SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An alternate processing center that contains no information processing equipment.
An Operational Audit
A Cold Site
Inherent Risk
The Steering Committee
2. Used to control connections that are established between systems (1.) TCP (2.) IPC (3.) SIP (Session Initiation Protocol) (4.) RPC (Remote Procedure Call) (5.) NetBIOS
The best approach for identifying high risk areas for an audit
Resource details
OSI Layer 5: Session
The Release process
3. A software developer has informed the project manager that a portion of the application development is going to take five additional days to complete. The project manager make a __________________ to document the reason for the change.
Organizational culture and maturity
Change management
A Server Cluster
Project change request
4. (1.) General (2.) Application
Application Layer protocols
Types of sampling an auditor can perform.
Main types of Controls
Stop-or-go Sampling
5. The IS auditor should act as a SME in the control self-assessment - but should not play a major role in the process.
The appropriate role of an IS auditor in a control self-assessment
TCP/IP Internet Layer
Current and most up-to-date
Types of sampling an auditor can perform.
6. A tightly coupled collection of computers that are used to solve a common task. One or more actively perform tasks - while zero or more may be in a standby state.
Change management
A Server Cluster
The 5 types of Evidence that the auditor will collect during an audit.
The Eight Types of Audits
7. (1.) Automatic (2.) Manual
TCP/IP Network Model
Power system controls
More difficult to perform
The two Categories of Controls
8. What activity involves the identification of potential risk and the appropriate response for each threat based on impact assessment using qualitative and/or quantitative measures for an enterprise-wide risk management strategy?
An Integrated Audit
OSI: Transport Layer
Risk Management
Server cluster
9. Defines internal controls and provides guidance for assessing and improving internal control systems.
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
less than 24 hours
Attribute Sampling
OSI: Physical Layer
10. (1.) Feasibility Study (2.) Definition of Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation phase
Configuration Management
SDLC Phases
Volumes of COSO framework
Segregation of duties issue in a high value process
11. Aids in the coordinating of business processes using a sequence of three events -(1.) Business process creation (2.) Implementation (3.) Maintenance 3a. Benchmarking: Facilitates continuous improvement within the BPLC
OSI: Transport Layer
Variable Sampling
ISO 20000 Standard:
The Business Process Life Cycle
12. The memory locations in the CPU where arithmetic values are stored.
Registers
Business impact analysis
Sampling Risk
Controls
13. An auditor is examining a key management process and has found that the IT department is not following its split-custody procedure. As a result - Someone may be in possession of the _________________.
Capability Maturity Model Integration (CMMI)
Stratified Sampling
Entire password for an encryption key
ITIL - IT Infrastructure Library
14. Guide program execution through organization of resources and development of clear project objectives.
Examples of Application Controls
Project Management Strategies
Capability Maturity Model
Organizational culture and maturity
15. An organization is building a data center in an area frequented by power outages. The organization cannot tolerate power outages. The best _________________solution is an electric generator and an uninterruptible power supply. The UPS responds to the
A Financial Audit
Referential Integrity
Power system controls
Precision means
16. An audit of IS controls - security controls - or business controls to determine control existence and effectiveness.
Hash
An Administrative
An Operational Audit
Criticality analysis
17. Concerned with electrical and physical specifications for devices. No frames or packets involved.
OSI: Physical Layer
Concentrate on samples known to represent high risk
A Financial Audit
Expected Error Rate
18. Used to illustrate the relationship between planned activities. PERT diagrams show multiple routes through the project activities - as necessary for accomplishing a goal.
Detection Risk
PERT Diagram?
Control Risk
Inherent Risk
19. (1.) Executive Summary (2.) Framework (3.) Reporting to External Parties (4.) Evaluation Tools
Grid Computing
Volumes of COSO framework
Current and most up-to-date
PERT Diagram?
20. The sum of all samples divided by the number of samples.
Audit Methodologies
A Sample Mean
Blade Computer Architecture
More difficult to perform
21. (1.) Access controls (2.) Encryption (3.) Audit logging
A Financial Audit
Service Continuity Management
Sampling Risk
Primary security features of relational databases
22. (1.) Physical (2.) Technical (4.) Administrative
Elements of the COBIT Framework
Insourcing
Three Types of Controls
Control Unit
23. The process to ensure that standardized methods and procedures are used for efficient and prompt handling of all changes.
Disaster Recovery
Control Unit
To identify the tasks that are responsible for project delays
ITIL definition of CHANGE MANAGEMENT
24. The IS auditor should conduct a risk assessment first to determine which areas have highest risk. She should devote more testing resources to those high-risk areas.
Server cluster
The best approach for identifying high risk areas for an audit
Options for Risk Treatment
Incident Management
25. Information is arranged in frames and transported across the medium. Collision detection. Checksum verification of delivery.
OSI: Data Link Layer
Expected Error Rate
Substantive Testing
Background checks performed
26. (1.) Objectives (2.) Components (3.) Business Units / Areas
Precision means
Dimensions of the COSO cube
Server cluster
Foreign Key
27. Framework for auditing and measuring IT Service Management Processes.
The BCP process
ISO 20000 Standard:
Sample Standard Deviation
A Service Provider audit
28. (1.) Financial (2.) Customer (3.) Internal processes (4.) Innovation / Learning
Input validation checking
The 4-item focus of a Balanced Scorecard
A gate process
Network Layer Protocols
29. Governed by: (1.) Effective Change Management (2.) Effective Application Testing (3.) Resilient Architecture (4.) Serviceable Components
OSI: Physical Layer
The availability of IT systems
The audit program
Service Level Management
30. An IS auditor is auditing the change management process for a financial application. The auditor has two primary pieces of evidence: change logs and a written analysis of the change logs performed by a business analyst. The change log is best because
The Requirements
objective and unbiased
ITIL definition of CHANGE MANAGEMENT
Split custody
31. A database term - which means that the database will not permit a program (or user) to deleted rows from a table if there are records in other tables whose foreign keys reference the row to be deleted.
Audit Methodologies
The Software Program Library
Referential Integrity
Wet pipe fire sprinkler system
32. Used to measure the relative maturity of an organization and its processes.
IT executives and the Board of Directors
Elements of the COBIT Framework
Capability Maturity Model
The first step in a business impact analysis
33. To communication security policies - procedures - and other security-related information to an organization's employees.
Inherent Risk
A Sample Mean
The best approach for identifying high risk areas for an audit
Security Awareness program
34. Consists of main chassis component that is equipped with slots are fitted with individual cpu modules. Main advantage is lower cost per unit.
OSI Layer 6: Presentation
Transport Layer Protocols
Blade Computer Architecture
Tolerable Error Rate
35. The risk that an IS auditor will overlook errors or exceptions during an audit.
Detection Risk
Information systems access
A Financial Audit
Judgmental sampling
36. An auditor has discovered that several administrators in an application share an administrative account. The auditor should recommend that - Several __________________ should be used. This will enforce accountability for each administrator's actions.
Entire password for an encryption key
TCP/IP Network Model
Controls
Separate administrative accounts
37. The risk that a material error exists that will not be prevented or detected by the organization's control framework - The possibility that a process or procedure will be unable to prevent or deter serious errors and wrongdoing.
An Administrative
Criticality analysis
Information systems access
Control Risk
38. One of a database table's fields - whose value is unique.
Database primary key
TCP/IP Transport Layer
Input validation checking
Annualized Loss Expectance (ALE)
39. What type of testing is performed to verify the accuracy and integrity of transactions as they flow through a system?
Substantive Testing
An Operational Audit
A Forensic Audit
Application Layer protocols
40. A CMM helps an organization to _______________ - which is an important first step to any large-scale process improvement effort.
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
IT Service Management
Assess the maturity of its business processes
Power system controls
41. Change Management includes a _____________ of six steps: (1.) Proposal or Request (2.) Review (3.) Approval (4.) Implementation (5.) Verification (6.) Post-change Review
Deming Cycle
Discovery Sampling
Grid Computing
Formal waterfall
42. Collections of Controls that work together to achieve an entire range of an organization's objectives.
Service Continuity Management
Configuration Management
BCP Plans
Frameworks
43. Focuses on: maintaining service availability with the least disruption to standard operating parameters during an event
An Integrated Audit
Volumes of COSO framework
Business Continuity
Business Realization
44. Consists of 11 distinct activities: (1.) Service Desk (2.) Incident Management (3.) Problem Management (4.) Change Management (5.) Configuration Management (6.) Release Management (7.) Service-level Management (8.) Financial Management (9.) Capacity
IT Service Management
Volumes of COSO framework
Release management
Application Layer protocols
45. Used for several types of system changes: (1.) Incidents and problem resolution (bug fixes.) (2.) Enhancements (new functionality.) (3.) Subsystem patches and changes (require testing similar to when changes are made to the application itself.)
The Release process
Insourcing
Examples of IT General Controls
Information systems access
46. An organization has discovered that some of its employees have criminal records. The best course of action for the organization to take - The organization should have ___________________ on all of its existing employees and also begin instituting bac
Function Point Analysis
Tolerable Error Rate
Background checks performed
Formal waterfall
47. The 5 types of risks that are related to audits include: (1.) Control Risk (2.) Detection Risk (3.) Inherent risk (4.) _____________ (5.) Sampling risk
Change management
Overall audit risk
Incident Management
TCP/IP Network Model
48. The main hardware component of a computer system - which executes instructions in computer programs.
The best approach for identifying high risk areas for an audit
CPU
Information security policy
Main types of Controls
49. Used to estimate the effort required to develop a software program.
Resource details
Function Point Analysis
Network Layer Protocols
OSI: Network Layer
50. A database administrator has been asked to configure a database management system so that it records all changes made by users - The DBA should implement ___________. This will cause the database to record every change that is made to it.
Audit logging
A Cold Site
Information security policy
An Operational Audit