CISA Practise Questions
CISA Practise Questions
Questions)
CISA Mock Test (Domain 1)
[email protected] Switch account
Draft saved
* Indicates required question
Email*
Your email
Name*
Email*
Country*
Clear selection
(2)IS auditor is facilitating a CSA programme. Which of the following is the MOST
important requirement for a successful CSA?
1 point
Clear selection
Clear selection
(5)Which of the following the BEST time to perform a control self-assessment involving
all concerned parties?
1 point
Clear selection
(6)An IS auditor has been asked to facilitate a control self-assessment (CSA) program.
Which of the following is an objective of a CSA program?
1 point
Clear selection
A. Team leader
B. The auditor should not participate as it would create a potential conflict of interest.
C. Facilitator
D. Project Controller
Clear selection
Clear selection
(9)An IS Auditor has been asked by the management to support its CSA program. The
role of an IS auditor in a control self-assessment (CSA) should be that of:
1 point
A.program incharge
B. program manager
C.program partner
D. program facilitator
Clear selection
Clear selection
(11) An IS auditor is determining the appropriate sample size for testing the
effectiveness of change management process. No deviation noted in last 2 years audit
review and management has assured no deviation in the process for the period under
review. Auditor can adopt a :
1 point
A. higher confidence coefficient resulting in a smaller sample size
B.lower confidence coefficient resulting in a higher sample size.
C. lower confidence coefficient resulting in a lower sample size
D.higher confidence coefficient resulting in a higher sample size.
Clear selection
A. Substantive testing
B. Compliance testing
C. Detection testing
D. Control testing
Clear selection
Clear selection
(14)An IS auditor is using a statistical sample to inventory the tape library. What type of
test would this be considered?
1 point
A. Substantive
B. Compliance
C. Integrated
D. Continuous audit
Clear selection
Clear selection
(17) IS auditors are MOST likely to reduce substantive test procedure if after
compliance test they conclude that:
1 point
Clear selection
(18)When an IS auditor performs a test to ensure that only active users have access to
a, the IS auditor is performing a:
1 point
A. compliance test.
B. substantive test.
C. statistical sample.
D. Judgment Sampling.
Clear selection
Clear selection
Clear selection
(21)Test to determine whether last 50 new user requisitions were correctly processed is
an example of:
1 point
A. discovery sampling.
B. substantive testing.
C. compliance testing.
D. stop-or-go sampling.
Clear selection
(22)IS auditor is reviewing the internal control of an application software. The sampling
method that will be MOST useful when testing for compliance is:
1 point
A. Attribute sampling
B. Variable sampling
C. Discovery sampling
D. Stop or go sampling
Clear selection
Clear selection
(24) Which of the following sampling methods would be the MOST effective to
determine whether access rights to staffs have been authorized as per the authorization
matrix?
1 point
A. stratified mean per unit
B. attribute sampling
C. discovery sampling
D. stop or go sampling
Clear selection
(25) IS auditor reviewing a critical financial application is concerned about fraud. Which
of the following sampling methods would BEST assist the auditors?
1 point
A. Attribute sampling
B. Variable sampling
C. Discovery sampling
D. Stop or go sampling
Clear selection
(26) Test to determine whether last 50 new user requisitions were correctly processed is
an example of:
1 point
A. discovery sampling
B. substantive testing
C. compliance testing
D. stop-or-go sampling
Clear selection
Clear selection
(28) IS auditor is reviewing the internal control of application software. The sampling
method that will be MOST useful when testing for compliance is:
1 point
A. Attribute sampling
B. Variable sampling
C. Discovery sampling
D. Stop or go sampling
Clear selection
A. audit risk
B. detection risk
C. inherent risk
D. sampling risk
Clear selection
Clear selection
(31)Which of the following should an IS auditor use to detect duplicate invoice records
within an invoice master file?
1 point
A. Attribute sampling
B. Generalized audit software (GAS)
C. Test data
D. Integrated test facility (ITF)
Clear selection
(32)An IS auditor is using a statistical sample to inventory the tape library. What type of
test would this be considered?
1 point
A. Substantive
B. Compliance
C. Integrated
D. Continuous audit
Clear selection
Clear selection
Clear selection
(35)Which of the following would be the BEST population to take a sample from when
testing program changes?
1 point
Clear selection
(36)Which of the following is MOST critical when creating data for testing the logic in a
new or modified application system?
1 point
Clear selection
(37) An IS auditor is determining the appropriate sample size for testing the
effectiveness of change management process. No deviation noted in last 2 years audit
review and management has assured no deviation in the process for the period under
review. Auditor can adopt a :
1 point
Clear selection
(38) Which of the following sampling methods would be the MOST effective to
determine whether access rights to staffs have been authorized as per the authorization
matrix?
1 point
Clear selection
(39) IS auditor reviewing a critical financial application is concerned about fraud. Which
of the following sampling methods would BEST assist the auditors?
1 point
A. Attribute sampling
B. Variable sampling
C. Discovery sampling
D. Stop or go sampling
Clear selection
(40) Test to determine whether last 50 new user requisitions were correctly processed is
an example of:
1 point
A. discovery sampling
B. substantive testing
C. compliance testing
D. stop-or-go sampling
Clear selection
Clear selection
(42) IS auditor is reviewing the internal control of application software. The sampling
method that will be MOST useful when testing for compliance is:
1 point
A. Attribute sampling
B. Variable sampling
C. Discovery sampling
D. Stop or go sampling
Clear selection
A. audit risk
B. detection risk
C. inherent risk
D. sampling risk
Clear selection
Clear selection
(45)Which of the following should an IS auditor use to detect duplicate invoice records
within an invoice master file?
1 point
A. Attribute sampling
B. Generalized audit software (GAS)
C. Test data
D. Integrated test facility (ITF)
Clear selection
(46)An IS auditor is using a statistical sample to inventory the tape library. What type of
test would this be considered?
1 point
A. Substantive
B. Compliance
C. Integrated
D. Continuous audit
Clear selection
Clear selection
Clear selection
(49)Which of the following would be the BEST population to take a sample from when
testing program changes?
1 point
Clear selection
(50)Which of the following is MOST critical when creating data for testing the logic in a
new or modified application system?
1 point
Clear selection
A. IS function
B. External Auditor
C. Internal Audit Function
D. Finance Function
Clear selection
(52) The authority, scope and responsibility of the Information System Audit function is:
1 point
Clear selection
Clear selection
Clear selection
Clear selection
Clear selection
(57) The document used by the top management of organizations to delegate authority
to the IS audit function is the:
1 point
A. audit calendar.
B. audit charter.
C. risks register.
D.audit compendium.
Clear selection
(59) The audit charter should be approved by the highest level of management and
should:
1 point
A. be updated often to upgrade with the changing nature of technology and the audit profession.
B. include audit calendar along with resource allocation.
C. include plan of action in case of disruption of business services.
D. outlines the overall authority, scope and responsibilities of the audit function.
Clear selection
(60) An audit charter should state management's objectives for and delegation of
authority to IS audit and MUST be:
1 point
Clear selection
(61)In an audit of an inventory application, which approach would provide the BEST
evidence that purchase orders are valid?
1 point
Clear selection
(62)The extent to which data will be collected during an IS audit should be determined
based on the:
1 point
Clear selection
(63)The responsibility, authority and accountability of the IS audit function is
appropriately documented in an audit charter and MUST be:
1 point
Clear selection
A. audit planning.
B. controls.
C. vulnerabilities.
D. liabilities.
Clear selection
(65)An IS auditor discovers evidence of fraud perpetrated with a manager's user id. The
manager had written the password, allocated by the system administrator, inside his/her
desk drawer. The IS auditor should conclude that the:
1 point
Clear selection
Clear selection
(67)The IS department of an organization wants to ensure that the computer files used
in the information processing facility are adequately backed up to allow for proper
recovery. This is a(n):
1 point
A. control procedure.
B. control objective.
C. corrective control.
D. operational control.
Clear selection
Clear selection
Clear selection
(70)In an IS audit of several critical servers, the IS auditor wants to analyze audit trails
to discover potential anomalies in user or system behavior. Which of the following tools
is MOST suitable for performing that task?
1 point
A. CASE tools
B. Embedded data collection tools
C. Heuristic scanning tools
D. Trend/variance detection tools
Clear selection
(71)An IS auditor should use statistical sampling and not judgment (nonstatistical)
sampling, when:
1 point
Clear selection
Clear selection
(73)The vice president of human resources has requested an audit to identify payroll
overpayments for the previous year. Which would be the BEST audit technique to use in
this situation?
1 point
A. Test data
B. Generalized audit software
C. Integrated test facility
D. Embedded audit module
Clear selection
(74)Which of the following would be the BEST population to take a sample from when
testing program changes?
1 point
Clear selection
(75)Which of the following normally would be the MOST reliable evidence for an
auditor?
1 point
Clear selection
(76)During a review of the controls over the process of defining IT service levels, an IS
auditor would MOST likely interview the:
1 point
A. systems programmer.
B. legal staff.
C. business unit manager.
D. application programmer.
Clear selection
(77)In the course of performing a risk analysis, an IS auditor has identified threats and
potential impacts.Next, an IS auditor should:
1 point
Clear selection
A can identify high-risk areas that might need a detailed review later.
B. allows IS auditors to independently assess risk.
C. can be used as a replacement for traditional audits.
D. allows management to relinquish responsibility for control.
Clear selection
Clear selection
(80)Which of the following is the MOST likely reason why e-mail systems have become
a useful source of evidence for litigation?
1 point
Clear selection
Clear selection
A. be dynamic and change often to coincide with the changing nature of technology and the
audit profession.
B. clearly state audit objectives for and the delegation of authority to the maintenance and
review of internal controls.
C. document the audit procedures designed to achieve the planned audit objectives.
D. outline the overall authority, scope and responsibilities of the audit function.
Clear selection
Clear selection
Clear selection
(85)To identify the value of inventory that has been kept for more than eight weeks, an
IS auditor would MOST likely use:
1 point
A. test data.
B. statistical sampling.
C. an integrated test facility.
D. generalized audit software.
Clear selection
(86) An integrated test facility is considered a useful audit tool because it:
1 point
Clear selection
(87)The decisions and actions of an IS auditor are MOST likely to affect which of the
following risks?
1 point
A. Inherent
B. Detection
C. Control
D. Business
Clear selection
Clear selection
Clear selection
A. of the point at which controls are exercised as data flow through the system.
B. that only preventive and detective controls are relevant.
C. that corrective controls can only be regarded as compensating.
D. that classification allows an IS auditor to determine which controls are missing.
Clear selection
(91)The risk of an IS auditor using an inadequate test procedure and concluding that
material errors do not exist when, in fact, they do is an example of:
1 point
A. inherent risk.
B. control risk.
C. detection risk.
D. audit risk.
Clear selection
Clear selection
(93)An IS auditor has evaluated the controls for the integrity of the data in a financial
application. Which of the following findings would be the MOST significant?
1 point
A. The application owner was unaware of several changes applied to the application by the IT
department.
B. The application data are backed up only once a week.
C. The application development documentation is incomplete.
D. Information processing facilities are not protected by appropriate fire detection systems.
Clear selection
(94) Overall business risk for a particular threat can be expressed as:
1 point
A. a product of the probability and magnitude of the impact if a threat successfully exploits a
vulnerability.
B. the magnitude of the impact should a threat source successfully exploit the vulnerability.
C. the likelihood of a given threat source exploiting a given vulnerability.
D. the collective judgment of the risk assessment team.
Clear selection
(95)Which one of the following could an IS auditor use to validate the effectiveness of
edit and validation routines?
1 point
Clear selection
A. an understanding of workflows.
B. investigating various communication channels.
C. understanding the responsibilities and authority of individuals.
D. investigating the network connected to different employees.
Clear selection
Clear selection
Clear selection
(99)Which of the following steps would an IS auditor normally perform FIRST in a data
center security review?
1 point
Clear selection
A. facilitator.
B. manager.
C. partner.
D. stakeholder.
Clear selection