CISA Certification Test! Trivia Questions Quiz

10 Questions

Settings
CISA Certification Test! Trivia Questions Quiz

A Certified Information System Auditor is a trained personnel that helps business owners to grow at faster and better. Being a Certified Information System Auditor will give you the tools to save a business from hitting the rock. This quiz is packed with instructions, information, and questions that will help you to better become a competent CISA.


Questions and Answers
  • 1. 
    The overall business risk of a particular threat can be expressed as:
    • A. 

      The magnitude of the impact of a threat source after exploiting possible loopholes.  

    • B. 

      The magnitude of the impact a threat source before exploiting possible loopholes.

    • C. 

      The likelihood of a given threat-source by exploiting a given vulnerability.

    • D. 

      The collective judgment of the risk assessment team.

  • 2. 
    An IS auditor reviewing access to an application to determine whether the 10 most recent "new user" forms were correctly authorized. This is an example of: (Mark one answer)
    • A. 

      Variable sampling.

    • B. 

      Substantive testing.

    • C. 

      Compliance testing.

    • D. 

      Stop-or-go sampling.

  • 3. 
    An IS auditor is using a statistical sample to inventory the tape library. What type of test would this be considered?
    • A. 

      Substantive. 

    • B. 

      Compliance

    • C. 

      Integrated

    • D. 

      Continuous audit

  • 4. 
    Processing controls ensure that data is accurate and complete, and is processed only through which of the following? Choose the BEST answer.
    • A. 

      Documented routines

    • B. 

      Authorised routines.

    • C. 

      Accepted routines

    • D. 

      Approved routines

  • 5. 
    What should be implemented as early as data preparation to support data integrity at the earliest point possible?
    • A. 

       Authentication controls

    • B. 

      Parity bits

    • C. 

      Authorisation controls

    • D. 

      Control totals.

  • 6. 
    What is used as a control to detect loss, corruption, or duplication of data?
    • A. 

      Redundancy check

    • B. 

      Reasonableness check

    • C. 

      Hash totals.

    • D. 

      Accuracy check

  • 7. 
    Business process re-engineering often results in _____ automation, which results in _____ number of people using technology.
    • A. 

      Increased; a fewer

    • B. 

      Increased; the same

    • C. 

      Less; a fewer

    • D. 

      Increased; a greater. 

  • 8. 
    Above almost all other concerns, what often results in the greatest negative impact on the implementation of new application software?
    • A. 

      Lack of user training for the new system.

    • B. 

      Failing to perform user acceptance testing.  

    • C. 

      Lack of software documentation and run manuals.

    • D. 

      Insufficient unit, module, and systems testing.

  • 9. 
    When should plans for testing for user acceptance be prepared?               
    • A. 

      In the development phase of the systems-development project

    • B. 

      In the feasibility phase of the systems-development project

    • C. 

      In the requirements definition phase of the systems-development project. 

    • D. 

      In the design phase of the systems-development project

  • 10. 
    Data edits are implemented before processing and are considered which of the following?  
    • A. 

      Detective integrity controls

    • B. 

      Preventative integrity controls

    • C. 

      Corrective integrity controls

    • D. 

      Deterrent integrity controls.