Certified Information Systems Auditor (CISA) Cert Guide Flashcards
All the following are required activities during the project management process in the design and development phase EXCEPT for which one?
a. Studying system flowcharts
b. Examining proposed test plans
c. Evaluating output controls
d. Examining proposed audit trails
B. Examining proposed test plans
As an auditor, how often would you say that a business continuity plan should be updated?
a. Every five years
b. Every year or as required
c. Every six months
d. Upon any change or modification
d. Upon any change or modification
As an auditor, how would you describe a penetration test in which the structure of the network is unknown and the test team has no prior knowledge of the infrastructure?
a. Double-blind
b. Blind
c. Zero proof
d. Unknown
a. Double-blind
As an IS auditor, at which step of the SDLC would you want to verify that final user acceptance is performed?
a. Design
b. Development
c. Implementation
d. Requirements
c. Implementation
As an IS auditor, which changeover process would you recommend if the requirements were that all users get up to speed in advance so that a defined changeover can be set to a fixed date?
a. Pilot changeover
b. Direct changeover
c. Phased changeover
d. Parallel changeover
b. Direct changeover
As an IS auditor, which of the following reports would you review to verify that an outsourcing or business partner has had its control objectives and activities examined by an independent accounting and auditing firm?
a. Privacy Shield
b. COBIT
c. ITIL
d. SAS 70
d. SAS 70
As the result of a recent audit, you have been asked to serve on a team that will look at recommendations to strengthen authentication. Which of the following would you recommend if single sign-on were a requirement?
a. Kerberos
b. Diameter
c. RADIUS
d. TACACS
a. Kerberos
An auditor has been asked to attend an application acquisition meeting for commercial off-the-shelf (COTS) software. Which of the following would be the BEST recommendation for testing and evaluating a compiled existing application?
a. Fuzzing
b. Code review
c. Reverse engineering
d. Decompiling
a. Fuzzing
An auditor has been asked to perform a network audit. Which of the following is the BEST place for the auditor to start?
a. Review help-desk report
b. Review database architecture
c. Interview users
d. Review network diagrams
d. Review network diagrams
A business-to-consumer e-commerce website is worried about security and has had talks about encryption. Specifically, the company would like to set up a system that can monitor, detect, and alert on hacking activity. Which of the following would BEST meet the required needs?
a. Packet filtering
b. Intrusion detection
c. Stateful inspection
d. Asymmetric cryptography
b. Intrusion detection
A decision support system should be used appropriately. A DSS is designed to do which of the following?
a. Use structured models to solve complex problems
b. Support nontraditional support activities
c. Answer rigidly structured problems
d. Answer less structured problems
d. Answer less structured problems
Dropbox can best be described as which of the following types of cloud services?
a. Public
b. Private
c. Community
d. Hybrid
a. Public
During an audit, you have been asked to review the disaster recovery and backup processes. When maintaining data backups at offsite locations, which of the following is the BEST way to control concern?
a. The storage site should be as secure as the primary site.
b. A suitable tape-rotation plan should be in use.
c. That backup media should be tested regularly.
d. That copies of current critical information should be kept offsite.
d. That copies of current critical information should be kept offsite.
During a recent physical security audit, you found several major problems. One was that the data center had one uncontrolled single-door entrance with weak access control. What double-door system would be a good recommendation in this case?
a. Honeypot
b. Mantrap
c. Turnstile
d. DMZ
b. Mantrap
During the implementation review of SDLC, which of the following BEST describes activities that should be performed?
a. Perform an ROI
b. Design the audit trail
c. Complete an entity relationship diagram
d. Perform acceptance testing
a. Perform an ROI
Entity relationship diagrams are built using two essential components. What are they?
a. Processes and attributes
b. Processes and decision blocks
c. Entities and relationships
d. Nouns and adverbs
c. Entities and relationships
From an audit perspective, which of the following would be the BEST technique to use to scan for deviations from normal activity?
a. Bypass label processing
b. Use attack detection tools
c. Use trend variance detection tools
d. Use audit reduction tools
c. Use trend variance detection tools
If an auditor cannot obtain the material needed to complete an audit, what type of opinion should the auditor issue?
a. Unqualified opinion
b. Qualified opinion
c. Adverse opinion
d. Disclaimer
d. Disclaimer
Look at the following common policy characteristics. The attribute MOST closely associated with a bottom-up policy development is that it __________.
a. aligns policy with strategy
b. is a very slow process
c. does not address concerns of employees
d. involves risk assessment
d. involves risk assessment
A new website is being designed to host free application downloads. One requirement is that there must be a method to verify the integrity of these files and that they have not been tampered with. Which of the following would you recommend?
a. DES
b. AES
c. MD5
d. RSA
c. MD5
Of the following options, which process is NOT an application system testing methodology?
a. Snapshots
b. Entity integrity
c. Mapping
d. Base case system evaluation
b. Entity integrity
Programming languages that most closely map to database management are found at what generational level?
a. 2GL
b. 3GL
c. 4GL
d. 5GL
c. 4GL
Separation of duties is one way to limit fraud and misuse. Consider the following explanation: “This control allows employees access to cash or valuables.” Of the four separation of duties controls, which one most closely matches this?
a. Authorization
b. Custody
c. Record keeping
d. Reconciliation
b. Custody
Several coworkers are using public key encryption and have asked about the advantage of asymmetric encryption. Which of the following is correct?
a. It is very efficient.
b. It can be used as part of hashing algorithms.
c. It can be used for bulk data.
d. It enables easy key exchange.
d. It enables easy key exchange.
To aid in the successful completion of the company’s first penetration test, an auditor should recommend which of the following?
a. SOX
b. NIST 800-42
c. PCI-DSS
d. SSAE-16
b. NIST 800-42
VirtualBox is an example of which of the following?
a. Type 1 hypervisor
b. Type 2 hypervisor
c. Type 3 hypervisor
d. Type 4 hypervisor
b. Type 2 hypervisor
What control is specifically used after data has been entered into a system but before it has been processed?
a. Editing
b. Sequence check
c. Balancing
d. Input authorization
b. Sequence check
What is the best way to describe the difference between a data warehouse and a data lake?
a. Data warehouses always contain customer information
b. Data warehouses always contain raw data, while data lakes always contain structure and highly processed data.
c. Data lakes always contain raw data, while data warehouses always contain structure and highly processed data.
d. There is no difference between a data warehouse and a data lake.
c. Data lakes always contain raw data, while data warehouses always contain structure and highly processed data.
What type of programming language are decision support systems most commonly developed with?
a. 2GL
b. 3GL
c. 4GL
d. 5GL
c. 4GL
When classifying critical systems, which category matches the following description: “These functions are important and can be performed by a backup manual process but not for a long period of time?”
a. Vital
b. Sensitive
c. Critical
d. Demand driven
a. Vital
When examining change management, an auditor should not be concerned with which of the following?
a. Restricted access controls.
b. Separation of duties.
c. Controls in the development environment.
d. Access to source code by developers.
d. Access to source code by developers.
When performing an audit, which of the following is the best reason to use a hot site?
a. It can be used for long- term processing.
b. It is not a subscription service.
c. There is no additional cost for using it or periodic testing. d. It is ready for service.
d. It is ready for service
When planning to add time constraints to a project, which of the following should be examined most closely?
a. Budget
b. Critical path
c. Skills of the project team
d. Tasks that require the most time
b. Critical path
When referring to electronic data interchange (EDI), which of the following statements would be most accurate?
a. EDI has no impact on internal or external controls.
b. EDI reduces internal controls.
c. EDI increases internal controls.
d. EDI has no impact on internal controls
b. EDI reduces internal controls.
When responding to a potential computer crime, what should an auditor do first?
a. Seek to identify the attacker
b. Remove the device from the network
c. Ensure that the evidence remains unchanged
d. Contact the police
c. Ensure that the evidence remains unchanged
Which of the following about PKI and the registration authority (RA) is correct?
a. The RA cannot reduce the load on the CA.
b. The RA cannot accept requests.
c. The RA cannot generate a certificate.
d. The RA cannot verify an owner’s identity.
c. The RA cannot generate a certificate
Which of the following activities would an auditor most like to see carried out on a weekly basis?
a. Penetration testing
b. Change management
c. Vulnerability assessment
d. Rotation of duties
c. Vulnerability assessment