SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The primary source for test plans in a software development project is: ________________ that are developed for a project should be the primary source for detailed tests.
Deming Cycle
Vulnerability in the organization's PBX
The Requirements
Prblem Management
2. Used to measure the relative maturity of an organization and its processes.
Capability Maturity Model
Cloud computing
Detection Risk
Stop-or-go Sampling
3. An alternate processing center that contains no information processing equipment.
To identify the tasks that are responsible for project delays
Business Continuity
Information systems access
A Cold Site
4. The portion of IT management that tracks the financial value of IT services that support organizational objectives. It includes 4 activities: (1.) Budgeting (2.) Capital Investment (3.) Expense Management (4.) Project accounting and project ROI (Ret
IT Services Financial Management
IT Strategy
Expected Error Rate
OSI Layer 5: Session
5. (1.) Objectives (2.) Components (3.) Business Units / Areas
Network Layer Protocols
Substantive Testing
List of systems examined
Dimensions of the COSO cube
6. (1.) General (2.) Application
Main types of Controls
Business Realization
Department Charters
Service Level Management
7. Consists of 11 distinct activities: (1.) Service Desk (2.) Incident Management (3.) Problem Management (4.) Change Management (5.) Configuration Management (6.) Release Management (7.) Service-level Management (8.) Financial Management (9.) Capacity
IT Service Management
Database primary key
Advantages of outsourcing
Sampling
8. The process of recording the configuration of IT systems. Each configuration setting is known in ITSM parlance as a Configuration Item.
TCP/IP Network Model
TCP/IP Transport Layer
Configuration Management
Annualized Loss Expectance (ALE)
9. A sampling technique where items are chosen based upon the auditor's judgment - usually based on risk or materiality.
CPU
Overall audit risk
Judgmental sampling
OSI Layer 6: Presentation
10. An audit that combines an operational audit and a financial audit.
Service Continuity Management
An Integrated Audit
A Sample Mean
Concentrate on samples known to represent high risk
11. n audit strategy and plans that include: (1.) Scope (2.) Objectives (3.) Resources (4.) Procedures used to evaluation controls and processes
The audit program
Department Charters
The best approach for identifying high risk areas for an audit
Emergency Changes
12. Critical Path Methodology helps a project manager determine which activities are on a project's critical list - ________________________.
Application Layer protocols
To identify the tasks that are responsible for project delays
The Business Process Life Cycle
Assess the maturity of its business processes
13. The 5 types of risks that are related to audits include: (1.) Control Risk (2.) Detection Risk (3.) Inherent risk (4.) _____________ (5.) Sampling risk
The two Categories of Controls
Application Controls
Overall audit risk
Assess the maturity of its business processes
14. An audit of an IS department's operations and systems.
Documentation and interview personnel
Primary security features of relational databases
A Sample Mean
An IS audit
15. Must be tested to validate effectiveness through: (1.) Document Review (2.) Walkthrough (3.) Simulation (4.) Parallel testing (5.) Cutover testing practices
Transport Layer Protocols
BCP Plans
Balanced Scorecard
Organizational culture and maturity
16. A critical application is backed up once per day. The recovery point objective (RPO) for an application that is backed up once per day cannot be ________.
less than 24 hours
ITIL definition of PROBLEM
An Operational Audit
Sampling
17. The IS auditor should act as a SME in the control self-assessment - but should not play a major role in the process.
Types of sampling an auditor can perform.
The appropriate role of an IS auditor in a control self-assessment
OSI Layer 6: Presentation
Reduced sign-on
18. A facility that is used to store and manage access to an organization's application source and object code. It consists of 5 parts: (1.) Access and authorization controls (2.) Program checkout (3.) Program Check-in (4.) Version Control (5.) Code Ana
Elements of the COBIT Framework
ITIL definition of CHANGE MANAGEMENT
Geographic location
The Software Program Library
19. A four-step quality control process known as PDSA - or PDCA. Steps: (1.) Plan (2.) Do (3.) Study (4.) Act
The 4-item focus of a Balanced Scorecard
Security Awareness program
Deming Cycle
Inherent Risk
20. The delivery of messages from one station to another via one or more networks.. Routes packets between networks.
IT executives and the Board of Directors
OSI: Network Layer
Entire password for an encryption key
Inform the auditee
21. The annual expected loss to an asset. It is calculated as the single loss expectancy (SLE) X the annualized rate of occurrence (ARO.)
The Software Program Library
Expected Error Rate
Annualized Loss Expectance (ALE)
Formal waterfall
22. Support the functioning of the application controls
OSI Layer 5: Session
General Controls
Sample Standard Deviation
The Internet Layer in the TCP/IP model
23. Any event which is not part of the standard operation of service and which causes or may cause an interruption to or reduction in quality of that service. Includes THREE incident types: (1.) Service Outage (2.) Service Slowdown (3.) Software Bug
Incident Management
Statement of Impact
An Operational Audit
The 4-item focus of a Balanced Scorecard
24. Risk Mitigation Risk Avoidance Risk Transfer Risk Acceptance
Options for Risk Treatment
Dimensions of the COSO cube
ISO 20000 Standard:
The availability of IT systems
25. Contains programs that communicate directly with the end user.
Cloud computing
IT executives and the Board of Directors
Buffers
OSI Layer 7: Application
26. The purpose of an auditor doing interviews - To observe personnel to better understand their discipline - as well as ______________.
Assess the maturity of its business processes
Substantive Testing (test of transaction integrity)
The first step in a business impact analysis
Organizational culture and maturity
27. An audit of operational efficiency.
An Administrative
Power system controls
SDLC Phases
Prblem Management
28. An estimate that expresses the percent of errors or exceptions that may exist in an entire population
The Steering Committee
Resource details
Expected Error Rate
Tolerable Error Rate
29. During the development phase - Developers should only be performing Unit Testing - to verify that the individual sections of code they have written are performing properly.
OSI Layer 5: Session
The Business Process Life Cycle
Testing activities
General Controls
30. The result of strategic planning - process development - and systems development - which all contribute towards a launch of business operations to reach a set of business objectives.
Business Realization
Power system controls
Concentrate on samples known to represent high risk
Service Level Management
31. An organization has discovered that some of its employees have criminal records. The best course of action for the organization to take - The organization should have ___________________ on all of its existing employees and also begin instituting bac
Inform the auditee
Resource details
A Server Cluster
Background checks performed
32. Information is arranged in frames and transported across the medium. Collision detection. Checksum verification of delivery.
Entire password for an encryption key
TCP/IP Link Layer
OSI: Data Link Layer
(1.) Man-made (2.) Natural
33. A programmer is updating an application that saves passwords in plaintext. In this case - Passwords should be stored in a _____. This makes it impossible for any person to retrieve a password - which could lead to account compromise.
Hash
less than 24 hours
The Steering Committee
Examples of IT General Controls
34. A computation of the variance of sample values from the sample mean. This is a measurement of the spread of values in a sample
Criticality analysis
Sampling Risk
Formal waterfall
Sample Standard Deviation
35. An audit of IS controls - security controls - or business controls to determine control existence and effectiveness.
ITIL definition of CHANGE MANAGEMENT
Disaster Recovery
An Operational Audit
objective and unbiased
36. A dynamically scalable and usually virtualized computing environment that is provided as a service. Clout computing services may be rented or leased so that an organization can have a scalable application without the need for supporting hardware.
Cloud computing
IT Service Management
IT Services Financial Management
TCP/IP Transport Layer packet delivery
37. A tightly coupled collection of computers that are used to solve a common task. One or more actively perform tasks - while zero or more may be in a standby state.
Six steps of the Release Management process
A Server Cluster
Compliance Testing
Confidence coefficient
38. An audit that is performed in support of an anticipated or active legal proceeding.
A Forensic Audit
Examples of Application Controls
Balanced Scorecard
Sampling Risk
39. A large number of loosely coupled computers that are used to solve a common task may be in close proximity to each other or scattered over a large geographical area.
less than 24 hours
Grid Computing
The audit program
Audit Methodologies
40. Defines internal controls and provides guidance for assessing and improving internal control systems.
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Confidence coefficient
Testing activities
An IS audit
41. A quantitative risk analysis is __________________ because: It is difficult to get accurate figures on the frequency of specific threats. It is difficult to determine the probability that a threat will be realized. It is relatively easy to determine
Resource details
Prblem Management
The 4-item focus of a Balanced Scorecard
More difficult to perform
42. Used to control connections that are established between systems (1.) TCP (2.) IPC (3.) SIP (Session Initiation Protocol) (4.) RPC (Remote Procedure Call) (5.) NetBIOS
OSI Layer 5: Session
Discovery Sampling
Service Level Management
Overall audit risk
43. An IS auditor is auditing the change management process for a financial application. The auditor has two primary pieces of evidence: change logs and a written analysis of the change logs performed by a business analyst. The change log is best because
Structural fires and transportation accidents
The two Categories of Controls
objective and unbiased
Options for Risk Treatment
44. A condition often identified as a result of multiple incidents that exhibit common symptoms. Problems can also be identified from a single significant incident for which the impact is significant.
The 7 phases and their order in the SDLC
ITIL definition of PROBLEM
Recovery time objective
Options for Risk Treatment
45. An audit of a third-party organization that provides services to other organizations.
Cloud computing
Geographic location
A Service Provider audit
Judgmental sampling
46. (1.) Develop a BC Policy (2.) Conduct BIA (3.) Perform critical analysis (4.) Establish recovery targets (5.) Develop recovery and continuity strategies and plans (6.) Test recovery and continuity plans and procedures Train personnel Maintain strateg
A Cold Site
The BCP process
Audit logging
Registers
47. Disasters are generally grouped in terms of type: ______________.
Options for Risk Treatment
The appropriate role of an IS auditor in a control self-assessment
Formal waterfall
(1.) Man-made (2.) Natural
48. (1.) TCP (2.) UDP
Business Realization
Transport Layer Protocols
objective and unbiased
Information security policy
49. To measure organizational performance and effectiveness against strategic goals.
Project Management Strategies
Balanced Scorecard
Incident Management
Information security policy
50. (1.) Access Control (2.) Change Management (3.) Security Controls (4.) Incident Management (5.) SDLC (6.) Source code and versioning controls (7.) Monitoring and logging (8.) Event Management
Examples of IT General Controls
WAN Protocols
Entire password for an encryption key
objective and unbiased