SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An auditor has detected potential fraud while testing a control objective - He should ___________________. Because Audit committee members are generally not involved in business operations - they will be sufficiently remove from the matter - and they
Organizational culture and maturity
OSI: Network Layer
Notify the Audit Committee
Reduced sign-on
2. (1.) Authentication (2.) Authorization (3.) Change Management (4.) Completeness checks (5.) Validation checks (6.) Input controls (7.) Output controls (8.) Problem management (9.) Identification/access controls
Lacks specific expertise or resources to conduct an internal audit
Examples of Application Controls
The Steering Committee
Capability Maturity Model
3. The primary source for test plans in a software development project is: ________________ that are developed for a project should be the primary source for detailed tests.
Antivirus software on the email servers
A Sample Mean
The Requirements
Server cluster
4. The CPU has: (1.) Arithmetic Logic Unit (2.) ______________ (3.) a small amount of memory (usually in to form of registers)
Business impact analysis
The Requirements
Control Unit
Controls
5. 0. No process at all (1.) Process are ad hoc and disorganized (2.) Consistent processes (3.) Documented processes (4.) Measured and managed processes (5.) Processes are continuously improved
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Annualized Loss Expectance (ALE)
Rating Scale for Process Maturity
Project Management Strategies
6. (1.) Develop a BC Policy (2.) Conduct BIA (3.) Perform critical analysis (4.) Establish recovery targets (5.) Develop recovery and continuity strategies and plans (6.) Test recovery and continuity plans and procedures Train personnel Maintain strateg
Stop-or-go Sampling
Sampling Risk
The BCP process
Transport Layer Protocols
7. A sampling technique where a population is divided into classes or strata - based upon the value of one of the attributes. Samples are then selected from each class.
Stratified Sampling
Dimensions of the COSO cube
A Server Cluster
Overall audit risk
8. (1.) Objectives (2.) Components (3.) Business Units / Areas
Dimensions of the COSO cube
Power system controls
TCP/IP Transport Layer packet delivery
The two Categories of Controls
9. A sampling technique where items are chosen based upon the auditor's judgment - usually based on risk or materiality.
Judgmental sampling
Stop-or-go Sampling
The audit program
Incident Management
10. A computer uses RAM for several purposes: (1.) Operating System - to store info regarding running processes (2.) ____________ - that are used to temporarily store information retrieved from hard disks (3.) Storage of program code (4.) Storage of prog
Wet pipe fire sprinkler system
Buffers
Function Point Analysis
Separate administrative accounts
11. An audit of an accounting system - accounting department processes - and procedures to determine if business controls are sufficient to ensure the integrity of financial statements.
Registers
Testing activities
A Financial Audit
The best approach for identifying high risk areas for an audit
12. The risk that a material error exists that will not be prevented or detected by the organization's control framework - The possibility that a process or procedure will be unable to prevent or deter serious errors and wrongdoing.
The availability of IT systems
Volumes of COSO framework
Network Layer Protocols
Control Risk
13. Focuses on: maintaining service availability with the least disruption to standard operating parameters during an event
Power system controls
Business Continuity
WAN Protocols
The Requirements
14. A representation of how closely a sample represents an entire population.
Control Risk
Precision means
Background checks performed
Vulnerability in the organization's PBX
15. Contains programs that communicate directly with the end user.
A Sample Mean
OSI Layer 7: Application
ITIL definition of CHANGE MANAGEMENT
(1.) Man-made (2.) Natural
16. (1.) MPLS (2.) SONET (3.) T-Carrier (4.) Frame Relay (5.) ISDN (6.) X.25
Project change request
Dimensions of the COSO cube
WAN Protocols
The appropriate role of an IS auditor in a control self-assessment
17. IT Governance is most concerned with ________.
IT Strategy
Antivirus software on the email servers
Rating Scale for Process Maturity
Organizational culture and maturity
18. Change Management includes a _____________ of six steps: (1.) Proposal or Request (2.) Review (3.) Approval (4.) Implementation (5.) Verification (6.) Post-change Review
IT Strategy
Formal waterfall
Capability Maturity Model Integration (CMMI)
An Integrated Audit
19. An IS auditor needs to perform an audit of a financial system and needs to trace individual transactions through the system. What type of testing should the auditor perform?
Substantive Testing (test of transaction integrity)
OSI Layer 6: Presentation
Blade Computer Architecture
Sampling
20. Collections of Controls that work together to achieve an entire range of an organization's objectives.
Rating Scale for Process Maturity
An Administrative
Compliance Testing
Frameworks
21. Define 10 elements of an Audit - (1.) Subject of audit (2.) Audit Objective (3.) Type of audit (4.) Audit scope (5.) Pre-audit planning (6.) Audit procedures (7.) Communication plan (8.) Report Preparation (9.) Wrap-up (10.) Post-audit follow-up
Background checks performed
Sampling Risk
Audit Methodologies
Sample Standard Deviation
22. Handle application processing
Change management
Application Controls
Audit logging
WAN Protocols
23. Outsourcing is an opportunity for the organization to focus on core competencies. When an organization oursources a business function - it no longer needs to be concerned about training employees in that function. Outsources does not always reduce co
Advantages of outsourcing
The typical Configuration Items in Configuration Management
A gate process
An Operational Audit
24. An auditor has reviewed access privileges of some employees and has discovered that employees with longer terms of service have excessive privileges. This means User privileges are not being removed from their old position when they transfer to a new
Employees with excessive privileges
The availability of IT systems
Expected Error Rate
Tolerable Error Rate
25. One of a database table's fields - whose value is unique.
Criticality analysis
Database primary key
Primary security features of relational databases
The Eight Types of Audits
26. The 5 types of risks that are related to audits include: (1.) Control Risk (2.) Detection Risk (3.) Inherent risk (4.) _____________ (5.) Sampling risk
Overall audit risk
The BCP process
Rating Scale for Process Maturity
Input validation checking
27. An estimate that expresses the percent of errors or exceptions that may exist in an entire population
Substantive Testing (test of transaction integrity)
Expected Error Rate
less than 24 hours
Business Realization
28. A critical application is backed up once per day. The recovery point objective (RPO) for an application that is backed up once per day cannot be ________.
IT Services Financial Management
The best approach for identifying high risk areas for an audit
less than 24 hours
Stay current with technology
29. An audit of IS controls - security controls - or business controls to determine control existence and effectiveness.
Gantt Chart
Personnel involved in the requirements phase of a software development project
An Operational Audit
Assess the maturity of its business processes
30. An organization is building a data center in an area frequented by power outages. The organization cannot tolerate power outages. The best _________________solution is an electric generator and an uninterruptible power supply. The UPS responds to the
Power system controls
Sampling
Application Layer protocols
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
31. A CMM helps an organization to _______________ - which is an important first step to any large-scale process improvement effort.
Statement of Impact
Employees with excessive privileges
Inherent Risk
Assess the maturity of its business processes
32. n audit strategy and plans that include: (1.) Scope (2.) Objectives (3.) Resources (4.) Procedures used to evaluation controls and processes
Cloud computing
Types of sampling an auditor can perform.
TCP/IP Transport Layer
The audit program
33. (1.) Observations (2.) Written Notes (3.) Correspondence (4.) Process and Procedure documentation (5.) Business records
The 5 types of Evidence that the auditor will collect during an audit.
Substantive Testing
TCP/IP Internet Layer
Options for Risk Treatment
34. Framework for auditing and measuring IT Service Management Processes.
Stay current with technology
The Software Program Library
ISO 20000 Standard:
ITIL - IT Infrastructure Library
35. Gantt: used to display ______________.
Entire password for an encryption key
Resource details
TCP/IP Internet Layer
less than 24 hours
36. Risk Mitigation Risk Avoidance Risk Transfer Risk Acceptance
Options for Risk Treatment
Annualized Loss Expectance (ALE)
The 5 types of Evidence that the auditor will collect during an audit.
The Eight Types of Audits
37. (1.) Developers (2.) Architects (3.) Analysts (4.) Users
The Release process
Server cluster
Personnel involved in the requirements phase of a software development project
The appropriate role of an IS auditor in a control self-assessment
38. During the development phase - Developers should only be performing Unit Testing - to verify that the individual sections of code they have written are performing properly.
Segregation of duties issue in a high value process
Testing activities
Disaster Recovery
The two Categories of Controls
39. A sampling technique used to study the characteristics of a population to determine the numeric total of a specific attribute from the entire population.
TCP/IP Internet Layer
Inform the auditee
Variable Sampling
Information security policy
40. (1.) Avoidance (2.) Transfer (3.) Mitigation (4.) Acceptance
Categories of risk treatment
Release management
List of systems examined
A Financial Audit
41. Disasters are generally grouped in terms of type: ______________.
Recovery time objective
To identify the tasks that are responsible for project delays
(1.) Man-made (2.) Natural
Statement of Impact
42. Defines internal controls and provides guidance for assessing and improving internal control systems.
A Sample Mean
Critical Path Methodology
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Formal waterfall
43. Used to measure the relative maturity of an organization and its processes.
Capability Maturity Model
The Software Program Library
IT Service Management
A Problem
44. The highest number of errors that can exist without a result being materially misstated.
Grid Computing
Tolerable Error Rate
TCP/IP Internet Layer
Wet pipe fire sprinkler system
45. An alternate processing center that contains no information processing equipment.
Audit logging
A Cold Site
Variable Sampling
General Controls
46. (1.) Executive Summary (2.) Framework (3.) Reporting to External Parties (4.) Evaluation Tools
Release management
Inherent Risk
Volumes of COSO framework
Database primary key
47. A sampling technique used to study the characteristics of a population to determine how many samples possess a specific characteristic.
Business Realization
Attribute Sampling
PERT Diagram?
TCP/IP Transport Layer
48. An organization has chosen to open a business office in another country where labor costs are lower and has hired workers to perform business functions there. - The organization is ___________ - while they may have opened the office in a foreign coun
Insourcing
A Forensic Audit
Data Link Layer Standards
Business Realization
49. An auditor is examining a key management process and has found that the IT department is not following its split-custody procedure. As a result - Someone may be in possession of the _________________.
Entire password for an encryption key
General Controls
Substantive Testing (test of transaction integrity)
List of systems examined
50. A database administrator has been asked to configure a database management system so that it records all changes made by users - The DBA should implement ___________. This will cause the database to record every change that is made to it.
Gantt Chart
Audit logging
Compliance Testing
Insourcing
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests