Certified Information Systems Auditor (CISA) Literacy (Beginner Level)

  • 25m
  • 25 questions
The Certified Information Systems Auditor (CISA) Literacy (Beginner Level) benchmark evaluates your comprehension of the knowledge and technical skills required for auditing, control, and security. A learner who scores high on this benchmark demonstrates that they have the skills to participate in active CISA projects under the supervision of a CISA-certified professional, and can understand common CISA topics and provide input.

Topics covered

  • align business needs with secured technological solutions
  • align data protection policies with GDPR
  • define how cryptography protects data
  • define how the CIA triad enhances IT security
  • describe how COBIT can ensure business objectives are met by aligning appropriate IT processes
  • describe how GDPR assures data privacy
  • describe how risk management can improve business operations
  • describe the Information Technology Assurance Framework
  • describe the purpose of IT balanced scorecards
  • describe when various virtualization technologies should be used
  • identify client needs that map to business objectives
  • identify control objectives required to secure organizational assets along with the controls themselves
  • identify how IT governance provides a structured approach to ensuring IT solutions are aligned with business goals, including outsourced tasks
  • interpret various types of documentation when preparing an IS audit
  • list different categories of security controls including internal business process controls, IT controls, and sampling types
  • list how ITIL practices can streamline IT service delivery
  • map various risk treatments to threats
  • plan for audit funding, personnel, and related items
  • recall how auditing standards provide guidance for conducting efficient audits
  • recall how IS auditing shows whether IT solutions meet business objectives efficiently and effectively
  • recognize expectations of conduct for CISA certified individuals
  • recognize how an IT maturity model provides an assessment as to whether technology is effectively meeting business needs
  • recognize how ISO/IEC standards can result in proper IT governance
  • recognize how the Business Model for Information Security encompasses information security planning, implementation, and management
  • recognize the importance of network documentation