SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An IS auditor needs to perform an audit of a financial system and needs to trace individual transactions through the system. What type of testing should the auditor perform?
Referential Integrity
OSI: Data Link Layer
Expected Error Rate
Substantive Testing (test of transaction integrity)
2. The probability that a sample selected actually represents the entire population. This is usually expressed as a percentage.
The audit program
ITIL - IT Infrastructure Library
ITIL definition of CHANGE MANAGEMENT
Confidence coefficient
3. One of a database table's fields - whose value is unique.
Criticality analysis
Database primary key
Examples of Application Controls
General Controls
4. Information is arranged in frames and transported across the medium. Collision detection. Checksum verification of delivery.
IT Services Financial Management
Sample Standard Deviation
OSI: Data Link Layer
Concentrate on samples known to represent high risk
5. (1.) Link (2.) Internet (3.) Transport (4.) Application
Incident Management
The first step in a business impact analysis
Service Continuity Management
TCP/IP Network Model
6. A four-step quality control process known as PDSA - or PDCA. Steps: (1.) Plan (2.) Do (3.) Study (4.) Act
Gantt Chart
Segregation of duties issue in a high value process
Emergency Changes
Deming Cycle
7. Used to translate or transform data from lower layers into formats that the application layer can work with.
Audit logging
The Internet Layer in the TCP/IP model
OSI Layer 6: Presentation
Geographic location
8. Used to measure the relative maturity of an organization and its processes.
Capability Maturity Model
Blade Computer Architecture
Examples of Application Controls
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
9. (1.) Hardware Complement (physical specifications) (2.) Hardware Configuration (firmware settings) (3.) Operating system version and configuration (4.) Software versions and configuration
Grid Computing
SDLC Phases
The typical Configuration Items in Configuration Management
ITIL definition of PROBLEM
10. The first major task in a disaster recovery or business continuity planning project.
Categories of risk treatment
The Eight Types of Audits
Statement of Impact
Business impact analysis
11. An active - instance of a server operating system running on a machine that is designed to house two or more such virtual servers.
A Virtual Server
Emergency Changes
A Cold Site
Vulnerability in the organization's PBX
12. An auditor has reviewed access privileges of some employees and has discovered that employees with longer terms of service have excessive privileges. This means User privileges are not being removed from their old position when they transfer to a new
Frameworks
OSI: Network Layer
An Operational Audit
Employees with excessive privileges
13. A computation of the variance of sample values from the sample mean. This is a measurement of the spread of values in a sample
Sample Standard Deviation
Notify the Audit Committee
Sampling
A Forensic Audit
14. PERT: shows the ______________ critical path.
Configuration Management
Emergency Changes
Separate administrative accounts
Current and most up-to-date
15. To determine effectiveness of a disaster recovery program - an IT auditor should examine _____________.
Documentation and interview personnel
The typical Configuration Items in Configuration Management
An Integrated Audit
Sampling
16. (1.) General (2.) Application
The BCP process
The audit program
Main types of Controls
The Steering Committee
17. Critical Path Methodology helps a project manager determine which activities are on a project's critical list - ________________________.
To identify the tasks that are responsible for project delays
The availability of IT systems
Data Link Layer Standards
List of systems examined
18. Consists of 11 distinct activities: (1.) Service Desk (2.) Incident Management (3.) Problem Management (4.) Change Management (5.) Configuration Management (6.) Release Management (7.) Service-level Management (8.) Financial Management (9.) Capacity
An Integrated Audit
Statement of Impact
The 5 types of Evidence that the auditor will collect during an audit.
IT Service Management
19. During the development phase - Developers should only be performing Unit Testing - to verify that the individual sections of code they have written are performing properly.
Testing activities
Project Management Strategies
Substantive Testing (test of transaction integrity)
ISO 20000 Standard:
20. A CMM helps an organization to _______________ - which is an important first step to any large-scale process improvement effort.
TCP/IP Link Layer
Assess the maturity of its business processes
IT Services Financial Management
Documentation and interview personnel
21. (1.) Access Control (2.) Change Management (3.) Security Controls (4.) Incident Management (5.) SDLC (6.) Source code and versioning controls (7.) Monitoring and logging (8.) Event Management
Release management
Examples of IT General Controls
A Problem
Control Unit
22. An organization wants to reduce the number of user IDs and passwords that its employees need to remember. The best available solution to this - _______________. This provides a single authentication service (such as LDAP or AD) that many applications
Compliance Testing
TCP/IP Link Layer
Reduced sign-on
Department Charters
23. The 5 types of risks that are related to audits include: (1.) Control Risk (2.) Detection Risk (3.) Inherent risk (4.) _____________ (5.) Sampling risk
Overall audit risk
Blade Computer Architecture
Statistical Sampling
Resource details
24. A sampling technique used to study the characteristics of a population to determine the numeric total of a specific attribute from the entire population.
Employee termination process
An IS audit
TCP/IP Network Model
Variable Sampling
25. In Release Management - _________________ means that each step of the release process undergoes formal review and approval before the next step is allowed to begin.
Variable Sampling
Transport Layer Protocols
Main types of Controls
A gate process
26. An IS auditor is examining the IT standards document for an organization that was last reviewed two years earlier. The best course of action for the IS auditor is: Report that the ____________________________. Two years is far too long between revie
IT standards are not being reviewed often enough
Segregation of duties issue in a high value process
An IS audit
Resource details
27. (1.) Avoidance (2.) Transfer (3.) Mitigation (4.) Acceptance
Categories of risk treatment
OSI: Network Layer
An Administrative
Types of sampling an auditor can perform.
28. Describes the effect on the business if a process is incapacitated for any appreciable time
Statement of Impact
TCP/IP Link Layer
Network Layer Protocols
ITIL - IT Infrastructure Library
29. Aids in the coordinating of business processes using a sequence of three events -(1.) Business process creation (2.) Implementation (3.) Maintenance 3a. Benchmarking: Facilitates continuous improvement within the BPLC
A Forensic Audit
An Integrated Audit
The Business Process Life Cycle
Types of sampling an auditor can perform.
30. The CPU has: (1.) Arithmetic Logic Unit (2.) ______________ (3.) a small amount of memory (usually in to form of registers)
Control Unit
The Release process
Stay current with technology
The Internet Layer in the TCP/IP model
31. (1.) LAN protocols (2.) 80 (2.) 11 MAC/LLC (WiFi) (3.) Common Carrier packet networks (4.) ARP (5.) PPP and SLIP (6.) Tunneling - PPTP - L2TP
The 7 phases and their order in the SDLC
Registers
Data Link Layer Standards
IT Services Financial Management
32. An estimate that expresses the percent of errors or exceptions that may exist in an entire population
Examples of IT General Controls
Statistical Sampling
Inherent Risk
Expected Error Rate
33. Must be tested to validate effectiveness through: (1.) Document Review (2.) Walkthrough (3.) Simulation (4.) Parallel testing (5.) Cutover testing practices
Wet pipe fire sprinkler system
PERT Diagram?
BCP Plans
Server cluster
34. A sampling technique where items are chosen based upon the auditor's judgment - usually based on risk or materiality.
Types of sampling an auditor can perform.
OSI Layer 5: Session
Options for Risk Treatment
Judgmental sampling
35. Consists of two main packet transport protocols: TCP and UDP.
TCP/IP Transport Layer
ITIL definition of PROBLEM
A Sample Mean
Business impact analysis
36. A representation of how closely a sample represents an entire population.
The Requirements
Antivirus software on the email servers
Notify the Audit Committee
Precision means
37. Who is responsible for imposing an IT governance model encompassing IT strategy - information security - and formal enterprise architectural mandates?
Examples of Application Controls
Rating Scale for Process Maturity
IT executives and the Board of Directors
OSI Layer 5: Session
38. A database administrator has been asked to configure a database management system so that it records all changes made by users - The DBA should implement ___________. This will cause the database to record every change that is made to it.
Testing activities
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Audit logging
Vulnerability in the organization's PBX
39. The maximum period of downtime for a process or application
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
IT executives and the Board of Directors
Registers
Recovery time objective
40. A facility that is used to store and manage access to an organization's application source and object code. It consists of 5 parts: (1.) Access and authorization controls (2.) Program checkout (3.) Program Check-in (4.) Version Control (5.) Code Ana
BCP Plans
The Software Program Library
Examples of Application Controls
Detection Risk
41. Contains programs that communicate directly with the end user.
TCP/IP Transport Layer
Vulnerability in the organization's PBX
OSI Layer 7: Application
ITIL definition of CHANGE MANAGEMENT
42. (1.) Physical (2.) Technical (4.) Administrative
Three Types of Controls
Rating Scale for Process Maturity
Stratified Sampling
The 7 phases and their order in the SDLC
43. The process of recording the configuration of IT systems. Each configuration setting is known in ITSM parlance as a Configuration Item.
Business Realization
Buffers
Configuration Management
Server cluster
44. The purpose of an auditor doing interviews - To observe personnel to better understand their discipline - as well as ______________.
Discovery Sampling
Organizational culture and maturity
OSI: Network Layer
BCP Plans
45. (1.) Objectives (2.) Components (3.) Business Units / Areas
Notify the Audit Committee
Antivirus software on the email servers
Substantive Testing (test of transaction integrity)
Dimensions of the COSO cube
46. An audit that combines an operational audit and a financial audit.
Configuration Management
Sample Standard Deviation
The Requirements
An Integrated Audit
47. Application controls limit ___________ in three ways: (1.) Point of Entry (Input Controls) (2.) During consumption (process controls) (3.) At the point of expression (Output Controls)
Expected Error Rate
Information systems access
The two Categories of Controls
Department Charters
48. (1.) Observations (2.) Written Notes (3.) Correspondence (4.) Process and Procedure documentation (5.) Business records
Options for Risk Treatment
Resource details
Disaster Recovery
The 5 types of Evidence that the auditor will collect during an audit.
49. A software developer has informed the project manager that a portion of the application development is going to take five additional days to complete. The project manager make a __________________ to document the reason for the change.
OSI Layer 7: Application
Split custody
Project change request
Detection Risk
50. A computer uses RAM for several purposes: (1.) Operating System - to store info regarding running processes (2.) ____________ - that are used to temporarily store information retrieved from hard disks (3.) Storage of program code (4.) Storage of prog
Buffers
Emergency Changes
Background checks performed
objective and unbiased