SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Used to schedule and sequence activities in a waterfall-type representation. Planned activities are shown flowing downward to completion. More simplistic than a PERT Diagram.
Personnel involved in the requirements phase of a software development project
IT Service Management
ITIL definition of PROBLEM
Gantt Chart
2. (1.) Reliable delivery (2.) Connection oriented (persistent connection) (3.) Order of Delivery (4.) Flow Control (transfer rate is throttled) (5.) Port Number
The typical Configuration Items in Configuration Management
TCP/IP Transport Layer packet delivery
Server cluster
Precision means
3. Individual events may often create combined threats to enterprise operations: A tornado might also spawn ____________________.
Examples of Application Controls
Primary security features of relational databases
Grid Computing
Structural fires and transportation accidents
4. An auditor has discovered several errors in user account management: many terminated employees' computer accounts are still active. The best course of action - To improve the _________________ to reduce the number of exceptions. For a time - the proc
The 4-item focus of a Balanced Scorecard
Main types of Controls
Employee termination process
Personnel involved in the requirements phase of a software development project
5. An IS auditor is examining the IT standards document for an organization that was last reviewed two years earlier. The best course of action for the IS auditor is: Report that the ____________________________. Two years is far too long between revie
Capability Maturity Model
ISO 20000 Standard:
IT standards are not being reviewed often enough
The appropriate role of an IS auditor in a control self-assessment
6. Used to translate or transform data from lower layers into formats that the application layer can work with.
OSI Layer 6: Presentation
Concentrate on samples known to represent high risk
Options for Risk Treatment
The Steering Committee
7. (1.) Feasibility Study (2.) Definition of Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation phase
The Release process
SDLC Phases
Current and most up-to-date
Stop-or-go Sampling
8. A database term - which means that the database will not permit a program (or user) to deleted rows from a table if there are records in other tables whose foreign keys reference the row to be deleted.
An IS audit
Stay current with technology
Referential Integrity
Data Link Layer Standards
9. Used for several types of system changes: (1.) Incidents and problem resolution (bug fixes.) (2.) Enhancements (new functionality.) (3.) Subsystem patches and changes (require testing similar to when changes are made to the application itself.)
Vulnerability in the organization's PBX
The Release process
WAN Protocols
Options for Risk Treatment
10. The purpose of an auditor doing interviews - To observe personnel to better understand their discipline - as well as ______________.
Information systems access
Deming Cycle
Rating Scale for Process Maturity
Organizational culture and maturity
11. An organization has discovered that some of its employees have criminal records. The best course of action for the organization to take - The organization should have ___________________ on all of its existing employees and also begin instituting bac
Background checks performed
Inform the auditee
Security Awareness program
Project change request
12. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - as the numeric inverse of the confidence coefficient.
Department Charters
Sampling Risk
The BCP process
Audit logging
13. The process of recording the configuration of IT systems. Each configuration setting is known in ITSM parlance as a Configuration Item.
Lacks specific expertise or resources to conduct an internal audit
Configuration Management
An Administrative
SDLC Phases
14. (1.) Financial (2.) Customer (3.) Internal processes (4.) Innovation / Learning
An Operational Audit
The 4-item focus of a Balanced Scorecard
The 5 types of Evidence that the auditor will collect during an audit.
CPU
15. Consists of two main packet transport protocols: TCP and UDP.
Discovery Sampling
TCP/IP Transport Layer
Split custody
The first step in a business impact analysis
16. Delivery of packets from one station to another - on the same network or on different networks.
A Financial Audit
The Internet Layer in the TCP/IP model
A Cold Site
IT standards are not being reviewed often enough
17. An audit of an accounting system - accounting department processes - and procedures to determine if business controls are sufficient to ensure the integrity of financial statements.
The Steering Committee
A Financial Audit
Statement of Impact
OSI Layer 6: Presentation
18. A sampling technique used to study the characteristics of a population to determine the numeric total of a specific attribute from the entire population.
Business impact analysis
Overall audit risk
objective and unbiased
Variable Sampling
19. Consists of 11 distinct activities: (1.) Service Desk (2.) Incident Management (3.) Problem Management (4.) Change Management (5.) Configuration Management (6.) Release Management (7.) Service-level Management (8.) Financial Management (9.) Capacity
Referential Integrity
IT Service Management
Service Level Management
The Software Program Library
20. An IS auditor is auditing the change management process for a financial application. The auditor has two primary pieces of evidence: change logs and a written analysis of the change logs performed by a business analyst. The change log is best because
objective and unbiased
Release management
The Software Program Library
OSI: Transport Layer
21. Handle application processing
Project change request
OSI: Data Link Layer
TCP/IP Transport Layer
Application Controls
22. (1.) Operational (2.) Financial (3.) Integrated (4.) IS (5.) Administrative (6.) Compliance (7.) Forensic (8.) Service Provider
Balanced Scorecard
The Eight Types of Audits
Frameworks
TCP/IP Transport Layer
23. (1.) Objectives (2.) Components (3.) Business Units / Areas
A Sample Mean
Business Realization
Dimensions of the COSO cube
The Internet Layer in the TCP/IP model
24. Used to estimate the effort required to develop a software program.
Function Point Analysis
Database primary key
Documentation and interview personnel
A Financial Audit
25. What type of testing is performed to determine if control procedures have proper design and are operating properly?
Compliance Testing
Geographic location
Hash
The Requirements
26. (1.) Observations (2.) Written Notes (3.) Correspondence (4.) Process and Procedure documentation (5.) Business records
The 5 types of Evidence that the auditor will collect during an audit.
Stratified Sampling
Assess the maturity of its business processes
IT Service Management
27. (1.) Monitoring (2.) Control Environment (3.) Risk Assessment and Control (4.) Information and Communication
The Release process
Personnel involved in the requirements phase of a software development project
Elements of the COSO pyramid
Critical Path Methodology
28. IT Governance is most concerned with ________.
The Requirements
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Lacks specific expertise or resources to conduct an internal audit
IT Strategy
29. Used to determine which business processes are the most critical - by ranking them in order of criticality
Criticality analysis
Statement of Impact
ITIL definition of PROBLEM
List of systems examined
30. (1.) Avoidance (2.) Transfer (3.) Mitigation (4.) Acceptance
ITIL definition of PROBLEM
Main types of Controls
Registers
Categories of risk treatment
31. (1.) Executive Summary (2.) Governance and control framework (3.) Control Objectives (4.) Management Guidelines (5.) Implementation Guide (6.) IT Assurance Guide
Gantt Chart
Employee termination process
Elements of the COBIT Framework
Criticality analysis
32. Change Management includes a _____________ of six steps: (1.) Proposal or Request (2.) Review (3.) Approval (4.) Implementation (5.) Verification (6.) Post-change Review
Substantive Testing (test of transaction integrity)
The first step in a business impact analysis
TCP/IP Transport Layer
Formal waterfall
33. (1.) Executive Summary (2.) Framework (3.) Reporting to External Parties (4.) Evaluation Tools
Volumes of COSO framework
Six steps of the Release Management process
A Virtual Server
Stop-or-go Sampling
34. Focuses on: post-event recovery and restoration of services
Dimensions of the COSO cube
Disaster Recovery
OSI Layer 5: Session
Confidence coefficient
35. A condition that is the result of multiple incidents that exhibit common symptoms e.g. A web application is displaying information incorrectly and many users have contacted the IT service desk.
A Forensic Audit
A Problem
Variable Sampling
Data Link Layer Standards
36. Gantt: used to display ______________.
Information systems access
Resource details
objective and unbiased
Change management
37. The means by which management establishes and measures processes by which organizational objectives are achieved
Controls
The 4-item focus of a Balanced Scorecard
Assess the maturity of its business processes
Precision means
38. An auditor is examining a key management process and has found that the IT department is not following its split-custody procedure. As a result - Someone may be in possession of the _________________.
Entire password for an encryption key
Disaster Recovery
SDLC Phases
Controls
39. To ensure that input values are within established ranges - of the correct character types - and free of harmful contents.
IT Strategy
An Operational Audit
Input validation checking
SDLC Phases
40. To review and approve proposed changes to systems and infrastructure. This helps to reduce the risk of unintended events and unplanned downtime.
Wet pipe fire sprinkler system
Change management
Hash
Confidence coefficient
41. What type of testing is performed to verify the accuracy and integrity of transactions as they flow through a system?
Insourcing
Business Realization
Main types of Controls
Substantive Testing
42. (1.) Access Control (2.) Change Management (3.) Security Controls (4.) Incident Management (5.) SDLC (6.) Source code and versioning controls (7.) Monitoring and logging (8.) Event Management
Gantt Chart
Control Risk
Elements of the COBIT Framework
Examples of IT General Controls
43. (1.) General (2.) Application
objective and unbiased
Balanced Scorecard
Main types of Controls
OSI: Transport Layer
44. Defines internal controls and provides guidance for assessing and improving internal control systems.
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
WAN Protocols
List of systems examined
Structural fires and transportation accidents
45. To measure organizational performance and effectiveness against strategic goals.
An IS audit
A Sample Mean
Categories of risk treatment
Balanced Scorecard
46. A programmer is updating an application that saves passwords in plaintext. In this case - Passwords should be stored in a _____. This makes it impossible for any person to retrieve a password - which could lead to account compromise.
Employee termination process
OSI Layer 7: Application
Hash
Risk Management
47. Critical Path Methodology helps a project manager determine which activities are on a project's critical list - ________________________.
TCP/IP Internet Layer
Examples of Application Controls
To identify the tasks that are responsible for project delays
The Requirements
48. A tightly coupled collection of computers that are used to solve a common task. One or more actively perform tasks - while zero or more may be in a standby state.
A Server Cluster
Examples of IT General Controls
A Compliance audit
An Integrated Audit
49. Outsourcing is an opportunity for the organization to focus on core competencies. When an organization oursources a business function - it no longer needs to be concerned about training employees in that function. Outsources does not always reduce co
Advantages of outsourcing
Stratified Sampling
Deming Cycle
Organizational culture and maturity
50. An audit of IS controls - security controls - or business controls to determine control existence and effectiveness.
Sample Standard Deviation
Judgmental sampling
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
An Operational Audit