The Complete Guide for CISA Examination Preparation |
|
xi | |
|
Chapter 1 Introduction to the CISA Examination |
|
|
1 | (8) |
|
|
1 | (1) |
|
|
1 | (1) |
|
|
2 | (1) |
|
|
2 | (1) |
|
|
3 | (1) |
|
CISA Job Practice Domains and Task and Knowledge Statements |
|
|
4 | (1) |
|
ISACA's Code of Professional Ethics |
|
|
5 | (1) |
|
|
6 | (1) |
|
Continuous Professional Education (CPE) |
|
|
7 | (2) |
|
Chapter 2 Domain 1 -- The Process of Auditing Information Systems |
|
|
9 | (38) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
12 | (7) |
|
Knowledge of ISACA IT Audit and Assurance Standards, Guidelines and Tools and Techniques, Code of Professional Ethics, and Other Applicable Standards |
|
|
12 | (7) |
|
Understanding the Fundamental Business Processes |
|
|
19 | (3) |
|
Control Principles Related to Controls in Information Systems |
|
|
22 | (2) |
|
Reliability and Integrity of Information |
|
|
22 | (1) |
|
Compliance with Policies, Plans, Procedures, Laws, and Regulations |
|
|
22 | (1) |
|
|
23 | (1) |
|
Effectiveness and Efficiency of Operations |
|
|
23 | (1) |
|
Risk-Based Audit Planning and Audit Project Management Techniques |
|
|
24 | (4) |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
25 | (1) |
|
Planning the Audit Project |
|
|
25 | (2) |
|
Quality of the Internal Control Framework |
|
|
27 | (1) |
|
|
28 | (1) |
|
Complexity of Transactions |
|
|
28 | (1) |
|
|
28 | (1) |
|
Ethical Climate and Employee Morale |
|
|
28 | (1) |
|
Auditor Understanding of the Applicable Laws and Regulations That Affect the Scope, Evidence Collection and Preservation, and Frequency of Audits |
|
|
29 | (1) |
|
Evidence Collection Techniques |
|
|
30 | (2) |
|
|
32 | (1) |
|
|
33 | (2) |
|
Domain 1 Examination Tips |
|
|
35 | (2) |
|
Domain 1 Practice Questions |
|
|
37 | (5) |
|
Domain One Review Questions and Hands-On Exercise |
|
|
42 | (1) |
|
Domain 1 Answers to Practice Questions |
|
|
43 | (3) |
|
|
46 | (1) |
|
Chapter 3 Domain 2 -- Governance and Management of IT |
|
|
47 | (30) |
|
|
47 | (4) |
|
|
51 | (1) |
|
IT Policies and Standards |
|
|
52 | (8) |
|
|
54 | (1) |
|
Role of the Project Management Office (PMO) |
|
|
55 | (1) |
|
|
56 | (1) |
|
|
57 | (1) |
|
|
58 | (1) |
|
Project Tracking and Oversight |
|
|
59 | (1) |
|
|
59 | (1) |
|
|
60 | (1) |
|
Program Evaluation Review Techniques (Also Known as a Network Diagram) |
|
|
60 | (1) |
|
|
61 | (1) |
|
|
61 | (1) |
|
Management of Resource Usage |
|
|
62 | (1) |
|
Auditor's Role in the Project Management Process |
|
|
62 | (3) |
|
|
63 | (2) |
|
|
65 | (2) |
|
Domain 2 Practice Questions |
|
|
67 | (5) |
|
Domain 2 Review Questions and Hands-on Exercise |
|
|
72 | (1) |
|
Exercise 2 Audit of Customer Receivables |
|
|
72 | (1) |
|
|
73 | (1) |
|
|
73 | (1) |
|
Domain 2 Answers to Practice Questions |
|
|
74 | (3) |
|
Chapter 4 Domain 3 -- Information Systems Acquisition, Development, and Implementation |
|
|
77 | (24) |
|
|
77 | (2) |
|
Cloud-Based Systems Acquisition |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
81 | (4) |
|
|
85 | (1) |
|
Prototyping and Rapid Application Development (RAD) |
|
|
85 | (1) |
|
|
85 | (2) |
|
|
87 | (1) |
|
|
87 | (1) |
|
Systems Maintenance Review |
|
|
88 | (2) |
|
Domain 3 Practice Questions |
|
|
90 | (4) |
|
Domain 3 Review Questions and Hands-On Exercise |
|
|
94 | (1) |
|
|
95 | (1) |
|
|
96 | (1) |
|
|
96 | (2) |
|
Domain 3 Answers to Practice Questions |
|
|
98 | (3) |
|
Chapter 5 Domain 4 -- Information Systems Operations, Maintenance, and Service Management |
|
|
101 | (30) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
103 | (1) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
105 | (1) |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
107 | (1) |
|
Auditing Operating Systems |
|
|
107 | (3) |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
110 | (2) |
|
|
110 | (2) |
|
|
112 | (1) |
|
|
113 | (2) |
|
Change Management in the Use of Cloud-Based Applications |
|
|
115 | (1) |
|
|
116 | (1) |
|
|
116 | (1) |
|
|
116 | (1) |
|
Disaster Recovery Planning |
|
|
117 | (2) |
|
Auditing Service Delivery |
|
|
119 | (3) |
|
Domain 4 Practice Questions |
|
|
122 | (3) |
|
Domain 4 Review Questions and Hands-On Exercise |
|
|
125 | (2) |
|
|
127 | (1) |
|
|
127 | (1) |
|
Domain 4 Answers to Practice Questions |
|
|
128 | (3) |
|
Chapter 6 Domain 5 -- Protection of Information Assets |
|
|
131 | (42) |
|
Protection of Information Assets |
|
|
132 | (1) |
|
|
133 | (1) |
|
Design, Implementation, Maintenance, Monitoring, and Reporting of Security Controls |
|
|
134 | (9) |
|
Physical and Environmental Controls and Supporting Practices for the Protection of Information Assets |
|
|
134 | (1) |
|
Physical Access Controls for the Identification, Authentication, and Restriction of Users |
|
|
135 | (3) |
|
|
138 | (1) |
|
Logical Access Controls for the Identification, Authentication, and Restriction of Users |
|
|
139 | (1) |
|
Risk and Controls Associated with Virtualization of Systems |
|
|
139 | (3) |
|
Risks and Controls Associated with the Use of Mobile and Wireless Devices |
|
|
142 | (1) |
|
Voice Communications Security |
|
|
143 | (1) |
|
Network and Internet Security Devices, Protocols, and Techniques |
|
|
143 | (1) |
|
Configuration, Implementation, Operation, and Maintenance of Network Security Controls |
|
|
144 | (1) |
|
Encryption-Related Techniques and Their Uses |
|
|
144 | (1) |
|
Public Key Infrastructure (PKI) Components and Digital Signature Techniques |
|
|
145 | (1) |
|
Peer-to-Peer Computing, Instant Messaging, and Web-Based Technologies |
|
|
146 | (1) |
|
Data Classification Standards Related to the Protection of Information Assets |
|
|
147 | (1) |
|
Storage, Retrieval, Transportation, and Disposal of Confidential Information Assets |
|
|
148 | (1) |
|
|
148 | (1) |
|
Risks in End-User Computing |
|
|
149 | (1) |
|
Implementing a Security Awareness Program |
|
|
149 | (1) |
|
Information System Attack Methods and Techniques |
|
|
150 | (1) |
|
Prevention and Detection Tools and Control Techniques |
|
|
151 | (4) |
|
|
151 | (1) |
|
|
151 | (1) |
|
|
151 | (1) |
|
|
152 | (1) |
|
Denial of Service (DoS) Attacks |
|
|
152 | (1) |
|
`Man in the Middle' (MITM) attacks |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
154 | (1) |
|
|
155 | (1) |
|
Security Testing Techniques |
|
|
155 | (1) |
|
Penetration Testing and Vulnerability Scanning |
|
|
155 | (1) |
|
Monitoring and Responding to Security Incidents |
|
|
156 | (1) |
|
Forensic Investigation and Procedures in Collection and Preservation of the Data and Evidence |
|
|
156 | (1) |
|
Domain 5 Practice Questions |
|
|
157 | (8) |
|
Domain 5 Review Questions and Hands-On Exercise |
|
|
165 | (1) |
|
|
166 | (1) |
|
|
166 | (1) |
|
Domain 5 Answers to Practice Questions |
|
|
167 | (6) |
|
Chapter 7 Preparing for the Examination |
|
|
173 | (4) |
Appendix A Glossary of Terms |
|
177 | (34) |
Appendix B CISA Sample Examination -- Choose Any 150 Questions |
|
211 | (32) |
Appendix C Sample Examination Answers |
|
243 | (2) |
Index |
|
245 | |