SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. (1.) Utility (DNS - SNMP - DHCP (2.) Messaging protocols (SMTP) (3.) Data Transfer protocols (NFS - FTP) (4.) Interactive protocols (Telnet)
The availability of IT systems
Application Layer protocols
IT Strategy
Data Link Layer Standards
2. The means by which management establishes and measures processes by which organizational objectives are achieved
Controls
IT Strategy
The Software Program Library
Separate administrative accounts
3. A condition that is the result of multiple incidents that exhibit common symptoms e.g. A web application is displaying information incorrectly and many users have contacted the IT service desk.
Employee termination process
An IS audit
A Problem
An Operational Audit
4. A sampling technique where items are chosen at random; each item has a statistically equal probability of being chosen.
The typical Configuration Items in Configuration Management
Inherent Risk
TCP/IP Internet Layer
Statistical Sampling
5. The risk that a material error exists that will not be prevented or detected by the organization's control framework - The possibility that a process or procedure will be unable to prevent or deter serious errors and wrongdoing.
Control Risk
The two Categories of Controls
The Requirements
Network Layer Protocols
6. The main hardware component of a computer system - which executes instructions in computer programs.
CPU
Blade Computer Architecture
Sample Standard Deviation
Buffers
7. (1.) Executive Summary (2.) Framework (3.) Reporting to External Parties (4.) Evaluation Tools
The Business Process Life Cycle
Volumes of COSO framework
Power system controls
A Service Provider audit
8. ITIL term used to describe the SDLC.
A Service Provider audit
Release management
Sampling Risk
Change management
9. (1.) MPLS (2.) SONET (3.) T-Carrier (4.) Frame Relay (5.) ISDN (6.) X.25
WAN Protocols
The Requirements
Recovery time objective
Buffers
10. Consists of 11 distinct activities: (1.) Service Desk (2.) Incident Management (3.) Problem Management (4.) Change Management (5.) Configuration Management (6.) Release Management (7.) Service-level Management (8.) Financial Management (9.) Capacity
Criticality analysis
Incident Management
The best approach for identifying high risk areas for an audit
IT Service Management
11. What type of testing is performed to determine if control procedures have proper design and are operating properly?
Employees with excessive privileges
An Administrative
Information security policy
Compliance Testing
12. An audit report usually includes the following 10 elements: (1.) Cover letter (2.) Introduction (3.) Summary (4.) Audit description (5.) _______________ (6.) Interviewees (7.) Evidence (8.) Explanation of sampling techniques (9.) Findings (10.) Recom
List of systems examined
Recovery time objective
Sample Standard Deviation
OSI Layer 7: Application
13. An organization wants to reduce the number of user IDs and passwords that its employees need to remember. The best available solution to this - _______________. This provides a single authentication service (such as LDAP or AD) that many applications
Reduced sign-on
Power system controls
ITIL definition of PROBLEM
Formal waterfall
14. Used to illustrate the relationship between planned activities. PERT diagrams show multiple routes through the project activities - as necessary for accomplishing a goal.
PERT Diagram?
An Administrative
ITIL definition of CHANGE MANAGEMENT
Judgmental sampling
15. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - as the numeric inverse of the confidence coefficient.
Sampling Risk
Precision means
objective and unbiased
Segregation of duties issue in a high value process
16. (1.) Monitoring (2.) Control Environment (3.) Risk Assessment and Control (4.) Information and Communication
Server cluster
Elements of the COSO pyramid
WAN Protocols
TCP/IP Link Layer
17. A computer uses RAM for several purposes: (1.) Operating System - to store info regarding running processes (2.) ____________ - that are used to temporarily store information retrieved from hard disks (3.) Storage of program code (4.) Storage of prog
Separate administrative accounts
Segregation of duties issue in a high value process
Security Awareness program
Buffers
18. An auditor is examining a key management process and has found that the IT department is not following its split-custody procedure. As a result - Someone may be in possession of the _________________.
A Compliance audit
Input validation checking
Entire password for an encryption key
Stay current with technology
19. An external IS auditor has discovered a _______________________ - The external auditor can only document the finding in the audit report. An external auditor is not in a position to implement controls.
OSI Layer 5: Session
Segregation of duties issue in a high value process
Variable Sampling
Release management
20. (1.) TCP (2.) UDP
Overall audit risk
Transport Layer Protocols
Sampling Risk
ITIL definition of PROBLEM
21. (1.) Reliable delivery (2.) Connection oriented (persistent connection) (3.) Order of Delivery (4.) Flow Control (transfer rate is throttled) (5.) Port Number
objective and unbiased
TCP/IP Transport Layer packet delivery
ITIL definition of PROBLEM
Categories of risk treatment
22. (1.) Requirements (2.) Design (3.) Development (4.) Testing (5.) Release preparation (packaging) (6.) Release Deployment
An Integrated Audit
Six steps of the Release Management process
The Business Process Life Cycle
More difficult to perform
23. An estimate that expresses the percent of errors or exceptions that may exist in an entire population
The BCP process
Business Continuity
Antivirus software on the email servers
Expected Error Rate
24. An audit to determine the level and degree of compliance to a law - regulation - standard - contract provision - or internal control.
A Compliance audit
The Steering Committee
An Operational Audit
The Eight Types of Audits
25. An IS auditor is examining the IT standards document for an organization that was last reviewed two years earlier. The best course of action for the IS auditor is: Report that the ____________________________. Two years is far too long between revie
IT standards are not being reviewed often enough
Rating Scale for Process Maturity
Application Layer protocols
ITIL - IT Infrastructure Library
26. A CMM helps an organization to _______________ - which is an important first step to any large-scale process improvement effort.
Assess the maturity of its business processes
ITIL definition of CHANGE MANAGEMENT
The Business Process Life Cycle
Audit Methodologies
27. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - the numeric inverse of the confidence coefficient
Sampling Risk
Security Awareness program
The Requirements
The Internet Layer in the TCP/IP model
28. Consists of two main packet transport protocols: TCP and UDP.
Six steps of the Release Management process
Transport Layer Protocols
Information security policy
TCP/IP Transport Layer
29. A technique that is used to select a portion of a population when it is not feasible to test an entire population.
Variable Sampling
Sampling
Personnel involved in the requirements phase of a software development project
ITIL - IT Infrastructure Library
30. The probability that a sample selected actually represents the entire population. This is usually expressed as a percentage.
Entire password for an encryption key
Confidence coefficient
The first step in a business impact analysis
ITIL definition of PROBLEM
31. What type of testing is performed to verify the accuracy and integrity of transactions as they flow through a system?
Stay current with technology
Overall audit risk
Substantive Testing
An IS audit
32. A condition often identified as a result of multiple incidents that exhibit common symptoms. Problems can also be identified from a single significant incident for which the impact is significant.
Structural fires and transportation accidents
ITIL definition of PROBLEM
Stay current with technology
ITIL definition of CHANGE MANAGEMENT
33. A large number of loosely coupled computers that are used to solve a common task may be in close proximity to each other or scattered over a large geographical area.
More difficult to perform
Grid Computing
OSI Layer 7: Application
Precision means
34. Support the functioning of the application controls
General Controls
Statistical Sampling
IT Services Financial Management
Compliance Testing
35. What activity involves the identification of potential risk and the appropriate response for each threat based on impact assessment using qualitative and/or quantitative measures for an enterprise-wide risk management strategy?
A Financial Audit
Project Management Strategies
Risk Management
IT Services Financial Management
36. A facility that is used to store and manage access to an organization's application source and object code. It consists of 5 parts: (1.) Access and authorization controls (2.) Program checkout (3.) Program Check-in (4.) Version Control (5.) Code Ana
Volumes of COSO framework
A Compliance audit
The Software Program Library
Change management
37. 1.) Executive Support (2.) Well-defined roles and responsibilities.
Information security policy
IT Service Management
Dimensions of the COSO cube
Buffers
38. (1.) Financial (2.) Customer (3.) Internal processes (4.) Innovation / Learning
Cloud computing
Foreign Key
The 4-item focus of a Balanced Scorecard
Employee termination process
39. An IS auditor is auditing the change management process for a financial application. The auditor has two primary pieces of evidence: change logs and a written analysis of the change logs performed by a business analyst. The change log is best because
Configuration Management
Personnel involved in the requirements phase of a software development project
objective and unbiased
Function Point Analysis
40. A dynamically scalable and usually virtualized computing environment that is provided as a service. Clout computing services may be rented or leased so that an organization can have a scalable application without the need for supporting hardware.
Service Level Management
Cloud computing
A Financial Audit
Types of sampling an auditor can perform.
41. An active - instance of a server operating system running on a machine that is designed to house two or more such virtual servers.
The 7 phases and their order in the SDLC
Statistical Sampling
An Administrative
A Virtual Server
42. Focuses on: post-event recovery and restoration of services
Cloud computing
Resource details
Lacks specific expertise or resources to conduct an internal audit
Disaster Recovery
43. The risk that an IS auditor will overlook errors or exceptions during an audit.
Elements of the COBIT Framework
Confidence coefficient
Detection Risk
Rating Scale for Process Maturity
44. Disasters are generally grouped in terms of type: ______________.
(1.) Man-made (2.) Natural
Variable Sampling
Input validation checking
Confidence coefficient
45. To review and approve proposed changes to systems and infrastructure. This helps to reduce the risk of unintended events and unplanned downtime.
Examples of Application Controls
(1.) Polices (2.) Procedures (3.) Standards
Change management
Overall audit risk
46. The inventory of all in-scope business processes and systems
The first step in a business impact analysis
The 5 types of Evidence that the auditor will collect during an audit.
Documentation and interview personnel
IT Strategy
47. (1.) Objectives (2.) Components (3.) Business Units / Areas
Lacks specific expertise or resources to conduct an internal audit
Dimensions of the COSO cube
Network Layer Protocols
A Compliance audit
48. Used to control connections that are established between systems (1.) TCP (2.) IPC (3.) SIP (Session Initiation Protocol) (4.) RPC (Remote Procedure Call) (5.) NetBIOS
Capability Maturity Model
Attribute Sampling
OSI Layer 5: Session
Notify the Audit Committee
49. Should include 4 steps: (1.) Emergency Approval (2.) Implementation (3.) Verification (4.) Review
Split custody
Emergency Changes
The Release process
Attribute Sampling
50. The delivery of messages from one station to another via one or more networks.. Routes packets between networks.
Buffers
Main types of Controls
OSI: Network Layer
Three Types of Controls