficient
IT Service Management
SDLC Phases
6. A condition often identified as a result of multiple incidents that exhibit common symptoms. Problems can also be identified from a single significant incident for which the impact is significant.
Options for Risk Treatment
More difficult to perform
ITIL definition of PROBLEM
Reduced sign-on
7. An audit that combines an operational audit and a financial audit.
ITIL definition of CHANGE MANAGEMENT
SDLC Phases
Dimensions of the COSO cube
An Integrated Audit
8. An auditor is examining a key management process and has found that the IT department is not following its split-custody procedure. As a result - Someone may be in possession of the _________________.
TCP/IP Network Model
Critical Path Methodology
Entire password for an encryption key
Sampling
9. (1.) Access controls (2.) Encryption (3.) Audit logging
Criticality analysis
Foreign Key
The availability of IT systems
Primary security features of relational databases
10. An audit report usually includes the following 10 elements: (1.) Cover letter (2.) Introduction (3.) Summary (4.) Audit description (5.) _______________ (6.) Interviewees (7.) Evidence (8.) Explanation of sampling techniques (9.) Findings (10.) Recom
Incident Management
List of systems examined
Resource details
Stratified Sampling
11. The 5 types of risks that are related to audits include: (1.) Control Risk (2.) Detection Risk (3.) Inherent risk (4.) _____________ (5.) Sampling risk
Overall audit risk
SDLC Phases
The two Categories of Controls
Examples of Application Controls
12. (1.) Monitoring (2.) Control Environment (3.) Risk Assessment and Control (4.) Information and Communication
OSI: Data Link Layer
Disaster Recovery
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Elements of the COSO pyramid
13. External auditors are needed under these conditions: (1.) When the organization ________________________. (2.) Some regulations and standards require external - independent auditors
Variable Sampling
CPU
The Internet Layer in the TCP/IP model
Lacks specific expertise or resources to conduct an internal audit
14. An estimate that expresses the percent of errors or exceptions that may exist in an entire population
The 4-item focus of a Balanced Scorecard
Stop-or-go Sampling
Organizational culture and maturity
Expected Error Rate
15. A sampling technique where a population is divided into classes or strata - based upon the value of one of the attributes. Samples are then selected from each class.
Employees with excessive privileges
Audit Methodologies
A Sample Mean
Stratified Sampling
16. Change Management includes a _____________ of six steps: (1.) Proposal or Request (2.) Review (3.) Approval (4.) Implementation (5.) Verification (6.) Post-change Review
Network Layer Protocols
Types of sampling an auditor can perform.
Formal waterfall
Project change request
17. A sampling technique where items are chosen at random; each item has a statistically equal probability of being chosen.
Current and most up-to-date
Frameworks
Input validation checking
Statistical Sampling
18. (1.) Feasibility Study (2.) Definition of Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation phase
Server cluster
Three Types of Controls
A Problem
SDLC Phases
19. Must be tested to validate effectiveness through: (1.) Document Review (2.) Walkthrough (3.) Simulation (4.) Parallel testing (5.) Cutover testing practices
List of systems examined
BCP Plans
A Financial Audit
TCP/IP Transport Layer packet delivery
20. Information is arranged in frames and transported across the medium. Collision detection. Checksum verification of delivery.
Project Management Strategies
OSI: Data Link Layer
TCP/IP Internet Layer
IT executives and the Board of Directors
21. The maximum period of downtime for a process or application
Entire password for an encryption key
Referential Integrity
Recovery time objective
A Virtual Server
22. One of a database table's fields - whose value is unique.
Emergency Changes
Sampling Risk
Referential Integrity
Database primary key
23. (1.) TCP (2.) UDP
Input validation checking
A gate process
Project change request
Transport Layer Protocols
24. An audit of an accounting system - accounting department processes - and procedures to determine if business controls are sufficient to ensure the integrity of financial statements.
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
The audit program
A Financial Audit
Insourcing
25. The main hardware component of a computer system - which executes instructions in computer programs.
Tolerable Error Rate
Risk Management
Background checks performed
CPU
26. In Release Management - _________________ means that each step of the release process undergoes formal review and approval before the next step is allowed to begin.
OSI Layer 7: Application
A gate process
IT executives and the Board of Directors
A Sample Mean
27. Used to measure the relative maturity of an organization and its processes.
Examples of IT General Controls
Capability Maturity Model
A Sample Mean
SDLC Phases
28. A sampling technique where at least one exception is sought in a population
Discovery Sampling
IT standards are not being reviewed often enough
An IS audit
Attribute Sampling
29. The CPU has: (1.) Arithmetic Logic Unit (2.) ______________ (3.) a small amount of memory (usually in to form of registers)
The 4-item focus of a Balanced Scorecard
Gantt Chart
Control Unit
Input validation checking
30. What type of testing is performed to verify the accuracy and integrity of transactions as they flow through a system?
Controls
Substantive Testing
TCP/IP Internet Layer
IT Services Financial Management
31. (1.) Utility (DNS - SNMP - DHCP (2.) Messaging protocols (SMTP) (3.) Data Transfer protocols (NFS - FTP) (4.) Interactive protocols (Telnet)
Concentrate on samples known to represent high risk
Inherent Risk
Application Layer protocols
Segregation of duties issue in a high value process
32. An organization has discovered that some of its employees have criminal records. The best course of action for the organization to take - The organization should have ___________________ on all of its existing employees and also begin instituting bac
Prblem Management
Background checks performed
Configuration Management
Information security policy
33. The risk that a material error exists that will not be prevented or detected by the organization's control framework - The possibility that a process or procedure will be unable to prevent or deter serious errors and wrongdoing.
Control Risk
Annualized Loss Expectance (ALE)
Volumes of COSO framework
OSI Layer 7: Application
34. ITIL term used to describe the SDLC.
Release management
Audit Methodologies
ITIL - IT Infrastructure Library
The Business Process Life Cycle
35. To communication security policies - procedures - and other security-related information to an organization's employees.
Service Continuity Management
Segregation of duties issue in a high value process
Security Awareness program
Assess the maturity of its business processes
36. Define 10 elements of an Audit - (1.) Subject of audit (2.) Audit Objective (3.) Type of audit (4.) Audit scope (5.) Pre-audit planning (6.) Audit procedures (7.) Communication plan (8.) Report Preparation (9.) Wrap-up (10.) Post-audit follow-up
Primary security features of relational databases
Audit Methodologies
Three Types of Controls
Main types of Controls
37. 0. No process at all (1.) Process are ad hoc and disorganized (2.) Consistent processes (3.) Documented processes (4.) Measured and managed processes (5.) Processes are continuously improved
Foreign Key
Incident Management
A Compliance audit
Rating Scale for Process Maturity
38. The purpose of an auditor doing interviews - To observe personnel to better understand their discipline - as well as ______________.
TCP/IP Network Model
OSI Layer 7: Application
Organizational culture and maturity
A Problem
39. During the development phase - Developers should only be performing Unit Testing - to verify that the individual sections of code they have written are performing properly.
Personnel involved in the requirements phase of a software development project
OSI: Data Link Layer
Project Management Strategies
Testing activities
40. Lowest layer. Delivers messages (frames) from one station to another vial local network.
TCP/IP Link Layer
The Software Program Library
Balanced Scorecard
Resource details
41. A sampling technique used to permit sampling to stop at the earliest possible time. This technique is used when the auditor feels that there is a low risk or low rate of exceptions in the population.
IT Services Financial Management
IT executives and the Board of Directors
Stop-or-go Sampling
Grid Computing
42. A sampling technique used to study the characteristics of a population to determine how many samples possess a specific characteristic.
The BCP process
Lacks specific expertise or resources to conduct an internal audit
Risk Management
Attribute Sampling
43. A representation of how closely a sample represents an entire population.
The Steering Committee
IT standards are not being reviewed often enough
Attribute Sampling
Precision means
44. The result of strategic planning - process development - and systems development - which all contribute towards a launch of business operations to reach a set of business objectives.
The Software Program Library
Tolerable Error Rate
Sampling
Business Realization
45. An organization wants to reduce the number of user IDs and passwords that its employees need to remember. The best available solution to this - _______________. This provides a single authentication service (such as LDAP or AD) that many applications
The appropriate role of an IS auditor in a control self-assessment
Reduced sign-on
objective and unbiased
Dimensions of the COSO cube
46. A programmer is updating an application that saves passwords in plaintext. In this case - Passwords should be stored in a _____. This makes it impossible for any person to retrieve a password - which could lead to account compromise.
Cloud computing
Sample Standard Deviation
Tolerable Error Rate
Hash
47. A maturity model that represents the aggregations of other maturity models.
Statistical Sampling
An IS audit
Recovery time objective
Capability Maturity Model Integration (CMMI)
48. (1.) Reliable delivery (2.) Connection oriented (persistent connection) (3.) Order of Delivery (4.) Flow Control (transfer rate is throttled) (5.) Port Number
TCP/IP Transport Layer packet delivery
Grid Computing
Primary security features of relational databases
Personnel involved in the requirements phase of a software development project
49. An IS auditor is auditing the change management process for a financial application. The auditor has two primary pieces of evidence: change logs and a written analysis of the change logs performed by a business analyst. The change log is best because
objective and unbiased
Insourcing
Cloud computing
Sample Standard Deviation
50. Focuses on: maintaining service availability with the least disruption to standard operating parameters during an event
Criticality analysis
IT executives and the Board of Directors
Business Continuity
Deming Cycle