Can You Pass This Hardest CISA Test? Trivia Quiz.

10 Questions

Settings
Can You Pass This Hardest CISA Test? Trivia Quiz.

The certified Information Systems Auditor (CISA) has since 1978 been widely accepted globally as the certification is demonstrate the authenticity of those in the field of auditing, security and the control of information. The program was established by the Information Systems Audit and Control Association (ISACA) to identify professionals in the fields of IT with sufficient knowledge. This CISA short quiz is to test your knowledge on auditing.


Related Topics
Questions and Answers
  • 1. 
    An IS auditor reviews an organizational chart primarily for?
    • A. 

      An understanding of workflows

    • B. 

      Investigating various communication channels

    • C. 

      Understanding the responsibilities and authority of individuals

    • D. 

      Investigating the network connected to different employees

  • 2. 
    Which of the following forms of evidence for auditor would be considered the most reliable?
    • A. 

      An oral statement from the auditee

    • B. 

      The result of a test performed by IS auditor

    • C. 

      An internally generated computer accounting report     

    • D. 

      A confirmation letter received from an outside source

  • 3. 
    Data flow diagrams are used by IS auditors to?
    • A. 

      Order data hierarchically

    • B. 

      Highlight high-level data definitions

    • C. 

      Graphically summarize data paths and storage

    • D. 

      Portray step-by-step details of data generation

  • 4. 
    During a review of a customer master file, an IS auditor discovered numerous customer name duplications arising from variations in customer first names. To determine the extent of the duplication, the IS auditor use?
    • A. 

      Test data to validate data input

    • B. 

      Generalized audit software to search for address field duplications

    • C. 

      Test data to determine system sort capabilities

    • D. 

      Filling reports

  • 5. 
    Which audit techniques provides the BEST evidence of the segregation of duties in an IS department?
    • A. 

      Discussion with management

    • B. 

      Review of the organization chart

    • C. 

      Observation and interviews

    • D. 

      Testing of user access rights

  • 6. 
    Which of the following provides the BEST single-factor authentication?
    • A. 

      PIN

    • B. 

      Token

    • C. 

      Password

    • D. 

      Biometrics

  • 7. 
    Which type of fire-suppression system suppresses fire via water that is released from the main valve of a system of dry pipes installed throughout the facilities?
    • A. 

      A wet pipe system

    • B. 

      A dry pipe sprinkler system

    • C. 

      A halon sprinkler system

    • D. 

      A deluge sprinkler system

  • 8. 
    What is used to provide authentication of the website and can also be used to successfully authenticate keys used for data encryption?
    • A. 

      Authenticode

    • B. 

      A user certificate

    • C. 

      A website certificate

    • D. 

      An organization certificate

  • 9. 
    Which of the following should an Auditor review to determine user permissions that have been granted for a particular resource?
    • A. 

      System logs

    • B. 

      Access control list

    • C. 

      Application log

    • D. 

      Error logs

  • 10. 
    What determines the strength of a secret key within a symmetric key cryptosystem?
    • A. 

      A combination of key length, degree of permutation, and the complexity of the data encryption algorithm that uses the key

    • B. 

      A combination of key length, initial input vectors, and the complexity of the data encryption algorithm that does not use the key

    • C. 

      A combination of key length, initial input vectors, and the complexity of the data encryption algorithm that uses the key  

    • D. 

      Initial input vectors and the complexity of the data-encryption that uses the key