SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An audit of IS controls - security controls - or business controls to determine control existence and effectiveness.
OSI Layer 6: Presentation
A Virtual Server
Configuration Management
An Operational Audit
2. A technique that is used to identify the most critical path in a project to understand which tasks are most likely to affect the project schedule.
Department Charters
Criticality analysis
Critical Path Methodology
The typical Configuration Items in Configuration Management
3. Subjective sampling is used when the auditor wants to _________________________.
Change management
OSI: Network Layer
Cloud computing
Concentrate on samples known to represent high risk
4. n audit strategy and plans that include: (1.) Scope (2.) Objectives (3.) Resources (4.) Procedures used to evaluation controls and processes
TCP/IP Transport Layer packet delivery
The 4-item focus of a Balanced Scorecard
The audit program
Power system controls
5. A maturity model that represents the aggregations of other maturity models.
Sample Standard Deviation
Capability Maturity Model Integration (CMMI)
List of systems examined
A gate process
6. IS auditors can _____________________ through the following means: (1.) training courses (2.) webinars (3.) ISACA chapter training events (4.) Industry conferences
Control Risk
TCP/IP Internet Layer
OSI Layer 7: Application
Stay current with technology
7. An audit of a third-party organization that provides services to other organizations.
A Service Provider audit
Control Risk
A Financial Audit
Controls
8. Must be tested to validate effectiveness through: (1.) Document Review (2.) Walkthrough (3.) Simulation (4.) Parallel testing (5.) Cutover testing practices
ITIL - IT Infrastructure Library
BCP Plans
Stratified Sampling
A Virtual Server
9. (1.) Physical (2.) Technical (4.) Administrative
Capability Maturity Model
Structural fires and transportation accidents
Elements of the COBIT Framework
Three Types of Controls
10. The highest number of errors that can exist without a result being materially misstated.
Tolerable Error Rate
Split custody
Release management
Information security policy
11. The IS auditor should act as a SME in the control self-assessment - but should not play a major role in the process.
The appropriate role of an IS auditor in a control self-assessment
Criticality analysis
Substantive Testing (test of transaction integrity)
TCP/IP Transport Layer
12. The IS auditor should conduct a risk assessment first to determine which areas have highest risk. She should devote more testing resources to those high-risk areas.
Deming Cycle
Hash
Elements of the COSO pyramid
The best approach for identifying high risk areas for an audit
13. Critical Path Methodology helps a project manager determine which activities are on a project's critical list - ________________________.
Cloud computing
Geographic location
A gate process
To identify the tasks that are responsible for project delays
14. (1.) Develop a BC Policy (2.) Conduct BIA (3.) Perform critical analysis (4.) Establish recovery targets (5.) Develop recovery and continuity strategies and plans (6.) Test recovery and continuity plans and procedures Train personnel Maintain strateg
IT Service Management
A Forensic Audit
OSI: Transport Layer
The BCP process
15. (1.) Hardware Complement (physical specifications) (2.) Hardware Configuration (firmware settings) (3.) Operating system version and configuration (4.) Software versions and configuration
Inform the auditee
Sampling
Foreign Key
The typical Configuration Items in Configuration Management
16. 1.) Executive Support (2.) Well-defined roles and responsibilities.
Personnel involved in the requirements phase of a software development project
Current and most up-to-date
Information security policy
WAN Protocols
17. A collection of two or more servers that is designed to appear as a single server.
Frameworks
A Sample Mean
A Financial Audit
Server cluster
18. Used to measure the relative maturity of an organization and its processes.
A Cold Site
Sampling Risk
Capability Maturity Model
Database primary key
19. An audit of an IS department's operations and systems.
IT Service Management
An IS audit
A Forensic Audit
WAN Protocols
20. A large number of loosely coupled computers that are used to solve a common task may be in close proximity to each other or scattered over a large geographical area.
OSI: Network Layer
To identify the tasks that are responsible for project delays
Types of sampling an auditor can perform.
Grid Computing
21. A sampling technique where items are chosen at random; each item has a statistically equal probability of being chosen.
An Operational Audit
General Controls
Statistical Sampling
Network Layer Protocols
22. Gantt: used to display ______________.
A Virtual Server
Resource details
The availability of IT systems
Stratified Sampling
23. Governed by: (1.) Effective Change Management (2.) Effective Application Testing (3.) Resilient Architecture (4.) Serviceable Components
Resource details
The availability of IT systems
OSI: Transport Layer
Employee termination process
24. (1.) Reliable delivery (2.) Connection oriented (persistent connection) (3.) Order of Delivery (4.) Flow Control (transfer rate is throttled) (5.) Port Number
The Requirements
Rating Scale for Process Maturity
Formal waterfall
TCP/IP Transport Layer packet delivery
25. (1.) Executive Summary (2.) Framework (3.) Reporting to External Parties (4.) Evaluation Tools
Options for Risk Treatment
Volumes of COSO framework
Reduced sign-on
The appropriate role of an IS auditor in a control self-assessment
26. An IS auditor is auditing the change management process for a financial application. The auditor has two primary pieces of evidence: change logs and a written analysis of the change logs performed by a business analyst. The change log is best because
WAN Protocols
Input validation checking
SDLC Phases
objective and unbiased
27. An auditor has discovered several errors in user account management: many terminated employees' computer accounts are still active. The best course of action - To improve the _________________ to reduce the number of exceptions. For a time - the proc
General Controls
less than 24 hours
Employee termination process
The 5 types of Evidence that the auditor will collect during an audit.
28. An organization wants to reduce the number of user IDs and passwords that its employees need to remember. The best available solution to this - _______________. This provides a single authentication service (such as LDAP or AD) that many applications
Variable Sampling
Server cluster
Reduced sign-on
Blade Computer Architecture
29. An IS auditor is examining the IT standards document for an organization that was last reviewed two years earlier. The best course of action for the IS auditor is: Report that the ____________________________. Two years is far too long between revie
Variable Sampling
The Steering Committee
IT standards are not being reviewed often enough
Capability Maturity Model
30. The delivery of messages from one station to another via one or more networks.. Routes packets between networks.
Stop-or-go Sampling
Power system controls
Risk Management
OSI: Network Layer
31. What type of testing is performed to determine if control procedures have proper design and are operating properly?
Compliance Testing
Business impact analysis
A Virtual Server
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
32. (1.) Automatic (2.) Manual
The two Categories of Controls
An Operational Audit
OSI Layer 6: Presentation
Statistical Sampling
33. Focuses on: maintaining service availability with the least disruption to standard operating parameters during an event
Discovery Sampling
Categories of risk treatment
less than 24 hours
Business Continuity
34. A sampling technique where a population is divided into classes or strata - based upon the value of one of the attributes. Samples are then selected from each class.
Precision means
Stratified Sampling
Elements of the COBIT Framework
Types of sampling an auditor can perform.
35. What activity involves the identification of potential risk and the appropriate response for each threat based on impact assessment using qualitative and/or quantitative measures for an enterprise-wide risk management strategy?
Types of sampling an auditor can perform.
Elements of the COSO pyramid
Foreign Key
Risk Management
36. A dynamically scalable and usually virtualized computing environment that is provided as a service. Clout computing services may be rented or leased so that an organization can have a scalable application without the need for supporting hardware.
Information security policy
Release management
Transport Layer Protocols
Cloud computing
37. The risk that there are material weaknesses in existing business processes and no compensating controls to detect or prevent them
Testing activities
Employees with excessive privileges
Substantive Testing (test of transaction integrity)
Inherent Risk
38. (1.) Monitoring (2.) Control Environment (3.) Risk Assessment and Control (4.) Information and Communication
Buffers
Prblem Management
Elements of the COSO pyramid
A Cold Site
39. Used to determine which business processes are the most critical - by ranking them in order of criticality
Release management
The appropriate role of an IS auditor in a control self-assessment
OSI Layer 6: Presentation
Criticality analysis
40. A representation of how closely a sample represents an entire population.
Precision means
More difficult to perform
Sampling Risk
Documentation and interview personnel
41. A sampling technique where at least one exception is sought in a population
A Cold Site
Information systems access
The Internet Layer in the TCP/IP model
Discovery Sampling
42. An audit report usually includes the following 10 elements: (1.) Cover letter (2.) Introduction (3.) Summary (4.) Audit description (5.) _______________ (6.) Interviewees (7.) Evidence (8.) Explanation of sampling techniques (9.) Findings (10.) Recom
An IS audit
Segregation of duties issue in a high value process
The BCP process
List of systems examined
43. The primary source for test plans in a software development project is: ________________ that are developed for a project should be the primary source for detailed tests.
The 4-item focus of a Balanced Scorecard
The Requirements
Prblem Management
Dimensions of the COSO cube
44. Guide program execution through organization of resources and development of clear project objectives.
Notify the Audit Committee
Project Management Strategies
Inform the auditee
Options for Risk Treatment
45. The inventory of all in-scope business processes and systems
Primary security features of relational databases
OSI Layer 7: Application
The first step in a business impact analysis
Sample Standard Deviation
46. The probability that a sample selected actually represents the entire population. This is usually expressed as a percentage.
Advantages of outsourcing
Prblem Management
Confidence coefficient
The Release process
47. A facility that is used to store and manage access to an organization's application source and object code. It consists of 5 parts: (1.) Access and authorization controls (2.) Program checkout (3.) Program Check-in (4.) Version Control (5.) Code Ana
Sampling
Business impact analysis
The Software Program Library
An Integrated Audit
48. A sampling technique used to study the characteristics of a population to determine how many samples possess a specific characteristic.
A Forensic Audit
Statistical Sampling
Attribute Sampling
A gate process
49. The purpose of an auditor doing interviews - To observe personnel to better understand their discipline - as well as ______________.
Sampling
Organizational culture and maturity
TCP/IP Network Model
Statement of Impact
50. (1.) TCP (2.) UDP
Primary security features of relational databases
Transport Layer Protocols
Reduced sign-on
TCP/IP Network Model