SKILL BENCHMARK
Certified Information Systems Auditor (CISA) Literacy (Beginner Level)
- 25m
- 25 questions
The Certified Information Systems Auditor (CISA) Literacy (Beginner Level) benchmark evaluates your comprehension of the knowledge and technical skills required for auditing, control, and security. A learner who scores high on this benchmark demonstrates that they have the skills to participate in active CISA projects under the supervision of a CISA-certified professional, and can understand common CISA topics and provide input.
Topics covered
- align business needs with secured technological solutions
- align data protection policies with GDPR
- define how cryptography protects data
- define how the CIA triad enhances IT security
- describe how COBIT can ensure business objectives are met by aligning appropriate IT processes
- describe how GDPR assures data privacy
- describe how risk management can improve business operations
- describe the Information Technology Assurance Framework
- describe the purpose of IT balanced scorecards
- describe when various virtualization technologies should be used
- identify client needs that map to business objectives
- identify control objectives required to secure organizational assets along with the controls themselves
- identify how IT governance provides a structured approach to ensuring IT solutions are aligned with business goals, including outsourced tasks
- interpret various types of documentation when preparing an IS audit
- list different categories of security controls including internal business process controls, IT controls, and sampling types
- list how ITIL practices can streamline IT service delivery
- map various risk treatments to threats
- plan for audit funding, personnel, and related items
- recall how auditing standards provide guidance for conducting efficient audits
- recall how IS auditing shows whether IT solutions meet business objectives efficiently and effectively
- recognize expectations of conduct for CISA certified individuals
- recognize how an IT maturity model provides an assessment as to whether technology is effectively meeting business needs
- recognize how ISO/IEC standards can result in proper IT governance
- recognize how the Business Model for Information Security encompasses information security planning, implementation, and management
- recognize the importance of network documentation