SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. (1.) TCP (2.) UDP
Antivirus software on the email servers
Capability Maturity Model
Transport Layer Protocols
A Compliance audit
2. The highest number of errors that can exist without a result being materially misstated.
Tolerable Error Rate
Audit logging
Elements of the COSO pyramid
Frameworks
3. A quantitative risk analysis is __________________ because: It is difficult to get accurate figures on the frequency of specific threats. It is difficult to determine the probability that a threat will be realized. It is relatively easy to determine
More difficult to perform
General Controls
Business Realization
The BCP process
4. An auditor is examining a key management process and has found that the IT department is not following its split-custody procedure. As a result - Someone may be in possession of the _________________.
Entire password for an encryption key
TCP/IP Network Model
Referential Integrity
Business Continuity
5. The purpose of an auditor doing interviews - To observe personnel to better understand their discipline - as well as ______________.
Recovery time objective
Organizational culture and maturity
IT Service Management
Data Link Layer Standards
6. (1.) Executive Summary (2.) Governance and control framework (3.) Control Objectives (4.) Management Guidelines (5.) Implementation Guide (6.) IT Assurance Guide
Elements of the COBIT Framework
Referential Integrity
Assess the maturity of its business processes
Vulnerability in the organization's PBX
7. (1.) Developers (2.) Architects (3.) Analysts (4.) Users
Examples of IT General Controls
Personnel involved in the requirements phase of a software development project
Statement of Impact
Precision means
8. (1.) Utility (DNS - SNMP - DHCP (2.) Messaging protocols (SMTP) (3.) Data Transfer protocols (NFS - FTP) (4.) Interactive protocols (Telnet)
Entire password for an encryption key
Expected Error Rate
Application Layer protocols
Transport Layer Protocols
9. To determine effectiveness of a disaster recovery program - an IT auditor should examine _____________.
Insourcing
IT executives and the Board of Directors
Judgmental sampling
Documentation and interview personnel
10. An organization is building a data center in an area frequented by power outages. The organization cannot tolerate power outages. The best _________________solution is an electric generator and an uninterruptible power supply. The UPS responds to the
Antivirus software on the email servers
Vulnerability in the organization's PBX
Configuration Management
Power system controls
11. A critical application is backed up once per day. The recovery point objective (RPO) for an application that is backed up once per day cannot be ________.
Hash
Stop-or-go Sampling
Stay current with technology
less than 24 hours
12. (1.) Access controls (2.) Encryption (3.) Audit logging
Primary security features of relational databases
Registers
BCP Plans
Substantive Testing (test of transaction integrity)
13. During the development phase - Developers should only be performing Unit Testing - to verify that the individual sections of code they have written are performing properly.
Hash
Network Layer Protocols
Testing activities
Insourcing
14. An organization wants to reduce the number of user IDs and passwords that its employees need to remember. The best available solution to this - _______________. This provides a single authentication service (such as LDAP or AD) that many applications
Wet pipe fire sprinkler system
Reduced sign-on
The Requirements
Attribute Sampling
15. n audit strategy and plans that include: (1.) Scope (2.) Objectives (3.) Resources (4.) Procedures used to evaluation controls and processes
Employee termination process
OSI Layer 7: Application
PERT Diagram?
The audit program
16. A sampling technique used to study the characteristics of a population to determine how many samples possess a specific characteristic.
Precision means
Attribute Sampling
An IS audit
Statement of Impact
17. Used to illustrate the relationship between planned activities. PERT diagrams show multiple routes through the project activities - as necessary for accomplishing a goal.
An Integrated Audit
PERT Diagram?
The best approach for identifying high risk areas for an audit
A Cold Site
18. Delivery of packets from one station to another - on the same network or on different networks.
The Internet Layer in the TCP/IP model
Insourcing
Capability Maturity Model
Types of sampling an auditor can perform.
19. A maturity model that represents the aggregations of other maturity models.
Capability Maturity Model Integration (CMMI)
Attribute Sampling
The Requirements
The Software Program Library
20. An audit that is performed in support of an anticipated or active legal proceeding.
A Forensic Audit
The Software Program Library
Reduced sign-on
Referential Integrity
21. Used for several types of system changes: (1.) Incidents and problem resolution (bug fixes.) (2.) Enhancements (new functionality.) (3.) Subsystem patches and changes (require testing similar to when changes are made to the application itself.)
Notify the Audit Committee
Discovery Sampling
The Release process
IT executives and the Board of Directors
22. The delivery of messages from one station to another via one or more networks.. Routes packets between networks.
ITIL definition of PROBLEM
OSI: Network Layer
Judgmental sampling
Concentrate on samples known to represent high risk
23. Information is arranged in frames and transported across the medium. Collision detection. Checksum verification of delivery.
Business impact analysis
Configuration Management
OSI: Data Link Layer
Release management
24. An IS auditor has discovered a high-risk exception during control testing. The best course of action for the IS auditor to take - The IS auditor should immediately ________________ when any high-risk situation is discovered.
Discovery Sampling
Inform the auditee
A Sample Mean
Service Continuity Management
25. Aids in the coordinating of business processes using a sequence of three events -(1.) Business process creation (2.) Implementation (3.) Maintenance 3a. Benchmarking: Facilitates continuous improvement within the BPLC
Transport Layer Protocols
Information systems access
The Business Process Life Cycle
Deming Cycle
26. Risk Mitigation Risk Avoidance Risk Transfer Risk Acceptance
Options for Risk Treatment
A Financial Audit
An Administrative
TCP/IP Transport Layer
27. The IS auditor should act as a SME in the control self-assessment - but should not play a major role in the process.
The appropriate role of an IS auditor in a control self-assessment
Organizational culture and maturity
Balanced Scorecard
IT Service Management
28. The 5 types of risks that are related to audits include: (1.) Control Risk (2.) Detection Risk (3.) Inherent risk (4.) _____________ (5.) Sampling risk
IT Service Management
Overall audit risk
Categories of risk treatment
Inherent Risk
29. The process to ensure that standardized methods and procedures are used for efficient and prompt handling of all changes.
Compliance Testing
ITIL definition of CHANGE MANAGEMENT
A Financial Audit
Inform the auditee
30. Contains programs that communicate directly with the end user.
ITIL definition of CHANGE MANAGEMENT
OSI: Data Link Layer
Incident Management
OSI Layer 7: Application
31. 1.) Executive Support (2.) Well-defined roles and responsibilities.
Discovery Sampling
Information security policy
Substantive Testing (test of transaction integrity)
Cloud computing
32. One of a database table's fields - whose value is unique.
IT Service Management
Three Types of Controls
Database primary key
Assess the maturity of its business processes
33. Define 10 elements of an Audit - (1.) Subject of audit (2.) Audit Objective (3.) Type of audit (4.) Audit scope (5.) Pre-audit planning (6.) Audit procedures (7.) Communication plan (8.) Report Preparation (9.) Wrap-up (10.) Post-audit follow-up
Audit Methodologies
Expected Error Rate
Recovery time objective
IT Service Management
34. The maximum period of downtime for a process or application
Recovery time objective
Types of sampling an auditor can perform.
Sample Standard Deviation
Precision means
35. An external IS auditor has discovered a _______________________ - The external auditor can only document the finding in the audit report. An external auditor is not in a position to implement controls.
Categories of risk treatment
Project Management Strategies
TCP/IP Transport Layer
Segregation of duties issue in a high value process
36. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - the numeric inverse of the confidence coefficient
Primary security features of relational databases
The appropriate role of an IS auditor in a control self-assessment
Sampling Risk
The audit program
37. To review and approve proposed changes to systems and infrastructure. This helps to reduce the risk of unintended events and unplanned downtime.
Categories of risk treatment
Sampling
A gate process
Change management
38. A computation of the variance of sample values from the sample mean. This is a measurement of the spread of values in a sample
Sample Standard Deviation
Security Awareness program
Precision means
CPU
39. The first major task in a disaster recovery or business continuity planning project.
Sampling
Business impact analysis
OSI Layer 5: Session
Cloud computing
40. Used to schedule and sequence activities in a waterfall-type representation. Planned activities are shown flowing downward to completion. More simplistic than a PERT Diagram.
Substantive Testing
Statement of Impact
Tolerable Error Rate
Gantt Chart
41. The primary source for test plans in a software development project is: ________________ that are developed for a project should be the primary source for detailed tests.
The Requirements
Wet pipe fire sprinkler system
A Virtual Server
Inform the auditee
42. An organization that has experienced a sudden increase in its long-distance charges has asked an auditor to investigate. The auditor is most likely to suspect that intruders have discovered a ______________________and is committing toll fraud.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
43. External auditors are needed under these conditions: (1.) When the organization ________________________. (2.) Some regulations and standards require external - independent auditors
Foreign Key
Lacks specific expertise or resources to conduct an internal audit
Substantive Testing (test of transaction integrity)
Tolerable Error Rate
44. Requires that a password be broken into two or more parts - with each part in the possession of a separate person.
Split custody
A Service Provider audit
Rating Scale for Process Maturity
Business Continuity
45. A tightly coupled collection of computers that are used to solve a common task. One or more actively perform tasks - while zero or more may be in a standby state.
Statement of Impact
Sampling
A Server Cluster
Testing activities
46. (1.) Reliable delivery (2.) Connection oriented (persistent connection) (3.) Order of Delivery (4.) Flow Control (transfer rate is throttled) (5.) Port Number
Data Link Layer Standards
Function Point Analysis
TCP/IP Transport Layer packet delivery
Documentation and interview personnel
47. Must be tested to validate effectiveness through: (1.) Document Review (2.) Walkthrough (3.) Simulation (4.) Parallel testing (5.) Cutover testing practices
Power system controls
Employee termination process
BCP Plans
A Cold Site
48. (1.) Observations (2.) Written Notes (3.) Correspondence (4.) Process and Procedure documentation (5.) Business records
Prblem Management
Concentrate on samples known to represent high risk
The 5 types of Evidence that the auditor will collect during an audit.
Application Layer protocols
49. What type of testing is performed to verify the accuracy and integrity of transactions as they flow through a system?
Substantive Testing
A Sample Mean
Testing activities
Transport Layer Protocols
50. A software developer has informed the project manager that a portion of the application development is going to take five additional days to complete. The project manager make a __________________ to document the reason for the change.
Project change request
less than 24 hours
The Business Process Life Cycle
ITIL - IT Infrastructure Library
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests