Practice Exam

Certified Information Systems Auditor (CISA)

This exam consists of 135 questions that reflect the material covered in this book. The questions represent the types of questions you should expect to see on the Certified Information Systems Auditor exam; however, they are not intended to match exactly what is on the exam. The exam requires candidates to use higher learning skills, working through more than just knowledge questions.

Some of the questions require that you deduce the best possible answer. In other cases, you are asked to identify the best course of action to take in a given situation. Some questions are considered enhanced in that you will be required to examine a figure, graphic, or other item to properly answer the question. You must read the questions carefully and thoroughly before you attempt to answer them. It is strongly recommended that you treat this exam as if it were the actual exam. The actual exam has 200 questions with a four-hour time limit. This means that you should spend no more than two hours and 42 minutes on this practice exam. When you take it, time yourself, read carefully, and answer all the questions to the best of your ability. It also worth noting that passing the exam requires the candidate to be familiar with a voluminous list of terms. Although the candidate is expected to know what the acronyms stand for, most will be spelled out on the actual exam.

The answers to all the questions appear in the “Answers to Practice Exam Questions” chapter, next in the book. Check your letter answers against those in the answer key, and then read the explanations provided. If you answer incorrectly, you should return to the appropriate chapter in the book to review the material.

Practice Exam Questions

1. Which type of sampling is best when dealing with population characteristics such as dollar amounts and weights?

image A. Attribute sampling

image B. Variable sampling

image C. Stop-and-go sampling

image D. Discovery sampling

2. Which of the following sampling techniques is generally applied to compliance testing?

image A. Attribute sampling

image B. Variable sampling

image C. Stop-and-go sampling

image D. Discovery sampling

3. To guarantee the confidentiality of client information, an auditor should do which of the following when reviewing such information?

image A. Contact the CEO or CFO and request what sensitive information can and cannot be disclosed to authorities

image B. Assume full responsibility for the audit archive and stored data

image C. Leave all sensitive information at the owners’ facility

image D. Not back up any of his or her work papers

4. Which of the following best describes materiality?

image A. An audit technique used to evaluate the need to perform an audit

image B. The principle that individuals, organizations, and the community are responsible for their actions and might be required to explain them

image C. The auditor’s independence and freedom from conflict of interest

image D. An auditing concept that examines the importance of an item of information in regard to the impact or effect on the entity being audited

5. Which of the following sampling technique is best to use to prevent excessive sampling?

image A. Attribute sampling

image B. Variable sampling

image C. Stop-and-go sampling

image D. Discovery sampling

6. Which of the following descriptions best defines auditor independence?

image A. The auditor has high regard for the company and holds several hundred shares of the company’s stock

image B. The auditor has a history of independence and even though the auditor has a niece that is employed by the company, he has stated that this is not a concern

image C. The auditor has previously given advice to the organization’s design staff while employed as the auditor

image D. The auditor is objective, not associated with the organization, and free of any connections to the client

7. Which of the following meets the description “the primary objective is to leverage the internal audit function by placing responsibility of control and monitoring onto the functional areas”?

image A. Integrated auditing

image B. Control self-assessment

image C. Automated work papers

image D. Continuous auditing

8. Which of the following sampling techniques would be best to use if the expected discovery rate is extremely low?

image A. Attribute sampling

image B. Variable sampling

image C. Stop-and-go sampling

image D. Discovery sampling

9. Which of the following offers how-to information?

image A. Standards

image B. Policy

image C. Guidelines

image D. Procedures

10. The type of risk that might not be detected by a system of internal controls is defined as which of the following?

image A. Control risk

image B. Audit risk

image C. Detection risk

image D. Inherent risk

11. Which of the following items makes computer-assisted audit techniques (CAAT) important to an auditor?

image A. A large amount of information is obtained by using specific techniques to analyze systems.

image B. An assistant or untrained professional with no specialized training can utilize CAAT tools, which frees up the auditor to participate in other activities.

image C. CAAT requires more human involvement in the analysis than multifunction audit utilities.

image D. CAAT requires the auditor to reduce the sampling rate and provides a more narrow audit coverage.

12. The risk that a material error will occur because of weak controls or no controls is known as which of the following?

image A. Control risk

image B. Audit risk

image C. Detection risk

image D. Inherent risk

13. You have been asked to audit a series of controls. Using Figure E.1 as your reference, what type of control have you been asked to examine?

image A. Amount total

image B. Hash total

image C. Item total

image D. Data checksum

Figure E.1

image

14. Which of the following is the best tool to extract data that is relevant to the audit?

image A. Integrated auditing

image B. Generalized audit software

image C. Automated work papers

image D. Continuous auditing

15. You have been asked to perform an audit of the disaster-recovery procedures. As part of this process, you must use statistical sampling techniques to inventory all backup tapes. Which of the following descriptions best defines what you have been asked to do?

image A. Continuous audit

image B. Integrated audit

image C. Compliance audit

image D. Substantive audit

16. According to ISACA, which of the following is the fourth step in the risk-based audit approach?

image A. Gather information and plan

image B. Perform compliance tests

image C. Perform substantive tests

image D. Determine internal controls

17. Which general control procedure most closely maps to the information systems control procedure that specifies, “Operational controls that are focused on day-to-day activities”?

image A. Business continuity and disaster-recovery procedures that provide reasonable assurance that the organization is secure against disasters

image B. Procedures that provide reasonable assurance for the control of database administration

image C. System-development methodologies and change-control procedures that have been implemented to protect the organization and maintain compliance

image D. Procedures that provide reasonable assurance to control and manage data-processing operations

18. Which of the following is the best example of a detective control?

image A. Access-control software that uses passwords, tokens, and/or biometrics

image B. Intrusion-prevention systems

image C. Backup procedures used to archive data

image D. Variance reports

19. Which of the following is not one of the four common elements needed to determine whether fraud is present?

image A. An error in judgment

image B. Knowledge that the statement was false

image C. Reliance on the false statement

image D. Resulting damages or losses

20. You have been asked to implement a continuous auditing program. With this in mind, which of the following should you first identify?

image A. Applications with high payback potential

image B. The format and location of input and output files

image C. Areas of high risk within the organization

image D. Targets with reasonable thresholds

21. Which of the following should be the first step for organizations wanting to develop an information security program?

image A. Upgrade access-control software to a biometric or token system

image B. Approve a corporate information security policy statement

image C. Ask internal auditors to perform a comprehensive review

image D. Develop a set of information security standards

22. Which of the following is primarily tasked with ensuring that the IT department is properly aligned with the goals of the business?

image A. Chief executive officer

image B. Board of directors

image C. IT steering committee

image D. Audit committee

23. The balanced score card differs from historic measurement schemes, in that it looks at more than what?

image A. Financial results

image B. Customer satisfaction

image C. Internal process efficiency

image D. Innovation capacity

24. Which of the following is the purpose of enterprise architecture (EA)?

image A. Ensure that internal and external strategy are aligned

image B. Map the IT infrastructure of the organization

image C. Map the IT infrastructure of the organization and ensure that its design maps to the organization’s strategy

image D. Ensure that business strategy and IT investments are aligned

25. Which of the following types of planning entails an outlook of greater than three years?

image A. Daily planning

image B. Long-term planning

image C. Operational planning

image D. Strategic planning

26. A new IT auditor has been asked to examine some processing, editing, and validation controls. Can you help define the control shown in Figure E.2?

image A. Validity check

image B. Reasonableness check

image C. Existence check

image D. Range check

Figure E.2

image

27. Senior management needs to select a strategy to determine who will pay for the information system’s services. Which of the following payment methods is known as a “pay as you go” system?

image A. Single cost

image B. Shared cost

image C. Chargeback

image D. Sponsor pays

28. Which of the following is the best method to identify problems between procedure and activity?

image A. Policy review

image B. Direct observation

image C. Procedure review

image D. Interview

29. You are working with a risk-assessment team that is having a hard time calculating the potential financial loss to the company’s brand name that could result from a risk. What should the team do next?

image A. Calculate the return on investment (ROI)

image B. Determine the single loss expectancy (SLE)

image C. Use a qualitative approach

image D. Review actuary tables

30. What operation-migration strategy has the highest possible level of risk?

image A. Parallel

image B. Hard

image C. Phased

image D. Intermittent

31. Many organizations require employees to rotate to different positions. Why?

image A. Help deliver effective and efficient services

image B. Provide effective cross-training

image C. Reduce the opportunity for fraud or improper or illegal acts

image D. Increase employee satisfaction

32. The balanced score card looks at four metrics. Which of the following is not one of those metrics?

image A. External operations

image B. The customer

image C. Innovation and learning

image D. Financial data

33. You have been assigned to a software-development project that has 80 linked modules and is being developed for a system that handles several million transactions per year. The primary screen of the application has data items that carry up to 20 data attributes. You have been asked to work with the audit staff to determine a true estimate of the development effort. Which of the following is the best technique to determine the size of the project?

image A. White-boxing

image B. Black-boxing

image C. Function point analysis

image D. Source lines of code

34. Which of the following is the preferred tool for estimating project time when a degree of uncertainty exists?

image A. Program Evaluation and Review Technique (PERT)

image B. Source lines of code (SLOC)

image C. Gantt

image D. Constructive Cost Model (COCOMO)

35. Which of the following techniques is used to determine what activities are critical and what the dependencies are among the various tasks?

image A. Compiling a list of each task required to complete the project

image B. COCOMO

image C. Critical path methodology (CPM)

image D. Program Evaluation and Review Technique (PERT)

36. Which of the following is considered a traditional system development lifecycle model?

image A. The waterfall model

image B. The spiral development model

image C. The prototyping model

image D. Incremental development

37. You have been assigned as an auditor to a new software project. The team members are currently defining user needs and then mapping how the proposed solution meets the need. At what phase of the SDLC are they?

image A. Feasibility

image B. Requirements

image C. Design

image D. Development

38. Which of the following is not a valid output control?

image A. Logging

image B. Batch controls

image C. Security signatures

image D. Report distribution

39. The following question references Figure E.3. Item A refers to which of the following?

image A. Foreign key

image B. Tuple

image C. Attribute

image D. Primary key

Figure E.3

image

40. You have been asked to suggest a control that could be used to determine whether a credit card transaction is legitimate or potentially from a stolen credit card. Which of the following would be the best tool for this need?

image A. Decision support systems

image B. Expert systems

image C. Intrusion-prevention systems

image D. Data-mining techniques

41. You have been asked to suggest a control that can be used to verify that batch data is complete and was transferred accurately between two applications. What should you suggest?

image A. A control total

image B. Check digit

image C. Completeness check

image D. Limit check

42. Which of the following types of programming language is used to develop decision support systems?

image A. 2GL

image B. 3GL

image C. 4GL

image D. 5GL

43. You have been asked to work with a new project manager. The project team has just started work on the payback analysis. Which of the following is the best answer to identify the phase of the system development lifecycle of the project?

image A. Feasibility

image B. Requirements

image C. Design

image D. Development

44. In many ways, IS operations is a service organization because it provides services to its users. As such, how should an auditor recommend that the percentage of help-desk or response calls answered within a given time be measured?

image A. Uptime agreements

image B. Time service factor

image C. Abandon rate

image D. First call resolution

45. What is the correct term for items that can occur without human interaction?

image A. Lights out

image B. Automated processing

image C. “Follow the sun” operations

image D. Autopilot operations

46. Which of the following is an example of a 2GL language?

image A. SQL

image B. Assembly

image C. FORTRAN

image D. Prolog

47. When discussing web services, which of the following best describes a proxy server?

image A. Reduces load for the client system

image B. Improves direct access to the Internet

image C. Provides an interface to access the private domain

image D. Provides high-level security services

48. Regarding cohesion and coupling, which is best?

image A. High cohesion, high coupling

image B. High cohesion, low coupling

image C. Low cohesion, low coupling

image D. Low cohesion, high coupling

49. Bluetooth class 1 meets which of the following specifications?

image A. Up to 5 m of range and .5 mW of power

image B. Up to 10 m of range and 1 mW of power

image C. Up to 20 m of range and 2.5 mW of power

image D. Up to 100 m of range and 100 mW of power

50. When discussing electronic data interface (EDI), which of the following terms best describes the device that transmits and receives electronic documents between trading partners?

image A. Value Added Network (VAN)

image B. X12

image C. Communications handler

image D. Electronic Data Interchange For Administration Commerce And Transport (EDIFACT)

51. Which type of network is used to connect multiple servers to a centralized pool of disk storage?

image A. PAN

image B. LAN

image C. SAN

image D. MAN

52. The following question references Figure E.4. Item C refers to which of the following?

image A. Foreign key

image B. Tuple

image C. Attribute

image D. Primary key

Figure E.4

image

53. Which layer of the OSI model is responsible for packet routing?

image A. Application

image B. Transport

image C. Session

image D. Network

54. Which of the following types of testing is usually performed at the implementation phase, when the project staff is satisfied with all other tests and the application is ready to be deployed?

image A. Final acceptance testing

image B. System testing

image C. Interface testing

image D. Unit testing

55. Which of the following devices can be on the edge of networks for basic packet filtering?

image A. Bridge

image B. Switch

image C. Router

image D. VLAN

56. MAC addresses are most closely associated with which layer of the OSI model?

image A. Data link

image B. Network

image C. Session

image D. Physical

57. The IP address of 128.12.3.15 is considered to be which of the following?

image A. Class A

image B. Class B

image C. Class C

image D. Class D

58. Which of the following statements is most correct? RIP is considered...

image A. A routing protocol

image B. A routable protocol

image C. A distance-vector routing protocol

image D. A link-state routing protocol

59. Which of the following test types is used after a change to verify that inputs and outputs are correct?

image A. Regression testing

image B. System testing

image C. Interface testing

image D. Pilot testing

60. Which of the following is an example of a 5GL language?

image A. SQL

image B. Assembly

image C. FORTRAN

image D. Prolog

61. Which of the following types of network topologies is hard to expand, with one break possibly disabling the entire segment?

image A. Bus

image B. Star

image C. Token Ring

image D. Mesh

62. What is the most important reason to use plenum-grade cable?

image A. Increased network security

image B. Less attenuation

image C. Less cross-talk

image D. Fire-retardant coating

63. Which of the following copper cable network configurations is considered the most secure from eavesdropping or interception?

image A. A switched VLAN using multimode fiber cable

image B. A Token Ring network using Cat 5 cabling

image C. A switched network that uses Cat 5e shielded cable

image D. A bus network using 10BASE2 cabling

64. Which of the following is an iterative development method in which repetitions are referred to as sprints and typically last 30 days?

image A. Scrum

image B. Extreme programming

image C. RAD

image D. Spiral

65. Which type of database is shown in Figure E.5?

image A. Relational

image B. Network

image C. Hierarchical

image D. Floating flat

Figure E.5

image

66. As a new auditor, you have been asked to review network operations. Which of the following weaknesses should you consider the most serious?

image A. Data files can be amended or changed by supervisors.

image B. Data files can be lost during power outages because of poor backup.

image C. Sensitive data files can be read by managers.

image D. Copies of confidential reports can be printed by anyone.

67. Which of the following is the best example of a control mechanism to be used to control component failure or errors?

image A. Redundant WAN links

image B. Just a Bunch of Disks/Drives (JBOD)

image C. RAID 0

image D. RAID 1

68. Which of the following is the best technique for an auditor to verify firewall settings?

image A. Interview the network administrator

image B. Review the firewall configuration

image C. Review the firewall log for recent attacks

image D. Review the firewall procedure

69. Which of the following is not a circuit-switching technology?

image A. DSL

image B. POTS

image C. T1

image D. ATM

70. Which of the following uses a process to standardize code modules to allow for cross-platform operation and program integration?

image A. Component-based development (CBD)

image B. Web-based application development (WBAD)

image C. Object-oriented systems development (OOSD)

image D. Data-oriented system development (DOSD)

71. Data warehouses are used to store historic data of an organization. As such, which of the following is the most accurate way to describe data warehouses?

image A. Subject oriented

image B. Object oriented

image C. Access oriented

image D. Control oriented

72. Which of the following access-control models allows the user to control access?

image A. Mandatory access control (MAC)

image B. Discretionary access control (DAC)

image C. Role-based access control (RBAC)

image D. Access control list (ACL)

73. While auditing the identification and authentication system, you want to discuss the best method you reviewed. Which of the following is considered the strongest?

image A. Passwords

image B. Tokens

image C. Two-factor authentication

image D. Biometrics

74. If asked to explain the equal error rate (EER) to another auditor, what would you say?

image A. The EER is used to determine the clipping level used for password lockout.

image B. The EER is a measurement that indicates the point at which FRR equals FAR.

image C. The EER is a rating used for password tokens.

image D. The EER is a rating used to measure the percentage of biometric users who are allowed access and who are not authorized users.

75. You have been asked to head up the audit of a business application system. What is one of the first tasks you should perform?

image A. Interview users

image B. Review process flowcharts

image C. Evaluate controls

image D. Determine critical areas

76. Closed-circuit TV (CCTV) systems are considered what type of control?

image A. Corrective

image B. Detective

image C. Preventive

image D. Delayed

77. According to ISACA, the second step in the business continuity planning (BCP) process is which of the following?

image A. Project management and initiation

image B. Plan design and development

image C. Recovery strategy

image D. Business impact analysis

78. You have been asked to review the documentation for a planned database. Which type of database is represented by Figure E.6?

image A. Relational

image B. Network

image C. Hierarchical

image D. Floating flat

Figure E.6

image

79. Which of the following issues ticket-granting tickets?

image A. The Kerberos authentication service

image B. The RADIUS authentication service

image C. The Kerberos ticket-granting service

image D. The RADIUS ticket-granting service

80. Which of the following is the most important corrective control that an organization has the capability to shape?

image A. Audit plan

image B. Security assessment

image C. Business continuity plan

image D. Network topology

81. Which one of the following is not considered an application system testing technique?

image A. Snapshots

image B. Mapping

image C. Integrated test facilities

image D. Base case system evaluation

82. Which of the following statements regarding recovery is correct?

image A. The greater the recovery point objective (RPO), the more tolerant the process is to interruption.

image B. The less the recovery time objective (RTO), the longer the process can take to be restored.

image C. The less the RPO, the more tolerant the process is to interruption.

image D. The greater the RTO, the less time the process can take to be restored.

83. Which of the following best defines the service delivery objective (SDO)?

image A. Defines the maximum amount of time the organization can provide services at the alternate site

image B. Defines the level of service provided by alternate processes

image C. Defines the time that systems can be offline before causing damage

image D. Defines how long the process can take to be restored

84. During which step of the business continuity planning (BCP) process is a risk assessment performed?

image A. Project management and initiation

image B. Plan design and development

image C. Recovery strategy

image D. Business impact analysis

85. When auditing security for a data center, the auditor should look for which of the following as the best example of long-term power protection?

image A. Standby generator

image B. Uninterrupted power supply

image C. Surge protector

image D. Filtered power supply

86. Which of the following would be considered the most complex continuous audit technique?

image A. Continuous and intermittent simulation (CIS)

image B. Snapshots

image C. Audit hooks

image D. Integrated test facilities

87. Which of the following is not a replacement for Halon?

image A. FM-200

image B. NAF-S-3

image C. FM-100

image D. Argon

88. When discussing biometrics, what do Type 1 errors measure?

image A. The point at which the false rejection rate (FRR) equals the false acceptance rate (FAR)

image B. The accuracy of the biometric system

image C. The percentage of illegitimate users who are given access

image D. The percentage of legitimate users who are denied access

89. Class A fires are comprised of which of the following?

image A. Electronic equipment

image B. Paper

image C. Oil

image D. Metal

90. You are performing an audit of an organization’s physical security controls, specifically, emergency controls. When doors that use relays or electric locks are said to fail soft, what does that mean?

image A. Locks of this type fail open.

image B. Locks of this type are easy to pick.

image C. Locks of this type fail closed.

image D. Locks of this type are hard to pick.

91. Which type of database is represented by Figure E.7?

image A. Relational

image B. Network

image C. Hierarchical

image D. Floating flat

Figure E.7

image

92. Systems control audit review file and embedded audit modules (SCARF/EAM) is an example of which of the following?

image A. Output controls

image B. Continuous online auditing

image C. Input controls

image D. Processing controls

93. Which type of access rights control model is widely used by the DoD, NSA, CIA, and FBI?

image A. MAC

image B. DAC

image C. RBAC

image D. ACL

94. Why is the protection of processing integrity important?

image A. To maintain availability to users so they have the availability to copy and use data without delay

image B. To protect data from unauthorized access while in transit

image C. To prevent output controls from becoming tainted

image D. To maintain data encryption on portable devices so that data can be relocated to another facility while being encrypted

95. A privacy impact analysis (PIA) is tied to several items. Which of the following is not one of those items?

image A. Technology

image B. Processes

image C. People

image D. Documents

96. Which of the following is ultimately responsible for the security practices of the organization?

image A. Security advisory group

image B. Chief security officer

image C. Executive management

image D. Security auditor

97. Which of the following guarantees that all foreign keys reference existing primary keys?

image A. Relational integrity

image B. Referential integrity

image C. Entity integrity

image D. Tracing and tagging

98. Which of the following would a company extend to allow network access to a business partner?

image A. Internet

image B. Intranet

image C. Extranet

image D. VLAN

99. What term is used to describe the delay that information will experience from the source to the destination?

image A. Echo

image B. Latency

image C. Delay

image D. Congestion

100. You have been asked to describe what security feature can be found in the wireless standard 802.11a. How will you respond?

image A. Wi-Fi Protected Access (WPA)

image B. Wired Equivalent Privacy (WEP)

image C. Temporal Key Integrity Protocol (TKIP)

image D. Wi-Fi Protected Access 2 (WPA2)

101. Which of the following is not a packet-switching technology?

image A. X.25

image B. ISDN

image C. Frame Rely

image D. ATM

102. Transport-layer security (TLS) can best be described as being found between which two layers of the OSI model?

image A. Layers 2 and 3

image B. Layers 3 and 4

image C. Layers 4 and 5

image D. Layers 5 and 6

103. Which of the following descriptions highlights the importance of domain name service (DNS)?

image A. Address of a domain server

image B. Resolves fully qualified domain names to IP addresses

image C. Resolves known IP address for unknown Internet addresses

image D. Resolves IP and MAC addresses needed for delivery of Internet data

104. Using Figure E.8 as a reference, which of the following best describes a 10BASE5 network design?

image A. Item A

image B. Item B

image C. Item C

image D. Item D

Figure E.8

image

105. You have been asked to describe a program that can be classified as terminal-emulation software. Which of the following would you mention?

image A. Telnet

image B. FTP

image C. SNMP

image D. SMTP

106. Which of the following services operates on ports 20 and 21?

image A. Telnet

image B. FTP

image C. SMTP

image D. DHCP

107. Which layer of the OSI model is responsible for reliable data delivery?

image A. Data link

image B. Session

image C. Transport

image D. Network

108. An objective of the implementation phase of a newly installed system can include which of the following?

image A. Conducting a certification test

image B. Determining user requirements

image C. Assessing the project to see if expected benefits were achieved

image D. Reviewing the designed audit trails

109. Which of the following is the best example of a processing control?

image A. Exception reports

image B. Sequence check

image C. Key verification

image D. Logical relationship check

110. Which of the following devices is most closely related to the data link layer?

image A. Hub

image B. Repeater

image C. Bridge

image D. Router

111. Which of the following provide the capability to ensure the validity of data through various stages of processing?

image A. Manual recalculations

image B. Programming controls

image C. Run-to-run totals

image D. Reasonableness verification

112. You overheard the database administrator discussing normalizing some tables. What is the purpose of this activity?

image A. Decrease redundancy

image B. Increase redundancy

image C. Decrease application malfunction

image D. Increase accuracy

113. Which of the following is not included in a PERT chart?

image A. The most optimistic time the task can be completed in

image B. The most cost-effective scenario for the task

image C. The worst-case scenario or longest time the task can take

image D. The most likely time the task will be completed in

114. Verifications such as existence checks can best be described as:

image A. A processing control that is considered preventive

image B. A validation edit control that is considered preventive

image C. A processing control that is considered detective

image D. A validation edit control that is considered detective

115. Referential integrity is used to prevent which of the following?

image A. Attribute errors

image B. Relational errors

image C. Dangling tuples

image D. Integrity constraints

116. Which of the following best describes the difference between accreditation and certification?

image A. Certification is initiated after the accreditation of the system to ensure that the system meets required standards.

image B. Certification is initiated before accreditation to ensure that quality personnel are using the new designed systems.

image C. Accreditation is issued after certification. Accreditation is a management function, while certification is a technical function.

image D. Production and management might see accreditation and certification as basically one and the same.

117. You have been asked to review the organization’s planned firewall design. As such, which of the following best describes the topology shown in Figure E.9?

image A. Packet filter

image B. Screened subnet

image C. Screened host

image D. Dual-homed host

Figure E.9

image

118. Which of the following database designs is considered a lattice structure because each record can have multiple parent and child records? Although this design can work well in stable environments, it can be extremely complex.

image A. The hierarchical database-management systems

image B. The relational database-management systems

image C. The network database-management systems

image D. The structured database-management systems

119. Which of the following is not used when calculating function point analysis?

image A. Number of user inquires

image B. Number of files

image C. Number of user inputs

image D. Number of expected users

120. Which of the following is an example of an interpreted programming language?

image A. FORTRAN

image B. Assembly

image C. Basic

image D. Java

121. Which of the following is an example of a 4GL language?

image A. SQL

image B. Assembly

image C. FORTRAN

image D. Prolog

122. Which of the following database takes the form of a parent/child structure?

image A. The hierarchical database-management systems

image B. The relational database-management systems

image C. The network database-management systems

image D. The structured database-management systems

123. You have been asked to explain rings of protection and how the concept applies to the supervisory mode of the operating system (OS). Which of the following is the best description?

image A. System utilities should run in supervisor mode.

image B. Supervisor state allows the execution of all instructions, including privileged instructions.

image C. Supervisory mode is used to block access to the security kernel.

image D. Rings are arranged in a hierarchy from least privileged to the most privileged as the most trusted usually has the highest ring number

124. You have been asked to design a control. The organization would like to limit what check numbers are used. Specfically, they would like to be able to flag a check numbered 318 if the day’s first check had the number 120 and the day’s last check was number 144. What type of validation check does the department require?

image A. Limit check

image B. Range check

image C. Validity check

image D. Sequence check

125. Which of the following descriptions best describes a delay window?

image A. The time between when an event occurs and when the audit record is reviewed

image B. The time between when an incident occurs and when it is addressed

image C. The time between when an event occurs and when the audit record is recorded

image D. The difference between a threshold and a trigger

126. You have been asked to review a console log. What type of information should you expect to find?

image A. Names and passwords of system users

image B. Application access and backup times

image C. System errors

image D. Errors from data edits

127. During a software change process, auditors might be asked to verify existing source code at some point. What is the most effective tool for auditors to compare old and new software for unreported changes?

image A. Function point analysis (FPA)

image B. Manual review of the software

image C. Variation tools

image D. Source code comparison software

128. Which of the following is not a valid processing control?

image A. Authorization

image B. Processing

image C. Validation

image D. Editing

129. Which of the following is not part of the project-management triangle?

image A. Scope

image B. Time

image C. Resources

image D. Cost

130. Using Figure E.10 as a reference, place the four recovery time objectives in their proper order.

image A. Items A, B, C, D

image B. Items B, C, D, A

image C. Items D, A, C, B

image D. Items C, B, D, A

Figure E.10

image

131. When dealing with project-management issues, which of the following is ultimately responsible and must ensure that stakeholders’ needs are met?

image A. Stakeholders

image B. Project steering committee

image C. Project manager

image D. Quality assurance

132. Projects must take on an organizational form. These organizational forms or frameworks can be either loosely structured or very rigid. Which project form matches the description “The project manager has no real authority, and the functional manager remains in charge”?

image A. Weak matrix

image B. Pure project

image C. Balanced matrix

image D. Influence

133. Which of the following is the best description of the Constructive Cost Model (COCOMO)?

image A. COCOMO is a model that forecasts the cost and schedule of software development, including the number of persons and months required for the development.

image B. COCOMO is a model that forecasts network costs associated with hardware, the physical medium, and trained personnel.

image C. COCOMO is a forecast model that estimates the time involved in producing a product and shipping to the end user.

image D. COCOMO is a model that forecasts the construction of additional companies associated with organizational growth.

134. Which of the following software-estimating methods does not work as well in modern development programs because additional factors that are not considered will affect the overall cost?

image A. Facilited Risk Assessment Process (FRAP)

image B. Gantt

image C. Function point analysis (FPA)

image D. Source lines of code (SLOC)

135. Which of the following is the best example of a quantitative risk-assessment technique?

image A. The Delphi technique

image B. Facilitated risk-assessment process

image C. Actuarial tables

image D. Risk rating of high, medium, or low

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.141.47.178