
CISA Quiz
Authored by Ganesh Pathuri
English
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following is the FIRST step performed prior to creating a risk ranking for the annual internal IS audit plan?
Prioritise the identified risk.
Define the audit universe.
Identify the critical controls.
Determine the testing approach.
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following is the MOST critical step when planning an IS audit?
Review findings from prior audits.
Executive management's approval of the audit plan.
Review IS security policies and procedures.
Perform Risk Assessment
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
The PRIMARY advantage of a continuous audit approach is that it:
Does not require an IS auditor to collect evidence on system reliability while processing is taking place
Requires the IS auditor to review and follow up immediately on all information collected
Can improve system security when used in time-sharing environments that process a large number of transactions
Does not depend on the complexity of an organizations computer systems.
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
An IS Auditor is performing an audit of a remotely managed server backup. The IS Auditor reviews the log for one day and finds one case where logging on a server has failed with the result that backup restarts can not be confirmed. What should the auditor do?
Issue an Audit finding
Seek an explanation from IS management
Review the classification of data held on the server
Expand the sample of logs reviewed
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
During the planning stage of an IS Audit, the PRIMARY goal of an IS Auditor is to:
Address Audit objectives
Collect sufficient evidence
Specify appropriate tests
Minimize audit resources
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Overall business risk for particular threat can be expressed as:
A Product of probability and magnitude of impact if threat successfully exploits the vulnerability
The magnitude of impact should a threat source successfully exploit the vulnerability
The likelihood of given threat source exploiting a given vulnerability
The collective judgement of the risk assessment team
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
hich of the following is NOT a function of the audit working papers
Show compliance with standards
Show how results were deduced
Show management’s role
Show due care was exercised
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?