SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An auditor has detected potential fraud while testing a control objective - He should ___________________. Because Audit committee members are generally not involved in business operations - they will be sufficiently remove from the matter - and they
Notify the Audit Committee
The Release process
Statistical Sampling
Volumes of COSO framework
2. A quantitative risk analysis is __________________ because: It is difficult to get accurate figures on the frequency of specific threats. It is difficult to determine the probability that a threat will be realized. It is relatively easy to determine
Controls
OSI: Data Link Layer
Stay current with technology
More difficult to perform
3. ____________________ of the hot site is most important consideration for site selection. IF they are too close together then a single event may involve both locations
Information systems access
Precision means
Geographic location
Current and most up-to-date
4. A sampling technique where items are chosen based upon the auditor's judgment - usually based on risk or materiality.
Judgmental sampling
Audit Methodologies
Dimensions of the COSO cube
A Cold Site
5. An organization is building a data center in an area frequented by power outages. The organization cannot tolerate power outages. The best _________________solution is an electric generator and an uninterruptible power supply. The UPS responds to the
The BCP process
Power system controls
Server cluster
Registers
6. Framework for auditing and measuring IT Service Management Processes.
ISO 20000 Standard:
The 4-item focus of a Balanced Scorecard
A Financial Audit
Concentrate on samples known to represent high risk
7. What three elements allow validation of business practices against acceptable measures of regulatory compliance - performance - and standard operational guidelines.
IT executives and the Board of Directors
(1.) Polices (2.) Procedures (3.) Standards
Cloud computing
Buffers
8. Aids in the coordinating of business processes using a sequence of three events -(1.) Business process creation (2.) Implementation (3.) Maintenance 3a. Benchmarking: Facilitates continuous improvement within the BPLC
Data Link Layer Standards
The Business Process Life Cycle
Variable Sampling
Configuration Management
9. A large number of loosely coupled computers that are used to solve a common task may be in close proximity to each other or scattered over a large geographical area.
Attribute Sampling
Grid Computing
Buffers
Expected Error Rate
10. A collection of two or more servers that is designed to appear as a single server.
Server cluster
Sample Standard Deviation
Gantt Chart
Project change request
11. The risk that there are material weaknesses in existing business processes and no compensating controls to detect or prevent them
Concentrate on samples known to represent high risk
Inherent Risk
The 5 types of Evidence that the auditor will collect during an audit.
Examples of Application Controls
12. (1.) General (2.) Application
Main types of Controls
The Internet Layer in the TCP/IP model
Substantive Testing (test of transaction integrity)
Testing activities
13. (1.) Hardware Complement (physical specifications) (2.) Hardware Configuration (firmware settings) (3.) Operating system version and configuration (4.) Software versions and configuration
The typical Configuration Items in Configuration Management
Personnel involved in the requirements phase of a software development project
TCP/IP Transport Layer packet delivery
Controls
14. (1.) Observations (2.) Written Notes (3.) Correspondence (4.) Process and Procedure documentation (5.) Business records
The audit program
The 5 types of Evidence that the auditor will collect during an audit.
An Integrated Audit
Configuration Management
15. An audit of a third-party organization that provides services to other organizations.
Statistical Sampling
A Service Provider audit
Lacks specific expertise or resources to conduct an internal audit
Stratified Sampling
16. Use of a set of monitoring and review activities that confirm whether IS operations is providing service to its customers.
Personnel involved in the requirements phase of a software development project
Service Level Management
Project Management Strategies
To identify the tasks that are responsible for project delays
17. Subjective sampling is used when the auditor wants to _________________________.
Dimensions of the COSO cube
Concentrate on samples known to represent high risk
IT Service Management
Testing activities
18. Used to schedule and sequence activities in a waterfall-type representation. Planned activities are shown flowing downward to completion. More simplistic than a PERT Diagram.
less than 24 hours
Main types of Controls
Confidence coefficient
Gantt Chart
19. Contains programs that communicate directly with the end user.
OSI Layer 7: Application
Risk Management
Employee termination process
Audit logging
20. An IS auditor has discovered a high-risk exception during control testing. The best course of action for the IS auditor to take - The IS auditor should immediately ________________ when any high-risk situation is discovered.
Inform the auditee
The Requirements
Controls
Annualized Loss Expectance (ALE)
21. 0. No process at all (1.) Process are ad hoc and disorganized (2.) Consistent processes (3.) Documented processes (4.) Measured and managed processes (5.) Processes are continuously improved
Personnel involved in the requirements phase of a software development project
ISO 20000 Standard:
Lacks specific expertise or resources to conduct an internal audit
Rating Scale for Process Maturity
22. An organization has chosen to open a business office in another country where labor costs are lower and has hired workers to perform business functions there. - The organization is ___________ - while they may have opened the office in a foreign coun
Insourcing
The audit program
Entire password for an encryption key
Geographic location
23. (1.) Requirements (2.) Design (3.) Development (4.) Testing (5.) Release preparation (packaging) (6.) Release Deployment
List of systems examined
IT executives and the Board of Directors
Blade Computer Architecture
Six steps of the Release Management process
24. An IS auditor is auditing the change management process for a financial application. The auditor has two primary pieces of evidence: change logs and a written analysis of the change logs performed by a business analyst. The change log is best because
objective and unbiased
Three Types of Controls
A Sample Mean
OSI: Physical Layer
25. (1.) MPLS (2.) SONET (3.) T-Carrier (4.) Frame Relay (5.) ISDN (6.) X.25
The BCP process
A Sample Mean
Server cluster
WAN Protocols
26. IT Service Management is defined in ___________________ framework.
ITIL - IT Infrastructure Library
Categories of risk treatment
Current and most up-to-date
Configuration Management
27. A computation of the variance of sample values from the sample mean. This is a measurement of the spread of values in a sample
Organizational culture and maturity
An IS audit
Sample Standard Deviation
The Steering Committee
28. (1.) IP (2.) ICMP (3.) RRC (Radio Resource Control) (4.) AppleTalk
OSI: Network Layer
Dimensions of the COSO cube
Network Layer Protocols
Background checks performed
29. (1.) Operational (2.) Financial (3.) Integrated (4.) IS (5.) Administrative (6.) Compliance (7.) Forensic (8.) Service Provider
The 4-item focus of a Balanced Scorecard
The Eight Types of Audits
Security Awareness program
Six steps of the Release Management process
30. (1.) Executive Summary (2.) Governance and control framework (3.) Control Objectives (4.) Management Guidelines (5.) Implementation Guide (6.) IT Assurance Guide
The audit program
Overall audit risk
Lacks specific expertise or resources to conduct an internal audit
Elements of the COBIT Framework
31. A maturity model that represents the aggregations of other maturity models.
TCP/IP Network Model
Split custody
Capability Maturity Model Integration (CMMI)
Business Continuity
32. The IS auditor should conduct a risk assessment first to determine which areas have highest risk. She should devote more testing resources to those high-risk areas.
Tolerable Error Rate
Insourcing
Concentrate on samples known to represent high risk
The best approach for identifying high risk areas for an audit
33. A tightly coupled collection of computers that are used to solve a common task. One or more actively perform tasks - while zero or more may be in a standby state.
The audit program
Application Controls
Stay current with technology
A Server Cluster
34. A software developer has informed the project manager that a portion of the application development is going to take five additional days to complete. The project manager make a __________________ to document the reason for the change.
Function Point Analysis
Volumes of COSO framework
Project change request
Structural fires and transportation accidents
35. (1.) Access controls (2.) Encryption (3.) Audit logging
Primary security features of relational databases
Three Types of Controls
The BCP process
Six steps of the Release Management process
36. An auditor has discovered that several administrators in an application share an administrative account. The auditor should recommend that - Several __________________ should be used. This will enforce accountability for each administrator's actions.
Separate administrative accounts
An Administrative
ISO 20000 Standard:
A Forensic Audit
37. To review and approve proposed changes to systems and infrastructure. This helps to reduce the risk of unintended events and unplanned downtime.
Antivirus software on the email servers
CPU
Change management
Advantages of outsourcing
38. A CMM helps an organization to _______________ - which is an important first step to any large-scale process improvement effort.
Data Link Layer Standards
Assess the maturity of its business processes
OSI Layer 7: Application
TCP/IP Link Layer
39. (1.) Financial (2.) Customer (3.) Internal processes (4.) Innovation / Learning
Application Controls
Substantive Testing
Geographic location
The 4-item focus of a Balanced Scorecard
40. Guide program execution through organization of resources and development of clear project objectives.
Function Point Analysis
Information systems access
Reduced sign-on
Project Management Strategies
41. A sampling technique where a population is divided into classes or strata - based upon the value of one of the attributes. Samples are then selected from each class.
OSI Layer 5: Session
Testing activities
Stratified Sampling
Examples of IT General Controls
42. To determine effectiveness of a disaster recovery program - an IT auditor should examine _____________.
Criticality analysis
less than 24 hours
Documentation and interview personnel
ITIL definition of PROBLEM
43. Lowest layer. Delivers messages (frames) from one station to another vial local network.
Insourcing
Compliance Testing
TCP/IP Link Layer
Business impact analysis
44. The sum of all samples divided by the number of samples.
A Sample Mean
Recovery time objective
The two Categories of Controls
TCP/IP Network Model
45. (1.) Monitoring (2.) Control Environment (3.) Risk Assessment and Control (4.) Information and Communication
Elements of the COSO pyramid
A Server Cluster
BCP Plans
The Internet Layer in the TCP/IP model
46. Risk Mitigation Risk Avoidance Risk Transfer Risk Acceptance
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Sample Standard Deviation
Geographic location
Options for Risk Treatment
47. Consists of 11 distinct activities: (1.) Service Desk (2.) Incident Management (3.) Problem Management (4.) Change Management (5.) Configuration Management (6.) Release Management (7.) Service-level Management (8.) Financial Management (9.) Capacity
Categories of risk treatment
To identify the tasks that are responsible for project delays
IT Service Management
An IS audit
48. IT Governance is most concerned with ________.
IT Strategy
OSI Layer 6: Presentation
Change management
Vulnerability in the organization's PBX
49. Gantt: used to display ______________.
OSI Layer 6: Presentation
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Resource details
Separate administrative accounts
50. The process of recording the configuration of IT systems. Each configuration setting is known in ITSM parlance as a Configuration Item.
Configuration Management
Function Point Analysis
Power system controls
Employee termination process
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests