Assessment Quiz On CISA Auditing! Trivia Quiz

10 Questions

Settings
Assessment Quiz On CISA Auditing! Trivia Quiz

People are paying closer attention to the importance of a Certified Information System Advisor in a corporate setting. Thereby need to be vast in auditing like a professional. This, in turn, will make them better and more preferred to other auditors. The quiz is aimed at testing your ability as a CISA.


Related Topics
Questions and Answers
  • 1. 
    A number of system failures are occurring when corrections to previously detected errors are resubmitted for acceptance testing. This would indicate that the maintenance team is probably not adequately performing which of the following types of testing?
    • A. 

      Unit testing

    • B. 

      Design walk-throughs

    • C. 

      Integration testing  

    • D. 

      Configuration management

  • 2. 
    In an EDI process, the device which transmits and receives electronic documents is the:
    • A. 

      communications handler. 

    • B. 

      EDI translator.

    • C. 

      application interface.

    • D. 

      EDI interface.

  • 3. 
    The MOST significant level of effort for business continuity planning (BCP) generally is required during the:
    • A. 

      testing stage.

    • B. 

      evaluation stage.

    • C. 

      maintenance stage.

    • D. 

      early stages of planning

  • 4. 
    Which of the following network configuration options contains a direct link between any two host machines?
    • A. 

      Bus

    • B. 

      Ring

    • C. 

      Completely connected (mesh)

    • D. 

      Star

  • 5. 
    Which of the following types of data validation editing checks is used to determine if a field contains data, and not zeros or blanks?
    • A. 

      Check digit

    • B. 

      Completeness check 

    • C. 

      Existence check

    • D. 

      Reasonableness check

  • 6. 
    Which of the following tests is an IS auditor performing when a sample of programs is selected to determine if the source and object versions are the same?
    • A. 

      A compliance test of program library controls.  

    • B. 

      A substantive test of program library controls

    • C. 

      A compliance test of the program compiler controls

    • D. 

      A substantive test of the program compiler controls

  • 7. 
    A data administrator is responsible for:  
    • A. 

      maintaining database system software.

    • B. 

      defining data elements, data names, and their relationship.

    • C. 

      developing physical database structures.

    • D. 

      developing data dictionary system software.

  • 8. 
    A database administrator is responsible for:
    • A. 

      defining data ownership.

    • B. 

      establishing operational standards for the data dictionary.

    • C. 

      creating the logical and physical database.

    • D. 

      establishing ground rules for ensuring data integrity and security.

  • 9. 
    An IS auditor reviewing the key roles and responsibilities of the database administrator (DBA) is LEAST likely to expect the job description of the DBA to include:
    • A. 

      defining the conceptual schema

    • B. 

      defining security and integrity checks.

    • C. 

      liaising with users in developing a data model.

    • D. 

      mapping data model with the internal schema

  • 10. 
    To affix a digital signature to a message, the sender must first create a message digest by applying a cryptographic hashing algorithm against:
    • A. 

      the entire message and after that enciphering the message digest using the sender's private key.

    • B. 

      any arbitrary part of the message and after that enciphering the message digest using the sender's private key.

    • C. 

      the entire message and after that enciphering the message using the sender's private key.

    • D. 

      the entire message and thereafter enciphering the message along with the message digest using the sender's private key.