Quite a number of growing companies are coming to understand the importance of CISA; therefore it is mandatory for their intending employee to pass the Certified Information System Auditors. The program is ideal for managers, system administrators, technical staff, security professionals and auditors. This short will test knowledge on Certified Information System Auditors.
Address audit objectives.
Collect sufficient evidence.
Specify appropriate tests.
Minimize audit resources
Rate this question:
The auditor wishes to avoid sampling risk.
Generalized audit software is unavailable.
The probability of error must be objectively quantified.
The tolerable error rate cannot be determined.
Rate this question:
Definite assurance that material items will be duly covered during the auditing.
Reasonable assurance that the audit will cover material items.
Reasonable assurance that the auditor will duly cover all items.
Sufficient assurance that all items will be duly covered during the audit work
Rate this question:
Skill sets of the audit staff.
Test steps in the audit.
Time allotted for the audit.
Areas of high risk.
Rate this question:
Schedule the audits and monitor the time incurred on each audit.
Train the IS auditing staff on current technology used in the company.
Develop the audit plan based on a detailed risk assessment.
Monitor the progress of audits and initiate cost control measures.
Rate this question:
Obtain an understanding of the security risks to information processing.
Test controls over the access paths to determine if they are functional or not.
Evaluate the security environment regarding written policies and practices.
Document the controls that will be applied to the potential access paths to the system.
Rate this question:
Auditee's ability to find relevant evidence.
Auditor's familiarity with the circumstances.
Purpose and scope of the audit are done.
Availability of critical and required information.
Rate this question:
The effectiveness of the controls in place.
The mechanism for monitoring the risks which are related to the assets.
The threats/vulnerabilities affecting the assets.
The controls already in place.
Rate this question:
The entire message and thereafter enciphering the message digest using the sender’s private key.
Any arbitrary part of the message and thereafter enciphering the message digest using the sender’s private key.
The entire message and thereafter enciphering the message using the sender’s private key.
The entire message and thereafter enciphering the message along with the message digest using the sender’s private key.
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.