SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A technique that is used to select a portion of a population when it is not feasible to test an entire population.
Overall audit risk
Testing activities
Sampling
The BCP process
2. Defines internal controls and provides guidance for assessing and improving internal control systems.
Sampling
A Virtual Server
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Project change request
3. (1.) Developers (2.) Architects (3.) Analysts (4.) Users
Change management
Transport Layer Protocols
Personnel involved in the requirements phase of a software development project
An Integrated Audit
4. Guide program execution through organization of resources and development of clear project objectives.
The first step in a business impact analysis
The appropriate role of an IS auditor in a control self-assessment
Reduced sign-on
Project Management Strategies
5. An audit of a third-party organization that provides services to other organizations.
A Service Provider audit
TCP/IP Network Model
Substantive Testing (test of transaction integrity)
Business impact analysis
6. Governed by: (1.) Effective Change Management (2.) Effective Application Testing (3.) Resilient Architecture (4.) Serviceable Components
(1.) Man-made (2.) Natural
Advantages of outsourcing
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
The availability of IT systems
7. The memory locations in the CPU where arithmetic values are stored.
PERT Diagram?
Inform the auditee
Registers
Balanced Scorecard
8. The risk that a material error exists that will not be prevented or detected by the organization's control framework - The possibility that a process or procedure will be unable to prevent or deter serious errors and wrongdoing.
BCP Plans
Insourcing
The 4-item focus of a Balanced Scorecard
Control Risk
9. The party that performs strategic planning - addresses near-term and long-term requirements aligning business objectives - and technology strategies.
OSI Layer 6: Presentation
Hash
The Steering Committee
The appropriate role of an IS auditor in a control self-assessment
10. (1.) Reliable delivery (2.) Connection oriented (persistent connection) (3.) Order of Delivery (4.) Flow Control (transfer rate is throttled) (5.) Port Number
IT standards are not being reviewed often enough
Vulnerability in the organization's PBX
Sampling Risk
TCP/IP Transport Layer packet delivery
11. Used to determine which business processes are the most critical - by ranking them in order of criticality
Elements of the COBIT Framework
Criticality analysis
Concentrate on samples known to represent high risk
Substantive Testing (test of transaction integrity)
12. A database administrator has been asked to configure a database management system so that it records all changes made by users - The DBA should implement ___________. This will cause the database to record every change that is made to it.
An Integrated Audit
An Administrative
Audit logging
Referential Integrity
13. (1.) Executive Summary (2.) Governance and control framework (3.) Control Objectives (4.) Management Guidelines (5.) Implementation Guide (6.) IT Assurance Guide
Elements of the COBIT Framework
Current and most up-to-date
The best approach for identifying high risk areas for an audit
Incident Management
14. An IS auditor is auditing the change management process for a financial application. The auditor has two primary pieces of evidence: change logs and a written analysis of the change logs performed by a business analyst. The change log is best because
Criticality analysis
Compliance Testing
Formal waterfall
objective and unbiased
15. To measure organizational performance and effectiveness against strategic goals.
A Service Provider audit
Balanced Scorecard
Application Controls
Information systems access
16. IT Governance is most concerned with ________.
Testing activities
Lacks specific expertise or resources to conduct an internal audit
IT Strategy
Categories of risk treatment
17. Aids in the coordinating of business processes using a sequence of three events -(1.) Business process creation (2.) Implementation (3.) Maintenance 3a. Benchmarking: Facilitates continuous improvement within the BPLC
Gantt Chart
The Business Process Life Cycle
Application Controls
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
18. Collections of Controls that work together to achieve an entire range of an organization's objectives.
Database primary key
The first step in a business impact analysis
Examples of Application Controls
Frameworks
19. (1.) Objectives (2.) Components (3.) Business Units / Areas
ITIL definition of PROBLEM
Dimensions of the COSO cube
Configuration Management
Detection Risk
20. The primary source for test plans in a software development project is: ________________ that are developed for a project should be the primary source for detailed tests.
Lacks specific expertise or resources to conduct an internal audit
The Requirements
Inform the auditee
Six steps of the Release Management process
21. Any event which is not part of the standard operation of service and which causes or may cause an interruption to or reduction in quality of that service. Includes THREE incident types: (1.) Service Outage (2.) Service Slowdown (3.) Software Bug
Information security policy
The Internet Layer in the TCP/IP model
The typical Configuration Items in Configuration Management
Incident Management
22. Used to schedule and sequence activities in a waterfall-type representation. Planned activities are shown flowing downward to completion. More simplistic than a PERT Diagram.
ITIL definition of CHANGE MANAGEMENT
ITIL definition of PROBLEM
OSI Layer 7: Application
Gantt Chart
23. Outsourcing is an opportunity for the organization to focus on core competencies. When an organization oursources a business function - it no longer needs to be concerned about training employees in that function. Outsources does not always reduce co
Vulnerability in the organization's PBX
OSI Layer 5: Session
Reduced sign-on
Advantages of outsourcing
24. What activity involves the identification of potential risk and the appropriate response for each threat based on impact assessment using qualitative and/or quantitative measures for an enterprise-wide risk management strategy?
An Operational Audit
Assess the maturity of its business processes
Cloud computing
Risk Management
25. A dynamically scalable and usually virtualized computing environment that is provided as a service. Clout computing services may be rented or leased so that an organization can have a scalable application without the need for supporting hardware.
The best approach for identifying high risk areas for an audit
Cloud computing
OSI: Transport Layer
Personnel involved in the requirements phase of a software development project
26. A large number of loosely coupled computers that are used to solve a common task may be in close proximity to each other or scattered over a large geographical area.
Grid Computing
Discovery Sampling
General Controls
Background checks performed
27. The IS auditor should act as a SME in the control self-assessment - but should not play a major role in the process.
Notify the Audit Committee
The appropriate role of an IS auditor in a control self-assessment
Sampling Risk
ITIL definition of CHANGE MANAGEMENT
28. A tightly coupled collection of computers that are used to solve a common task. One or more actively perform tasks - while zero or more may be in a standby state.
Incident Management
Rating Scale for Process Maturity
A Server Cluster
Reduced sign-on
29. Consists of two main packet transport protocols: TCP and UDP.
Capability Maturity Model
The Eight Types of Audits
Structural fires and transportation accidents
TCP/IP Transport Layer
30. Application controls limit ___________ in three ways: (1.) Point of Entry (Input Controls) (2.) During consumption (process controls) (3.) At the point of expression (Output Controls)
Primary security features of relational databases
Information systems access
Business Realization
Buffers
31. The highest number of errors that can exist without a result being materially misstated.
A Problem
Recovery time objective
Tolerable Error Rate
The BCP process
32. An IS auditor needs to perform an audit of a financial system and needs to trace individual transactions through the system. What type of testing should the auditor perform?
Stop-or-go Sampling
The first step in a business impact analysis
Substantive Testing (test of transaction integrity)
The 5 types of Evidence that the auditor will collect during an audit.
33. Concerned with electrical and physical specifications for devices. No frames or packets involved.
The Software Program Library
OSI: Physical Layer
Registers
Project change request
34. The annual expected loss to an asset. It is calculated as the single loss expectancy (SLE) X the annualized rate of occurrence (ARO.)
A Problem
The audit program
Annualized Loss Expectance (ALE)
Statistical Sampling
35. In Release Management - _________________ means that each step of the release process undergoes formal review and approval before the next step is allowed to begin.
Types of sampling an auditor can perform.
Service Continuity Management
PERT Diagram?
A gate process
36. A sampling technique used to study the characteristics of a population to determine how many samples possess a specific characteristic.
Sampling Risk
Application Layer protocols
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Attribute Sampling
37. ITIL term used to describe the SDLC.
Release management
Split custody
The Release process
OSI Layer 6: Presentation
38. Should include 4 steps: (1.) Emergency Approval (2.) Implementation (3.) Verification (4.) Review
Types of sampling an auditor can perform.
The Software Program Library
The 5 types of Evidence that the auditor will collect during an audit.
Emergency Changes
39. An organization is building a data center in an area frequented by power outages. The organization cannot tolerate power outages. The best _________________solution is an electric generator and an uninterruptible power supply. The UPS responds to the
IT Strategy
Power system controls
A Forensic Audit
Risk Management
40. Must be tested to validate effectiveness through: (1.) Document Review (2.) Walkthrough (3.) Simulation (4.) Parallel testing (5.) Cutover testing practices
objective and unbiased
BCP Plans
Blade Computer Architecture
Prblem Management
41. To ensure that input values are within established ranges - of the correct character types - and free of harmful contents.
Service Continuity Management
OSI: Transport Layer
Input validation checking
Deming Cycle
42. (1.) IP (2.) ICMP (3.) RRC (Radio Resource Control) (4.) AppleTalk
Primary security features of relational databases
Network Layer Protocols
To identify the tasks that are responsible for project delays
IT Services Financial Management
43. Deliver messages from one station to another on the same network or on different networks. Messaging at this layer is not guaranteed.
OSI Layer 7: Application
TCP/IP Internet Layer
Control Risk
Balanced Scorecard
44. 0. No process at all (1.) Process are ad hoc and disorganized (2.) Consistent processes (3.) Documented processes (4.) Measured and managed processes (5.) Processes are continuously improved
less than 24 hours
Rating Scale for Process Maturity
Incident Management
Frameworks
45. An audit of an IS department's operations and systems.
Inform the auditee
An IS audit
ITIL definition of CHANGE MANAGEMENT
An Integrated Audit
46. Used to measure the relative maturity of an organization and its processes.
The Business Process Life Cycle
Discovery Sampling
BCP Plans
Capability Maturity Model
47. Handle application processing
Structural fires and transportation accidents
Substantive Testing
Primary security features of relational databases
Application Controls
48. The purpose of an auditor doing interviews - To observe personnel to better understand their discipline - as well as ______________.
Incident Management
Organizational culture and maturity
Foreign Key
Audit logging
49. To determine effectiveness of a disaster recovery program - an IT auditor should examine _____________.
TCP/IP Link Layer
A Financial Audit
Geographic location
Documentation and interview personnel
50. An auditor is examining a key management process and has found that the IT department is not following its split-custody procedure. As a result - Someone may be in possession of the _________________.
Entire password for an encryption key
Security Awareness program
A Problem
objective and unbiased