CISA IT Governance Sample Test
  Start  
 Congratulations - you have completed CISA IT Governance Sample Test.
You scored %%SCORE%% out of %%TOTAL%%.
Your performance has been rated as %%RATING%%
  Your answers are highlighted below.  
 | Question 1 | 
While conducting an business continuity audit, which one of the following would be MOST important for an IS auditor?
| A | readiness of the recovery site. | 
| B | human safety and protection procedures are in place. | 
| C | databases restore procedures   testing | 
| D | Insurance coverage is adequate  to meet the objectives of the business continuity plan | 
| Question 2 | 
Which of the following should be done FIRST when preparing a disaster recovery plan?
| A | develop a business continuity plan | 
| B | develop a recovery strategy. | 
| C | assets identification and data classification. | 
| D | Perform a business impact analysis (BIA). | 
| Question 3 | 
When an individual in an IT department perform more than one role, which one of the following poses the greatest risk?
| A | developers have access and  can migrate data to the production environment. | 
| B | business analysts are doing  software functional testing  | 
| C | IT support team perform data backup | 
| D | IT manager perform as a system administrator. | 
| Question 4 | 
An IS auditor discovers that an organization has no comprehensive business continuity plan, but has BCP for each individual business IT process. What is the best course of action the IS auditor should take?
 
| A | recommend to develop a comprehensive business continuity plan. | 
| B | inform that auditee about the situation but no mention it in the audit report. | 
| C | determine if the each individual BCP is consistent. | 
| D | recommend to combine each individual BCP into a single BCP. | 
| Question 5 | 
What is the best way to ensure that organizational policies comply with the legal requirements?
| A | Periodic review of the policies by subject matter experts | 
| B | annual meeting the senior management to discuss whether the policies comply with the legal requirements. | 
| C | updating the policies regularly | 
| D | conduct compliance test regularly | 
| Question 6 | 
What is the primary objective of testing a business continuity plan?
| A | to ensure all risks have been addressed properly. | 
| B | to identify the limitation of the existing business continuity plan. | 
| C | to help the employees understand the importance of the BCP | 
| D | to test all possible disaster recovery scenarios  | 
| Question 7 | 
What do we mean by a structured walk-through of a disaster recovery plan?
| A | all IT staff should  come together to practice executing the recovery plan. | 
| B | representative from all functional areas for the organization come together to review whether the recovery plan pertaining to their areas is accurate, complete and executable. | 
| C | upload the copies of the plan to the intranet so that various functional areas can review the plan. | 
| D | perform a full-fledge recovery test to ensure the effectiveness of the plan. | 
| Question 8 | 
1.When an auditor finds that the ID of a terminated users get deactivated within 30 days of termination, the IS auditor should
| A | Recommend to check user logs regularly | 
| B | Report the organization to decrease the length of deactivation time. | 
| C | Make sure users cannot access the system anymore | 
| D | Recommend to change the IS policy to ensure that users ID get deactivated upon termination. | 
| Question 9 | 
Which of the following is the MOST important element for the successful implementation of IT governance?
| A | identification of organizational strategies  | 
| B | perform a risk assessment. | 
| C | perform a threat analysis. | 
| D | following the organization's policy, standards and the best practices. | 
| Question 10 | 
Which of the following is the NEXT step in the process after completing a business impact analysis as part of BCP.
| A | risk assessment program. | 
| B | vulnerability analysis of the existing systems, | 
| C | develop a business continuity strategy. | 
| D | develop a disaster recovery plan | 
| Question 11 | 
Which of the following is the MOST important aspect of effective business continuity management?
| A | To  make sure that the site is secure and located in a different geographical location from the primary site. | 
| B | having a fully redundant network links the both the primary and secondary site. | 
| C | testing backups site  | 
| D | test the recovery plan regularly | 
| Question 12 | 
Which of the following helps to gain a clear understanding of the business process while developing a business continuity plan?
| A | business continuity strategy. | 
| B | business recovery strategy | 
| C | risk assessment | 
| D | threat management  | 
| Question 13 | 
What is the first activity to be performed when developing a risk management program?
| A | business impact analysis | 
| B | risk assessment | 
| C | Identification of the assets to be protected  | 
| D | threat analysis | 
| Question 14 | 
Which of the following you need to take into account during the initial step of creating a firewall policy?
| A | identify the vulnerabilities of your systems. | 
| B | identify the source and destination of the applications and not allowing the well-known ports to access the applications. | 
| C | identify the applications that will be accessed externally. | 
| D | make sure every policy creates log and saves it in a secure location. | 
| Question 15 | 
While reviewing roles and responsibilities an IS auditor discovers that some IT staffs serving multiple roles. Which of the following should be greatest concern for the IT auditor?
| A | Network engineers are performing for quality assurance check. | 
| B | Security administrators are also responsible for system programming. | 
| C | IT 1st line support team are responsible for security administration for critical applications. | 
| D | System engineers are responsible for database administration. | 
| Question 16 | 
How can we express an overall business risk for a particular threat?
| A | a product of the likelihood and magnitude of the impact should a threat successfully exploit a vulnerability. | 
| B | the magnitude of the impact should a threat source successfully exploit the vulnerability | 
| C | the likelihood of a given threat source exploiting a given vulnerability. | 
| D | the collective judgment of the risk assessment team. | 
| Question 17 | 
When an IS auditor discovers that the notification systems within the organizational facilities could be severely impacted by infrastructural damage.What is the best recommendation the IS auditor can provide to the organization:
| A | Store the notification system to a more secure place. | 
| B | build a redundant notification system. | 
| C | train the recovery team to restore the notification system as soon as disaster happens. | 
| D | move the notification system to an alternative site. | 
| Question 18 | 
Which of the following is an appropriate test method to apply to a business continuity plan (BCP)?
| A | a paper test that walk-through of the entire plan, or part of the plan | 
| B | a pilot test  | 
| C | a unit test to verify that the critical parts of the BCP is effective and efficient. | 
| D | system testing | 
| Question 19 | 
After developing a business continuity plan, which one of the following is most important for its effective implementation.
| A | properly manage the plan | 
| B | approved by the IT steering committee. | 
| C | communicate the plan to the appropriate person who will be responsible for BCP. | 
| D | distribute the plan to everyone in the organization and conduct an BCP awareness training. | 
| Question 20 | 
Which of the following you consider the best method for assessing the effectiveness of BCP(business continuity plan)?
 
| A | review the plan and compare them with the industries best practices. | 
| B | review the employee awareness training plan. | 
| C | review the results of the previously conducted BCP test. | 
| D | review the BCP strategies  and objectives. | 
        Once you are finished, click the button below. Any items you have not completed will be marked incorrect.         
        Get Results          
                 
    
  
  There are 20 questions to complete.  
      
    You have completed    
 
    questions    
 
    question    
 
    Your score is    
 
    Correct    
 
    Wrong    
 
    Partial-Credit    
 
    You have not finished your quiz. If you leave this page, your progress will be lost.    
 
    Correct Answer    
 
    You Selected    
 
    Not Attempted    
 
    Final Score on Quiz    
 
    Attempted Questions Correct    
 
    Attempted Questions Wrong    
 
    Questions Not Attempted    
 
    Total Questions on Quiz    
 
    Question Details    
 
    Results    
 
    Date    
 
    Score    
 
    Hint    
    Time allowed
minutes
seconds
Time used
Answer Choice(s) Selected
Question Text
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    All done
Need more practice!
Keep trying!
Not bad!
Good work!
Perfect!
    
    
    
    
  