SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An organization wants to reduce the number of user IDs and passwords that its employees need to remember. The best available solution to this - _______________. This provides a single authentication service (such as LDAP or AD) that many applications
Information security policy
Options for Risk Treatment
Reduced sign-on
Disaster Recovery
2. (1.) Access controls (2.) Encryption (3.) Audit logging
Primary security features of relational databases
Variable Sampling
Types of sampling an auditor can perform.
Lacks specific expertise or resources to conduct an internal audit
3. Used to schedule and sequence activities in a waterfall-type representation. Planned activities are shown flowing downward to completion. More simplistic than a PERT Diagram.
Gantt Chart
Control Unit
OSI: Network Layer
Sampling
4. An alternate processing center that contains no information processing equipment.
Current and most up-to-date
A Cold Site
Rating Scale for Process Maturity
The 4-item focus of a Balanced Scorecard
5. IS auditors can _____________________ through the following means: (1.) training courses (2.) webinars (3.) ISACA chapter training events (4.) Industry conferences
Registers
TCP/IP Network Model
Stay current with technology
Expected Error Rate
6. Define 10 elements of an Audit - (1.) Subject of audit (2.) Audit Objective (3.) Type of audit (4.) Audit scope (5.) Pre-audit planning (6.) Audit procedures (7.) Communication plan (8.) Report Preparation (9.) Wrap-up (10.) Post-audit follow-up
A gate process
A Service Provider audit
Audit Methodologies
Split custody
7. Must be tested to validate effectiveness through: (1.) Document Review (2.) Walkthrough (3.) Simulation (4.) Parallel testing (5.) Cutover testing practices
Input validation checking
Separate administrative accounts
BCP Plans
ISO 20000 Standard:
8. 0. No process at all (1.) Process are ad hoc and disorganized (2.) Consistent processes (3.) Documented processes (4.) Measured and managed processes (5.) Processes are continuously improved
Personnel involved in the requirements phase of a software development project
Rating Scale for Process Maturity
An IS audit
Cloud computing
9. To ensure that input values are within established ranges - of the correct character types - and free of harmful contents.
Expected Error Rate
The Internet Layer in the TCP/IP model
Input validation checking
OSI Layer 7: Application
10. Change Management includes a _____________ of six steps: (1.) Proposal or Request (2.) Review (3.) Approval (4.) Implementation (5.) Verification (6.) Post-change Review
Business Continuity
IT standards are not being reviewed often enough
The availability of IT systems
Formal waterfall
11. (1.) Reliable delivery (2.) Connection oriented (persistent connection) (3.) Order of Delivery (4.) Flow Control (transfer rate is throttled) (5.) Port Number
IT standards are not being reviewed often enough
OSI: Physical Layer
Function Point Analysis
TCP/IP Transport Layer packet delivery
12. An IS auditor is auditing the change management process for a financial application. The auditor has two primary pieces of evidence: change logs and a written analysis of the change logs performed by a business analyst. The change log is best because
Sample Standard Deviation
Primary security features of relational databases
ITIL - IT Infrastructure Library
objective and unbiased
13. (1.) Observations (2.) Written Notes (3.) Correspondence (4.) Process and Procedure documentation (5.) Business records
Substantive Testing
An IS audit
The 5 types of Evidence that the auditor will collect during an audit.
TCP/IP Transport Layer
14. Defines internal controls and provides guidance for assessing and improving internal control systems.
Business impact analysis
The two Categories of Controls
The Release process
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
15. (1.) General (2.) Application
Geographic location
Recovery time objective
Main types of Controls
Confidence coefficient
16. Gantt: used to display ______________.
Reduced sign-on
TCP/IP Network Model
Resource details
Types of sampling an auditor can perform.
17. The main hardware component of a computer system - which executes instructions in computer programs.
SDLC Phases
CPU
Primary security features of relational databases
Six steps of the Release Management process
18. Individual events may often create combined threats to enterprise operations: A tornado might also spawn ____________________.
Structural fires and transportation accidents
CPU
OSI Layer 6: Presentation
A Forensic Audit
19. An estimate that expresses the percent of errors or exceptions that may exist in an entire population
Statement of Impact
Expected Error Rate
IT Services Financial Management
BCP Plans
20. Should include 4 steps: (1.) Emergency Approval (2.) Implementation (3.) Verification (4.) Review
Change management
Volumes of COSO framework
Emergency Changes
The 7 phases and their order in the SDLC
21. Aids in the coordinating of business processes using a sequence of three events -(1.) Business process creation (2.) Implementation (3.) Maintenance 3a. Benchmarking: Facilitates continuous improvement within the BPLC
Insourcing
Assess the maturity of its business processes
Sample Standard Deviation
The Business Process Life Cycle
22. (1.) Requirements (2.) Design (3.) Development (4.) Testing (5.) Release preparation (packaging) (6.) Release Deployment
The Requirements
(1.) Man-made (2.) Natural
More difficult to perform
Six steps of the Release Management process
23. A sampling technique where a population is divided into classes or strata - based upon the value of one of the attributes. Samples are then selected from each class.
Entire password for an encryption key
Stratified Sampling
The 4-item focus of a Balanced Scorecard
Transport Layer Protocols
24. Information is arranged in frames and transported across the medium. Collision detection. Checksum verification of delivery.
OSI: Data Link Layer
Release management
Information systems access
Project Management Strategies
25. An organization is building a data center in an area frequented by power outages. The organization cannot tolerate power outages. The best _________________solution is an electric generator and an uninterruptible power supply. The UPS responds to the
A Compliance audit
Prblem Management
Power system controls
Control Unit
26. Application controls limit ___________ in three ways: (1.) Point of Entry (Input Controls) (2.) During consumption (process controls) (3.) At the point of expression (Output Controls)
Sampling Risk
Information systems access
Expected Error Rate
Stop-or-go Sampling
27. (1.) Hardware Complement (physical specifications) (2.) Hardware Configuration (firmware settings) (3.) Operating system version and configuration (4.) Software versions and configuration
Vulnerability in the organization's PBX
The typical Configuration Items in Configuration Management
Power system controls
Geographic location
28. A database administrator has been asked to configure a database management system so that it records all changes made by users - The DBA should implement ___________. This will cause the database to record every change that is made to it.
Antivirus software on the email servers
Organizational culture and maturity
Audit logging
ITIL - IT Infrastructure Library
29. A collection of two or more servers that is designed to appear as a single server.
A Compliance audit
The audit program
Server cluster
Assess the maturity of its business processes
30. PERT: shows the ______________ critical path.
Statement of Impact
Current and most up-to-date
Insourcing
A Problem
31. A facility that is used to store and manage access to an organization's application source and object code. It consists of 5 parts: (1.) Access and authorization controls (2.) Program checkout (3.) Program Check-in (4.) Version Control (5.) Code Ana
The Software Program Library
The audit program
Tolerable Error Rate
Assess the maturity of its business processes
32. A four-step quality control process known as PDSA - or PDCA. Steps: (1.) Plan (2.) Do (3.) Study (4.) Act
Change management
Options for Risk Treatment
Deming Cycle
Dimensions of the COSO cube
33. IT Governance is most concerned with ________.
Six steps of the Release Management process
Volumes of COSO framework
Documentation and interview personnel
IT Strategy
34. What activity involves the identification of potential risk and the appropriate response for each threat based on impact assessment using qualitative and/or quantitative measures for an enterprise-wide risk management strategy?
CPU
List of systems examined
Risk Management
Statistical Sampling
35. Focuses on: post-event recovery and restoration of services
Split custody
Concentrate on samples known to represent high risk
Cloud computing
Disaster Recovery
36. What type of testing is performed to determine if control procedures have proper design and are operating properly?
Compliance Testing
Vulnerability in the organization's PBX
Department Charters
A Cold Site
37. Used to measure the relative maturity of an organization and its processes.
Rating Scale for Process Maturity
ITIL definition of CHANGE MANAGEMENT
Audit Methodologies
Capability Maturity Model
38. The risk that a material error exists that will not be prevented or detected by the organization's control framework - The possibility that a process or procedure will be unable to prevent or deter serious errors and wrongdoing.
OSI: Network Layer
Input validation checking
Compliance Testing
Control Risk
39. An audit of a third-party organization that provides services to other organizations.
Buffers
Change management
A Service Provider audit
Release management
40. Used for several types of system changes: (1.) Incidents and problem resolution (bug fixes.) (2.) Enhancements (new functionality.) (3.) Subsystem patches and changes (require testing similar to when changes are made to the application itself.)
The Release process
Referential Integrity
Capability Maturity Model
(1.) Polices (2.) Procedures (3.) Standards
41. Describes the effect on the business if a process is incapacitated for any appreciable time
Application Controls
A Server Cluster
The 5 types of Evidence that the auditor will collect during an audit.
Statement of Impact
42. Used to control connections that are established between systems (1.) TCP (2.) IPC (3.) SIP (Session Initiation Protocol) (4.) RPC (Remote Procedure Call) (5.) NetBIOS
WAN Protocols
Disaster Recovery
An Operational Audit
OSI Layer 5: Session
43. Used to estimate the effort required to develop a software program.
ITIL - IT Infrastructure Library
Buffers
Function Point Analysis
IT executives and the Board of Directors
44. The means by which management establishes and measures processes by which organizational objectives are achieved
Controls
Organizational culture and maturity
The 5 types of Evidence that the auditor will collect during an audit.
Formal waterfall
45. Concerns the reliability of data transfer between systems. (1.) Connection Oriented (2.) Guaranteed Delivery (3.) Order of Delivery
Stay current with technology
The BCP process
OSI: Transport Layer
List of systems examined
46. A sampling technique used to study the characteristics of a population to determine how many samples possess a specific characteristic.
less than 24 hours
A Service Provider audit
Function Point Analysis
Attribute Sampling
47. An IS auditor needs to perform an audit of a financial system and needs to trace individual transactions through the system. What type of testing should the auditor perform?
ITIL definition of CHANGE MANAGEMENT
List of systems examined
Volumes of COSO framework
Substantive Testing (test of transaction integrity)
48. The IS auditor should conduct a risk assessment first to determine which areas have highest risk. She should devote more testing resources to those high-risk areas.
A Problem
The best approach for identifying high risk areas for an audit
Function Point Analysis
Blade Computer Architecture
49. The risk that an IS auditor will overlook errors or exceptions during an audit.
Detection Risk
Vulnerability in the organization's PBX
Emergency Changes
Criticality analysis
50. The 5 types of risks that are related to audits include: (1.) Control Risk (2.) Detection Risk (3.) Inherent risk (4.) _____________ (5.) Sampling risk
Service Continuity Management
Antivirus software on the email servers
A gate process
Overall audit risk