SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The result of strategic planning - process development - and systems development - which all contribute towards a launch of business operations to reach a set of business objectives.
Business Realization
Disaster Recovery
Substantive Testing (test of transaction integrity)
Three Types of Controls
2. An IS auditor is examining the IT standards document for an organization that was last reviewed two years earlier. The best course of action for the IS auditor is: Report that the ____________________________. Two years is far too long between revie
ITIL - IT Infrastructure Library
IT standards are not being reviewed often enough
Tolerable Error Rate
Concentrate on samples known to represent high risk
3. An external IS auditor has discovered a _______________________ - The external auditor can only document the finding in the audit report. An external auditor is not in a position to implement controls.
Segregation of duties issue in a high value process
A Compliance audit
Examples of IT General Controls
An IS audit
4. Critical Path Methodology helps a project manager determine which activities are on a project's critical list - ________________________.
Personnel involved in the requirements phase of a software development project
Annualized Loss Expectance (ALE)
Documentation and interview personnel
To identify the tasks that are responsible for project delays
5. (1.) Observations (2.) Written Notes (3.) Correspondence (4.) Process and Procedure documentation (5.) Business records
Sample Standard Deviation
The 5 types of Evidence that the auditor will collect during an audit.
The 4-item focus of a Balanced Scorecard
TCP/IP Internet Layer
6. What type of testing is performed to determine if control procedures have proper design and are operating properly?
Confidence coefficient
General Controls
The Steering Committee
Compliance Testing
7. (1.) Physical (2.) Technical (4.) Administrative
Three Types of Controls
The first step in a business impact analysis
Gantt Chart
Information security policy
8. The process to ensure that standardized methods and procedures are used for efficient and prompt handling of all changes.
Examples of IT General Controls
Foreign Key
BCP Plans
ITIL definition of CHANGE MANAGEMENT
9. An organization experiences frequent malware infections on end-user workstations that are received through email - despite the tact that workstations have anti-virus software. To reducing malware - Implementing ________________ will provide an effect
Antivirus software on the email servers
(1.) Man-made (2.) Natural
A Forensic Audit
TCP/IP Internet Layer
10. In Release Management - _________________ means that each step of the release process undergoes formal review and approval before the next step is allowed to begin.
Examples of IT General Controls
The 7 phases and their order in the SDLC
A gate process
Three Types of Controls
11. An auditor has reviewed access privileges of some employees and has discovered that employees with longer terms of service have excessive privileges. This means User privileges are not being removed from their old position when they transfer to a new
IT Services Financial Management
An IS audit
CPU
Employees with excessive privileges
12. IS auditors can _____________________ through the following means: (1.) training courses (2.) webinars (3.) ISACA chapter training events (4.) Industry conferences
Tolerable Error Rate
Split custody
Service Level Management
Stay current with technology
13. A sampling technique where items are chosen based upon the auditor's judgment - usually based on risk or materiality.
Primary security features of relational databases
Antivirus software on the email servers
Judgmental sampling
Registers
14. 0. No process at all (1.) Process are ad hoc and disorganized (2.) Consistent processes (3.) Documented processes (4.) Measured and managed processes (5.) Processes are continuously improved
OSI: Physical Layer
ITIL - IT Infrastructure Library
Rating Scale for Process Maturity
Testing activities
15. Focuses on: post-event recovery and restoration of services
PERT Diagram?
Buffers
Confidence coefficient
Disaster Recovery
16. (1.) Automatic (2.) Manual
The two Categories of Controls
Incident Management
Prblem Management
CPU
17. During the development phase - Developers should only be performing Unit Testing - to verify that the individual sections of code they have written are performing properly.
Business impact analysis
Testing activities
Antivirus software on the email servers
Overall audit risk
18. Support the functioning of the application controls
Primary security features of relational databases
Hash
General Controls
Information systems access
19. A critical application is backed up once per day. The recovery point objective (RPO) for an application that is backed up once per day cannot be ________.
Statistical Sampling
less than 24 hours
Elements of the COBIT Framework
The best approach for identifying high risk areas for an audit
20. To determine effectiveness of a disaster recovery program - an IT auditor should examine _____________.
TCP/IP Transport Layer packet delivery
Project change request
Documentation and interview personnel
Information systems access
21. An alternate processing center that contains no information processing equipment.
The Eight Types of Audits
A Sample Mean
A Cold Site
Controls
22. The party that performs strategic planning - addresses near-term and long-term requirements aligning business objectives - and technology strategies.
To identify the tasks that are responsible for project delays
WAN Protocols
Disaster Recovery
The Steering Committee
23. Used to schedule and sequence activities in a waterfall-type representation. Planned activities are shown flowing downward to completion. More simplistic than a PERT Diagram.
A Service Provider audit
Gantt Chart
Project Management Strategies
The 5 types of Evidence that the auditor will collect during an audit.
24. (1.) TCP (2.) UDP
Substantive Testing (test of transaction integrity)
Elements of the COSO pyramid
IT Service Management
Transport Layer Protocols
25. A sampling technique used to study the characteristics of a population to determine the numeric total of a specific attribute from the entire population.
Business Continuity
Variable Sampling
A Forensic Audit
TCP/IP Network Model
26. An IS auditor needs to perform an audit of a financial system and needs to trace individual transactions through the system. What type of testing should the auditor perform?
Substantive Testing
Recovery time objective
Substantive Testing (test of transaction integrity)
Employee termination process
27. (1.) Feasibility Study (2.) Definition of Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation phase
Application Layer protocols
TCP/IP Transport Layer packet delivery
Recovery time objective
SDLC Phases
28. An organization wants to reduce the number of user IDs and passwords that its employees need to remember. The best available solution to this - _______________. This provides a single authentication service (such as LDAP or AD) that many applications
Reduced sign-on
OSI Layer 6: Presentation
Foreign Key
Configuration Management
29. A large number of loosely coupled computers that are used to solve a common task may be in close proximity to each other or scattered over a large geographical area.
Grid Computing
Expected Error Rate
Power system controls
List of systems examined
30. IT Governance is most concerned with ________.
Information security policy
IT Strategy
The Business Process Life Cycle
Network Layer Protocols
31. Deliver messages from one station to another on the same network or on different networks. Messaging at this layer is not guaranteed.
Service Continuity Management
TCP/IP Internet Layer
The 5 types of Evidence that the auditor will collect during an audit.
Controls
32. A facility that is used to store and manage access to an organization's application source and object code. It consists of 5 parts: (1.) Access and authorization controls (2.) Program checkout (3.) Program Check-in (4.) Version Control (5.) Code Ana
Security Awareness program
Prblem Management
Testing activities
The Software Program Library
33. The IS auditor should act as a SME in the control self-assessment - but should not play a major role in the process.
Detection Risk
A Cold Site
Department Charters
The appropriate role of an IS auditor in a control self-assessment
34. Consists of two main packet transport protocols: TCP and UDP.
TCP/IP Transport Layer
Elements of the COBIT Framework
Concentrate on samples known to represent high risk
Judgmental sampling
35. What three elements allow validation of business practices against acceptable measures of regulatory compliance - performance - and standard operational guidelines.
Stratified Sampling
IT executives and the Board of Directors
(1.) Polices (2.) Procedures (3.) Standards
Entire password for an encryption key
36. Requires that a password be broken into two or more parts - with each part in the possession of a separate person.
The Steering Committee
TCP/IP Transport Layer
Split custody
The Internet Layer in the TCP/IP model
37. Consists of 11 distinct activities: (1.) Service Desk (2.) Incident Management (3.) Problem Management (4.) Change Management (5.) Configuration Management (6.) Release Management (7.) Service-level Management (8.) Financial Management (9.) Capacity
Registers
Dimensions of the COSO cube
Business Realization
IT Service Management
38. A collection of two or more servers that is designed to appear as a single server.
Detection Risk
Server cluster
An Operational Audit
The Eight Types of Audits
39. (1.) Operational (2.) Financial (3.) Integrated (4.) IS (5.) Administrative (6.) Compliance (7.) Forensic (8.) Service Provider
Hash
The Eight Types of Audits
Antivirus software on the email servers
Personnel involved in the requirements phase of a software development project
40. (1.) General (2.) Application
Main types of Controls
Risk Management
IT Strategy
A Forensic Audit
41. A sampling technique used to study the characteristics of a population to determine how many samples possess a specific characteristic.
Examples of Application Controls
Annualized Loss Expectance (ALE)
Attribute Sampling
An Administrative
42. A database administrator has been asked to configure a database management system so that it records all changes made by users - The DBA should implement ___________. This will cause the database to record every change that is made to it.
Main types of Controls
Audit logging
Insourcing
A Forensic Audit
43. The highest number of errors that can exist without a result being materially misstated.
Tolerable Error Rate
Gantt Chart
(1.) Man-made (2.) Natural
A Server Cluster
44. A CMM helps an organization to _______________ - which is an important first step to any large-scale process improvement effort.
Emergency Changes
Release management
Assess the maturity of its business processes
Personnel involved in the requirements phase of a software development project
45. (1.) MPLS (2.) SONET (3.) T-Carrier (4.) Frame Relay (5.) ISDN (6.) X.25
Inform the auditee
Power system controls
WAN Protocols
Organizational culture and maturity
46. The annual expected loss to an asset. It is calculated as the single loss expectancy (SLE) X the annualized rate of occurrence (ARO.)
TCP/IP Transport Layer packet delivery
Concentrate on samples known to represent high risk
Controls
Annualized Loss Expectance (ALE)
47. Must be tested to validate effectiveness through: (1.) Document Review (2.) Walkthrough (3.) Simulation (4.) Parallel testing (5.) Cutover testing practices
BCP Plans
A Financial Audit
A Virtual Server
IT Services Financial Management
48. (1.) Developers (2.) Architects (3.) Analysts (4.) Users
A Forensic Audit
Personnel involved in the requirements phase of a software development project
A Server Cluster
An Integrated Audit
49. The maximum period of downtime for a process or application
Dimensions of the COSO cube
Segregation of duties issue in a high value process
Recovery time objective
The Release process
50. An audit to determine the level and degree of compliance to a law - regulation - standard - contract provision - or internal control.
A Compliance audit
Wet pipe fire sprinkler system
Testing activities
Blade Computer Architecture