SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An audit of an IS department's operations and systems.
An IS audit
Critical Path Methodology
Stop-or-go Sampling
Current and most up-to-date
2. A sampling technique used to study the characteristics of a population to determine the numeric total of a specific attribute from the entire population.
Tolerable Error Rate
Variable Sampling
Frameworks
Change management
3. Consists of main chassis component that is equipped with slots are fitted with individual cpu modules. Main advantage is lower cost per unit.
Business impact analysis
Blade Computer Architecture
Controls
The BCP process
4. (1.) Statistical (2.) Judgmental (3.) Attribute (4.) Variable (5.) Stop-or-Go (6.) Discovery (7.) Stratified
Business impact analysis
Types of sampling an auditor can perform.
Geographic location
ITIL definition of PROBLEM
5. A critical application is backed up once per day. The recovery point objective (RPO) for an application that is backed up once per day cannot be ________.
less than 24 hours
The 4-item focus of a Balanced Scorecard
TCP/IP Network Model
Organizational culture and maturity
6. Used to schedule and sequence activities in a waterfall-type representation. Planned activities are shown flowing downward to completion. More simplistic than a PERT Diagram.
A Financial Audit
Gantt Chart
Main types of Controls
Control Risk
7. To communication security policies - procedures - and other security-related information to an organization's employees.
Security Awareness program
Annualized Loss Expectance (ALE)
A Compliance audit
Deming Cycle
8. Must be tested to validate effectiveness through: (1.) Document Review (2.) Walkthrough (3.) Simulation (4.) Parallel testing (5.) Cutover testing practices
BCP Plans
The two Categories of Controls
Elements of the COBIT Framework
Sampling Risk
9. The probability that a sample selected actually represents the entire population. This is usually expressed as a percentage.
Confidence coefficient
Control Risk
Incident Management
Sampling
10. Used for several types of system changes: (1.) Incidents and problem resolution (bug fixes.) (2.) Enhancements (new functionality.) (3.) Subsystem patches and changes (require testing similar to when changes are made to the application itself.)
The Release process
Server cluster
Sampling Risk
ITIL definition of PROBLEM
11. (1.) LAN protocols (2.) 80 (2.) 11 MAC/LLC (WiFi) (3.) Common Carrier packet networks (4.) ARP (5.) PPP and SLIP (6.) Tunneling - PPTP - L2TP
Resource details
Data Link Layer Standards
Hash
Lacks specific expertise or resources to conduct an internal audit
12. The inventory of all in-scope business processes and systems
The Eight Types of Audits
Statistical Sampling
The first step in a business impact analysis
Audit logging
13. The CPU has: (1.) Arithmetic Logic Unit (2.) ______________ (3.) a small amount of memory (usually in to form of registers)
Power system controls
Split custody
Control Unit
ITIL definition of CHANGE MANAGEMENT
14. 1.) Executive Support (2.) Well-defined roles and responsibilities.
Precision means
Server cluster
Information security policy
Tolerable Error Rate
15. Used to illustrate the relationship between planned activities. PERT diagrams show multiple routes through the project activities - as necessary for accomplishing a goal.
PERT Diagram?
WAN Protocols
Power system controls
Stratified Sampling
16. A four-step quality control process known as PDSA - or PDCA. Steps: (1.) Plan (2.) Do (3.) Study (4.) Act
Change management
Deming Cycle
Statistical Sampling
The two Categories of Controls
17. PERT: shows the ______________ critical path.
A Service Provider audit
ITIL definition of PROBLEM
An Integrated Audit
Current and most up-to-date
18. The 5 types of risks that are related to audits include: (1.) Control Risk (2.) Detection Risk (3.) Inherent risk (4.) _____________ (5.) Sampling risk
The Eight Types of Audits
Power system controls
Incident Management
Overall audit risk
19. (1.) TCP (2.) UDP
Entire password for an encryption key
An Operational Audit
Transport Layer Protocols
The appropriate role of an IS auditor in a control self-assessment
20. A facility that is used to store and manage access to an organization's application source and object code. It consists of 5 parts: (1.) Access and authorization controls (2.) Program checkout (3.) Program Check-in (4.) Version Control (5.) Code Ana
Categories of risk treatment
The 7 phases and their order in the SDLC
The Software Program Library
Server cluster
21. Consists of two main packet transport protocols: TCP and UDP.
TCP/IP Transport Layer
OSI Layer 6: Presentation
Business Realization
ITIL definition of CHANGE MANAGEMENT
22. (1.) Feasibility Study (2.) Definition of Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation phase
The 7 phases and their order in the SDLC
SDLC Phases
Server cluster
The Steering Committee
23. (1.) Reliable delivery (2.) Connection oriented (persistent connection) (3.) Order of Delivery (4.) Flow Control (transfer rate is throttled) (5.) Port Number
TCP/IP Transport Layer packet delivery
An IS audit
(1.) Man-made (2.) Natural
Service Continuity Management
24. A database term - which means that the database will not permit a program (or user) to deleted rows from a table if there are records in other tables whose foreign keys reference the row to be deleted.
Assess the maturity of its business processes
ITIL definition of PROBLEM
The Software Program Library
Referential Integrity
25. Deliver messages from one station to another on the same network or on different networks. Messaging at this layer is not guaranteed.
Resource details
TCP/IP Internet Layer
Sample Standard Deviation
Main types of Controls
26. A sampling technique used to permit sampling to stop at the earliest possible time. This technique is used when the auditor feels that there is a low risk or low rate of exceptions in the population.
Annualized Loss Expectance (ALE)
Stop-or-go Sampling
IT executives and the Board of Directors
A Problem
27. An IS auditor needs to perform an audit of a financial system and needs to trace individual transactions through the system. What type of testing should the auditor perform?
Tolerable Error Rate
Substantive Testing (test of transaction integrity)
Detection Risk
Transport Layer Protocols
28. Framework for auditing and measuring IT Service Management Processes.
Hash
Elements of the COBIT Framework
ISO 20000 Standard:
Current and most up-to-date
29. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - as the numeric inverse of the confidence coefficient.
Sampling Risk
Categories of risk treatment
Statistical Sampling
Organizational culture and maturity
30. Collections of Controls that work together to achieve an entire range of an organization's objectives.
Change management
Frameworks
The availability of IT systems
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
31. An organization has discovered that some of its employees have criminal records. The best course of action for the organization to take - The organization should have ___________________ on all of its existing employees and also begin instituting bac
Capability Maturity Model
Background checks performed
Resource details
Primary security features of relational databases
32. Who is responsible for imposing an IT governance model encompassing IT strategy - information security - and formal enterprise architectural mandates?
Stratified Sampling
Incident Management
IT executives and the Board of Directors
Personnel involved in the requirements phase of a software development project
33. Lowest layer. Delivers messages (frames) from one station to another vial local network.
less than 24 hours
Disaster Recovery
TCP/IP Link Layer
An IS audit
34. (1.) Develop a BC Policy (2.) Conduct BIA (3.) Perform critical analysis (4.) Establish recovery targets (5.) Develop recovery and continuity strategies and plans (6.) Test recovery and continuity plans and procedures Train personnel Maintain strateg
Documentation and interview personnel
Dimensions of the COSO cube
The BCP process
OSI Layer 6: Presentation
35. Support the functioning of the application controls
Application Controls
Business Realization
General Controls
IT Services Financial Management
36. An audit to determine the level and degree of compliance to a law - regulation - standard - contract provision - or internal control.
Six steps of the Release Management process
Lacks specific expertise or resources to conduct an internal audit
A Compliance audit
Attribute Sampling
37. Contains programs that communicate directly with the end user.
Types of sampling an auditor can perform.
OSI Layer 7: Application
The appropriate role of an IS auditor in a control self-assessment
Separate administrative accounts
38. An audit of an accounting system - accounting department processes - and procedures to determine if business controls are sufficient to ensure the integrity of financial statements.
Stop-or-go Sampling
Project Management Strategies
The typical Configuration Items in Configuration Management
A Financial Audit
39. Disasters are generally grouped in terms of type: ______________.
(1.) Man-made (2.) Natural
Employees with excessive privileges
A Problem
Recovery time objective
40. Used to translate or transform data from lower layers into formats that the application layer can work with.
OSI Layer 6: Presentation
SDLC Phases
Vulnerability in the organization's PBX
The first step in a business impact analysis
41. (1.) MPLS (2.) SONET (3.) T-Carrier (4.) Frame Relay (5.) ISDN (6.) X.25
WAN Protocols
Power system controls
Project Management Strategies
Examples of Application Controls
42. (1.) Hardware Complement (physical specifications) (2.) Hardware Configuration (firmware settings) (3.) Operating system version and configuration (4.) Software versions and configuration
Release management
The typical Configuration Items in Configuration Management
The best approach for identifying high risk areas for an audit
A Compliance audit
43. A technique that is used to select a portion of a population when it is not feasible to test an entire population.
Sampling
Stop-or-go Sampling
Risk Management
Annualized Loss Expectance (ALE)
44. IT Governance is most concerned with ________.
ITIL definition of PROBLEM
IT Strategy
Foreign Key
Sampling
45. Information is arranged in frames and transported across the medium. Collision detection. Checksum verification of delivery.
Critical Path Methodology
OSI: Data Link Layer
Main types of Controls
Precision means
46. What type of testing is performed to verify the accuracy and integrity of transactions as they flow through a system?
Structural fires and transportation accidents
Sampling
Substantive Testing
ITIL definition of PROBLEM
47. A programmer is updating an application that saves passwords in plaintext. In this case - Passwords should be stored in a _____. This makes it impossible for any person to retrieve a password - which could lead to account compromise.
Department Charters
Control Unit
Information systems access
Hash
48. A maturity model that represents the aggregations of other maturity models.
Personnel involved in the requirements phase of a software development project
Testing activities
Configuration Management
Capability Maturity Model Integration (CMMI)
49. An auditor has discovered several errors in user account management: many terminated employees' computer accounts are still active. The best course of action - To improve the _________________ to reduce the number of exceptions. For a time - the proc
Project Management Strategies
Employee termination process
Insourcing
Input validation checking
50. Gantt: used to display ______________.
Resource details
Audit logging
PERT Diagram?
TCP/IP Transport Layer packet delivery
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests