Certified Information Systems Auditor (CISA) Cert Guide Flashcards

1
Q

All the following are required activities during the project management process in the design and development phase EXCEPT for which one?

a. Studying system flowcharts
b. Examining proposed test plans
c. Evaluating output controls
d. Examining proposed audit trails

A

B. Examining proposed test plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

As an auditor, how often would you say that a business continuity plan should be updated?

a. Every five years
b. Every year or as required
c. Every six months
d. Upon any change or modification

A

d. Upon any change or modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

As an auditor, how would you describe a penetration test in which the structure of the network is unknown and the test team has no prior knowledge of the infrastructure?

a. Double-blind
b. Blind
c. Zero proof
d. Unknown

A

a. Double-blind

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

As an IS auditor, at which step of the SDLC would you want to verify that final user acceptance is performed?

a. Design
b. Development
c. Implementation
d. Requirements

A

c. Implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

As an IS auditor, which changeover process would you recommend if the requirements were that all users get up to speed in advance so that a defined changeover can be set to a fixed date?

a. Pilot changeover
b. Direct changeover
c. Phased changeover
d. Parallel changeover

A

b. Direct changeover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

As an IS auditor, which of the following reports would you review to verify that an outsourcing or business partner has had its control objectives and activities examined by an independent accounting and auditing firm?

a. Privacy Shield
b. COBIT
c. ITIL
d. SAS 70

A

d. SAS 70

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

As the result of a recent audit, you have been asked to serve on a team that will look at recommendations to strengthen authentication. Which of the following would you recommend if single sign-on were a requirement?

a. Kerberos
b. Diameter
c. RADIUS
d. TACACS

A

a. Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An auditor has been asked to attend an application acquisition meeting for commercial off-the-shelf (COTS) software. Which of the following would be the BEST recommendation for testing and evaluating a compiled existing application?

a. Fuzzing
b. Code review
c. Reverse engineering
d. Decompiling

A

a. Fuzzing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An auditor has been asked to perform a network audit. Which of the following is the BEST place for the auditor to start?

a. Review help-desk report
b. Review database architecture
c. Interview users
d. Review network diagrams

A

d. Review network diagrams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A business-to-consumer e-commerce website is worried about security and has had talks about encryption. Specifically, the company would like to set up a system that can monitor, detect, and alert on hacking activity. Which of the following would BEST meet the required needs?

a. Packet filtering
b. Intrusion detection
c. Stateful inspection
d. Asymmetric cryptography

A

b. Intrusion detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A decision support system should be used appropriately. A DSS is designed to do which of the following?

a. Use structured models to solve complex problems
b. Support nontraditional support activities
c. Answer rigidly structured problems
d. Answer less structured problems

A

d. Answer less structured problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Dropbox can best be described as which of the following types of cloud services?

a. Public
b. Private
c. Community
d. Hybrid

A

a. Public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

During an audit, you have been asked to review the disaster recovery and backup processes. When maintaining data backups at offsite locations, which of the following is the BEST way to control concern?

a. The storage site should be as secure as the primary site.
b. A suitable tape-rotation plan should be in use.
c. That backup media should be tested regularly.
d. That copies of current critical information should be kept offsite.

A

d. That copies of current critical information should be kept offsite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

During a recent physical security audit, you found several major problems. One was that the data center had one uncontrolled single-door entrance with weak access control. What double-door system would be a good recommendation in this case?

a. Honeypot
b. Mantrap
c. Turnstile
d. DMZ

A

b. Mantrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

During the implementation review of SDLC, which of the following BEST describes activities that should be performed?

a. Perform an ROI
b. Design the audit trail
c. Complete an entity relationship diagram
d. Perform acceptance testing

A

a. Perform an ROI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Entity relationship diagrams are built using two essential components. What are they?

a. Processes and attributes
b. Processes and decision blocks
c. Entities and relationships
d. Nouns and adverbs

A

c. Entities and relationships

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

From an audit perspective, which of the following would be the BEST technique to use to scan for deviations from normal activity?

a. Bypass label processing
b. Use attack detection tools
c. Use trend variance detection tools
d. Use audit reduction tools

A

c. Use trend variance detection tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

If an auditor cannot obtain the material needed to complete an audit, what type of opinion should the auditor issue?

a. Unqualified opinion
b. Qualified opinion
c. Adverse opinion
d. Disclaimer

A

d. Disclaimer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Look at the following common policy characteristics. The attribute MOST closely associated with a bottom-up policy development is that it __________.

a. aligns policy with strategy
b. is a very slow process
c. does not address concerns of employees
d. involves risk assessment

A

d. involves risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A new website is being designed to host free application downloads. One requirement is that there must be a method to verify the integrity of these files and that they have not been tampered with. Which of the following would you recommend?

a. DES
b. AES
c. MD5
d. RSA

A

c. MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Of the following options, which process is NOT an application system testing methodology?

a. Snapshots
b. Entity integrity
c. Mapping
d. Base case system evaluation

A

b. Entity integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Programming languages that most closely map to database management are found at what generational level?

a. 2GL
b. 3GL
c. 4GL
d. 5GL

A

c. 4GL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Separation of duties is one way to limit fraud and misuse. Consider the following explanation: “This control allows employees access to cash or valuables.” Of the four separation of duties controls, which one most closely matches this?

a. Authorization
b. Custody
c. Record keeping
d. Reconciliation

A

b. Custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Several coworkers are using public key encryption and have asked about the advantage of asymmetric encryption. Which of the following is correct?

a. It is very efficient.
b. It can be used as part of hashing algorithms.
c. It can be used for bulk data.
d. It enables easy key exchange.

A

d. It enables easy key exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

To aid in the successful completion of the company’s first penetration test, an auditor should recommend which of the following?

a. SOX
b. NIST 800-42
c. PCI-DSS
d. SSAE-16

A

b. NIST 800-42

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

VirtualBox is an example of which of the following?

a. Type 1 hypervisor
b. Type 2 hypervisor
c. Type 3 hypervisor
d. Type 4 hypervisor

A

b. Type 2 hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What control is specifically used after data has been entered into a system but before it has been processed?

a. Editing
b. Sequence check
c. Balancing
d. Input authorization

A

b. Sequence check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the best way to describe the difference between a data warehouse and a data lake?

a. Data warehouses always contain customer information
b. Data warehouses always contain raw data, while data lakes always contain structure and highly processed data.
c. Data lakes always contain raw data, while data warehouses always contain structure and highly processed data.
d. There is no difference between a data warehouse and a data lake.

A

c. Data lakes always contain raw data, while data warehouses always contain structure and highly processed data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What type of programming language are decision support systems most commonly developed with?

a. 2GL
b. 3GL
c. 4GL
d. 5GL

A

c. 4GL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

When classifying critical systems, which category matches the following description: “These functions are important and can be performed by a backup manual process but not for a long period of time?”

a. Vital
b. Sensitive
c. Critical
d. Demand driven

A

a. Vital

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

When examining change management, an auditor should not be concerned with which of the following?

a. Restricted access controls.
b. Separation of duties.
c. Controls in the development environment.
d. Access to source code by developers.

A

d. Access to source code by developers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

When performing an audit, which of the following is the best reason to use a hot site?

a. It can be used for long- term processing.
b. It is not a subscription service.
c. There is no additional cost for using it or periodic testing. d. It is ready for service.

A

d. It is ready for service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

When planning to add time constraints to a project, which of the following should be examined most closely?

a. Budget
b. Critical path
c. Skills of the project team
d. Tasks that require the most time

A

b. Critical path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

When referring to electronic data interchange (EDI), which of the following statements would be most accurate?

a. EDI has no impact on internal or external controls.
b. EDI reduces internal controls.
c. EDI increases internal controls.
d. EDI has no impact on internal controls

A

b. EDI reduces internal controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

When responding to a potential computer crime, what should an auditor do first?

a. Seek to identify the attacker
b. Remove the device from the network
c. Ensure that the evidence remains unchanged
d. Contact the police

A

c. Ensure that the evidence remains unchanged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which of the following about PKI and the registration authority (RA) is correct?

a. The RA cannot reduce the load on the CA.
b. The RA cannot accept requests.
c. The RA cannot generate a certificate.
d. The RA cannot verify an owner’s identity.

A

c. The RA cannot generate a certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which of the following activities would an auditor most like to see carried out on a weekly basis?

a. Penetration testing
b. Change management
c. Vulnerability assessment
d. Rotation of duties

A

c. Vulnerability assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which of the following best describes a balanced scorecard?

a. Used for benchmarking a preferred level of service
b. Used to measure the effectiveness of IT services by customers and clients
c. Used to verify that the organization’s strategy and IT services match
d. Used to measure the evaluation of help desk employees

A

c. Used to verify that the organization’s strategy and IT services match

39
Q

Which of the following best describes a baseline document?

a. A PCI industry standard requiring a 15-minute session timeout
b. Installation step recommendations from the vendor for an Active Directory server
c. A network topography diagram of the Active Directory forest
d. Security configuration settings for an Active Directory server

A

d. Security configuration settings for an Active Directory server

40
Q

Which of the following best describes integrated auditing?

a. Integrated auditing places internal control in the hands of management and reduces the time between the audit and the time of reporting.
b. Integrated auditing combines the operational audit function, the financial audit function, and the IS audit function.
c. Integrated auditing combines the operational audit function and the IS audit function.
d. Integrated auditing combines the financial audit function and the IS audit function

A

b. Integrated auditing combines the operational audit function, the financial audit function, and the IS audit function.

41
Q

Which of the following best describes risk that can be caused by the failure of internal controls and can result in a material error?

a. Residual risk
b. Inherent risk
c. Detection risk
d. Control risk

A

d. Control risk

42
Q

Which of the following best describes types of questions that might be on the CISA exam related to how to implement specific risk types discussed in this chapter?

a. Task statements
b. Operational audits
c. Knowledge statements
d. Integrated audits

A

a. Task statements

43
Q

Which of the following best matches the description of a packet-switching technology with a committed information rate?

a. T1
b. ATM
c. X.25
d. Frame Relay

A

d. Frame Relay

44
Q

Which of the following combinations of two job roles can be combined to create
the least amount of risk or opportunity for malicious acts?

a. Systems analyst and quality assurance
b. Computer operator and systems programmer
c. Security administrator and application programmer
d. Database administrator and systems analyst

A

d. Database administrator and systems analyst

45
Q

Which of the following could be considered an issue with SNMP?

a. Hard to configure
b. Cleartext transfer
c. Considered outdated
d. Only useful with printers

A

b. Cleartext transfer

46
Q

Which of the following
data classification standards is the lowest level of the military classification?

a. Public
b. Unclassified
c. Sensitive
d. Available

A

b. Unclassified

47
Q

Which of the following
describes a significant level of risk that the organization is unwilling to accept?

a. Detection risk
b. Material risk
c. Business risk
d. Irregularities

A

b. Material risk

48
Q

Which of the following
development methods is known to not work well for large projects?

a. Spiral model
b. Rapid application development
c. Scrum
d. Extreme programming

A

d. Extreme programming

49
Q

Which of the following
development techniques uses short cycles, referred to as sprints, and is focused on object-oriented technology?

a. Spiral model
b. Rapid application development
c. Scrum
d. Extreme programming

A

c. Scrum

50
Q

Which of the following devices would best be suited for reducing the number of collisions on a LAN?

a. Switch
b. Hub
c. Bridge
d. Router

A

a. Switch

51
Q

Which of the following does the PERT weighted average consider?

a. High cost, low cost, and best cost
b. Average cost plus 5%
c. Best time, worst time, and average time
d. Average time plus 5%

A

c. Best time, worst time, and average time

52
Q

Which of the following is a continuous auditing technique that detects items that meet specific criteria?

a. Audit hooks
b. Snapshots
c. Integrated test facilities
d. Continuous and intermittent simulation

A

a. Audit hooks

53
Q

Which of the following is a control document that describes a software improvement process characterized by five levels, where each level describes a higher level of maturity?

a. ISO 17799
b. CMM
c. COSO
d. COBIT

A

b. CMM

54
Q

Which of the following is a fiber- optic cable standard?

a. 1000BASE-TX
b. 1000BASE-LX
c. 10BASE-T
d. 100BASE-TX

A

b. 1000BASE-LX

55
Q

Which of the following is a growing alternative to encryption and can help ensure compliance with regulatory requirements in a cloud environment?

a. Random numbers
b. Tokenization
c. Cookies
d. User ID

A

b. Tokenization

56
Q

Which of the following is an example of data transmission to a group of devices on a LAN?

a. Unicast
b. Multicast
c. Anycast
d. Broadcast

A

b. Multicast

57
Q

Which of the following is not a benefit of CSA?

a. Provides early detection of risks
b. Reduces potential audit costs
c. Increases employee awareness of internal controls
d. Can be used to avoid a regulator audit

A

d. Can be used to avoid a regulator audit

58
Q

Which of the following is not an advantage of control self-assessment (CSA)?

a. CSA helps provide early detection of risks.
b. CSA is an audit function replacement.
c. CSA reduces control costs.
d. CSA provides increased levels of assurance.

A

b. CSA is an audit function replacement.

59
Q

Which of the following is not a valid BCP test type?

a. Paper test
b. Structured walk- through
c. Full operation test
d. Preparedness test

A

b. Structured walk- through

60
Q

Which of the following is not one of the best techniques for gathering evidence during an audit?

a. Attend board meetings
b. Examine and review actual procedures and processes
c. Verify employee security awareness training and knowledge
d. Examine reporting relationships to verify segregation of duties

A

a. Attend board meetings

61
Q

Which of the following is the best example of a method to measure latency?

a. SNMP management tool
b. ping command
c. traceroute
d. RMON

A

b. ping command

62
Q

Which of the following is the best example of general control procedures?

a. Internal accounting controls used to safeguard financial records
b. Business continuity and disaster-recovery procedures that provide reasonable assurance that the organization is secure against disasters
c. Procedures that provide reasonable assurance for the control of access to data and programs
d. Procedures that provide reasonable assurance and have been developed to control and manage data-processing operations

A

a. Internal accounting controls used to safeguard financial records

63
Q

Which of the following is the best explanation of ARP?

a. ARP resolves known domain names to unknown IP addresses.
b. ARP resolves known IP addresses to unknown MAC addresses.
c. ARP resolves known IP addresses to unknown domain names.
d. ARP resolves known MAC addresses to unknown IP addresses.

A

b. ARP resolves known IP addresses to unknown MAC addresses.

64
Q

Which of the following is the greatest advantage of JBOD?

a. In case of drive failure, only the data on the affected drive is lost.
b. It is superior to disk mirroring.
c. It offers greater performance gains than RAID.
d. It offers greater fault tolerance than RAID.

A

a. In case of drive failure, only the data on the affected drive is lost.

65
Q

Which of the following is the highest priority for an Auditor?

a. Designing and implementing security controls
b. Reviewing new policies and procedures
c. Controlling and monitoring data security and policies
d. Controlling and monitoring IDS and firewall activity

A

c. Controlling and monitoring data security and policies

66
Q

Which of the following is the most accurate description of a substantive test in which the data represents fake entities such as products, items, or departments?

a. Parallel tests
b. Integrated test facility
c. Embedded audit module
d. Test data

A

b. Integrated test facility

67
Q

Which of the following is the most common implementation of n-tier?

a. Workstation and server
b. LAMP stack
c. Workstation and cloud
d. Workstation, server, and database

A

d. Workstation, server, and database

68
Q

Which of the following is the most important purpose of BIA?

a. Identifying countermeasures
b. Prioritizing critical systems
c. Developing recovery strategies
d. Determining potential test strategies

A

b. Prioritizing critical systems

69
Q

Which of the following is the practice of routing traffic through different cable facilities?

a. Alternate routing
b. Long-haul diversity
c. Diverse routing
d. Last-mile protection

A

c. Diverse routing

70
Q

Which of the following is the proper order for the OSI model layers, from the bottom up?

a. Data link, media access, network, transport, session, presentation, application
b. Physical, data link, network, transport, session, presentation, application
c. Physical, data link, network, transport, presentation, session, application
d. Data link, physical link, network, transport, presentation, session, application

A

b. Physical, data link, network, transport, session, presentation, application

71
Q

Which of the following must be performed on a device running Wireshark for it to see all traffic at the network interface?

a. The switch port must be mirrored.
b. The device must be placed in promiscuous mode.
c. The NIC must be modified.
d. All traffic is accessible by default

A

b. The device must be placed in promiscuous mode.

72
Q

Which of the following must be performed on the switch for a device running Wireshark for it to see all network traffic?

a. The switch port must be mirrored.
b. The switch must be placed in promiscuous mode.
c. The NIC must be modified.
d. All traffic is accessible by default.

A

a. The switch port must be mirrored.

73
Q

Which of the following network designs offers the highest level of redundancy?

a. Bus
b. Star
c. Ring
d. Mesh

A

d. Mesh

74
Q

Which of the following processes is most critical in terms of revenue generation?

a. Discretionary
b. Supporting
c. Core
d. Critical

A

c. Core

75
Q

Which of the following roles is a role whose duties should not be fulfilled by a network administrator?

a. Quality assurance
b. Systems administrator
c. Application programmer
d. Systems analyst

A

c. Application programmer

76
Q

Which of the following should be the primary objective when using tape backup as a recovery strategy?

a. That the RPO is high
b. That the RPO is low
c. That the RTO is low
d. That fault tolerance is low

A

b. That the RPO is low

77
Q

Which of the following should have priority on the planning and scoping of an IS audit?

a. Company standards
b. Organization’s master plan
c. Regulatory requirements
d. Industry best practices

A

c. Regulatory requirements

78
Q

Which of the following statements best describes packet switching?

a. Packet switching allows the customer to determine the best path.
b. Packet switching takes a dedicated path established by the vendor.
c. Packet switching allows the vendor to determine the best path.
d. Packet switching takes a dedicated path established by the client.

A

c. Packet switching allows the vendor to determine the best path.

79
Q

Which of the following types of tests is used to verify that the proposed design will function in its intended environment?

a. Regression testing
b. Function testing
c. Pilot testing
d. Sociability testing

A

d. Sociability testing

80
Q

Which of the following was the first to add TKIP?

a. RADIUS
b. WEP
c. WPA2
d. WPA

A

d. WPA

81
Q

Which of the following would an auditor expect to see as the first step in the incident response process?

a. Recovery
b. Mitigation
c. Planning and preparation
d. Identification

A

c. Planning and preparation

82
Q

Which storage of evidence would best preserve the chain of custody of evidence obtained during an audit?

a. Locked department safe behind card access doors
b. Offsite location, such as home, out of reach by anyone at work
c. Archival at a third-party offsite facility
d. Locked cabinet on the department floor with only one key, in the possession of the auditor

A

d. Locked cabinet on the department floor with only one key, in the possession of the auditor

83
Q

Which wireless standard operates at speeds of 150/200/600Mbps?

a. 802.11a
b. 802.11ac
c. 802.11i
d. 802.11g

A

b. 802.11ac

84
Q

While reviewing her email, an auditor notices that one email message contains an obscured link. Which of the following is not the appropriate action?

a. Inform IT
b. Open the link
c. Delete the email
d. Mark the email source as spam

A

b. Open the link

85
Q

You are auditing a credit card payment system. The best assurance that information is entered correctly is by using which of the following?

a. Audit trails
b. Separation of data entry and computer operator duties
c. Key verification
d. Supervisory review

A

c. Key verification

86
Q

You are reviewing unfamiliar malware event records. Which of the following would be the best source of information to start your review about the file?

a. Trending charts based on the event records
b. Metadata information
c. Security access information
d. Executive summary on malware event

A

b. Metadata information

87
Q

You have been asked to join an audit team that will review Internet controls at a local college. Which of the following is required for schools and libraries using an Internet connection?

a. FERPA
b. FISMA
c. PCI-DSS
d. CIPA

A

d. CIPA

88
Q

You have been asked to perform a new audit assignment. Your first task is to review the organization’s strategic plan. What is the first item that should be reviewed in the plan?

a. Documentation that details the existing infrastructure
b. Previous and planned budgets
c. Organizational charts
d. The business plan

A

d. The business plan

89
Q

You have been asked to recommend a continuous audit technique. Which of the following techniques is considered the least complex?

a. Audit hooks
b. Systems control audit review file and embedded audit modules
c. Snapshots
d. Continuous and intermittent simulation

A

a. Audit hooks

90
Q

You have been asked to recommend a control that can detect exceptions to the following: “An order is normally for no more than 20 items, yet this order is for 2,000.” Which control works best to detect this type of exception?

a. Validity check
b. Range check
c. Reasonableness check
d. Limit check

A

c. Reasonableness check

91
Q

You have been asked to write a report detailing a new software-management system that uses AES. Which term best describes the advantage of a symmetric algorithm such as AES?

a. It enables key exchange.
b. It enables key management. c. It provides integrity.
d. It is fast.

A

d. It is fast.

92
Q

You have been invited to a postmortem review of a recent malware attack. The attacker was able to exploit the fact that the victim was connected to a legitimate site and a malicious site at the time the attack was carried out. Which of the following best describes this situation?

a. XSS
b. XSRF
c. Buffer overflow
d. TOCTOU

A

b. XSRF

93
Q

You need to review an organization’s balance sheet for material transactions. Which of the following would be the best sampling technique?

a. Attribute sampling
b. Frequency estimating sampling
c. Stop-and-go sampling
d. Variable sampling

A

d. Variable sampling

94
Q

Your organization is considering using a new ISP for time-sensitive transactions. From an audit perspective, what would be the most important item to review?

a. The service level agreement
b. The physical security of the ISP site
c. References from other clients of the ISP
d. Background checks of the ISP’s employees

A

a. The service level agreement