Test your basic knowledge |

CISA Certified Information Systems Auditor Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A flag set in the initial setup packets to indicate that the communicating parties are synchronizing the sequence numbers used for the data transmission






2. The individual responsible for the safeguard and maintenance of all program and data files






3. Changing data with malicious intent before or during input into the system






4. Weaknesses in systems that can be exploited in ways that violate security policy






5. A terminal with built-in processing capability. It has no disk or tape storage but has memory. The terminal interacts with the user by editing and validating data as they are entered prior to final processing.






6. To apply a variable; alternating current (AC) field for the purpose of demagnetizing magnetic recording media. The process involves increasing the AC field gradually from zero to some maximum value and back to zero; which leaves a very low residue of






7. A program that translates programming language (source code) into machine executable instructions (object code)






8. A packet (encapsulated with a frame containing information); which is transmitted in a packet-switching network from source to destination






9. Refers to a sprinkler system that does not have water in the pipes during idle usage; unlike a fully charged fire extinguisher system that has water in the pipes at all times. The dry-pipe system is activated at the time of the fire alarm; and water






10. Considered for acquisition the person responsible for high-level decisions; such as changes to the scope and/or budget of the project; and whether or not to implement






11. These controls are designed to prevent or restrict an error; omission or unauthorized intrusion.






12. A port configured on a network switch to receive copies of traffic from one or more other ports on the switch






13. A platform-independent XML-based formatted protocol enabling applications to communicate with each other over the Internet. Use of this protocol may provide a significant security risk to web application operations; since use of SOAP piggybacks onto






14. An interactive online system capability that immediately updates computer files when transactions are initiated through a terminal






15. Those controls that seek to maintain confidentiality; integrity and availability of information






16. Connects a terminal or computer to a communications network via a telephone line. Modems turn digital pulses from the computer into frequencies within the audio range of the telephone system. When acting in the receiver capacity; a modem decodes inco






17. Two trading partners both share one or more secrets. No one else can read their messages. A different key (or set of keys) is needed for each pair of trading partners. Same key is used for encryption and decryption. (Also see Private Key Cryptosystem






18. A type of LAN architecture that utilizes a central controller to which all nodes are directly connected. All transmissions from one station to another pass through the central controller; which is responsible for managing and controlling all communic






19. A response option in intrusion detection in which the system simply reports and records the problem detected; relying on the user to take subsequent action






20. A fully operational offsite data processing facility equipped with both hardware and system software to be used in the event of a disaster






21. An entity (department; cost center; division or other group) responsible for entering and maintaining budget data.






22. An integrated set of computer programs designed to serve a particular function that has specific input; processing and output activities (e.g.; general ledger; manufacturing resource planning; human resource management)






23. Electronic communications by special devices over distances or around devices that preclude direct interpersonal exchange






24. Any information collection mechanism utilized by an intrusion detection system






25. The physical layout of how computers are linked together. Examples include ring; star and bus.






26. The processing of a group of transactions at the same time. Transactions are collected and processed against the master files at a specified time.






27. The practice of eavesdropping on information being transmitted over telecommunications links






28. Group of people responsible for a project; whose terms of reference may include the development; acquisition; implementation or maintenance of an application system. The team members may include line management; operational line staff; external contr






29. Controlling access to a network by analyzing the attributes of the incoming and outgoing packets and either letting them pass; or denying them; based on a list of rules






30. The process of feeding test data into two systems; the modified system and an alternative system (possibly the original system) and comparing results






31. The method or communication mode of routing data over the communication network (also see half duplex and full duplex)






32. A hierarchical database that is distributed across the Internet that allows names to be resolved into IP addresses (and vice versa) to locate services such as web and e-mail servers






33. An automated function that can be operating system or application based in which electronic data being transmitted between storage areas are spooled or stored until the receiving device or storage area is prepared and able to receive the information.






34. Purposefully hidden malicious or damaging code within an authorized computer program. Unlike viruses; they do not replicate themselves; but they can be just as destructive to a single computer.






35. Is present when a financial asset or liability is denominated in a foreign currency or is funded by borrowings in another currency






36. Is the risk to earnings or capital arising from violations of; or nonconformance with; laws; rules; regulations; prescribed practices or ethical standards. Banks are subject to various forms of legal risk. This can include the risk that assets will t






37. Polymorphism refers to database structures that send the same command to different child objects that can produce different results depending on their family hierarchical tree structure.






38. A layer within the International Organization for Standardization (ISO)/Open Systems Interconnection (OSI) model. It is used in information transfers between users through application programs and other devices. In this layer various protocols are ne






39. A consortium with more than 700 affiliates from the software industry. Its purpose is to provide a common framework for developing applications using object-oriented programming techniques. For example; OMG is known principally for promulgating the C






40. A type of local area network (LAN) architecture in which each station is directly attached to a common communication channel. Signals transmitted over the channel take the form of messages. As each message passes along the channel; each station recei






41. A policy whereby access is denied unless it is specifically allowed. The inverse of default allow.






42. An electronic form functionally equivalent to cash in order to make and receive payments in cyberbanking






43. Confidentiality concerns the protection of sensitive information from unauthorized disclosure






44. An evaluation of any part of a project to perform maintenance on an application system (e.g.; project management; test plans; user acceptance testing procedures)






45. The process of monitoring the events occurring in a computer system or network; detecting signs of security problems






46. A file format in which the file is divided into multiple subfiles and a directory is established to locate each subfile






47. The risk of errors occurring in the area being audited






48. An evaluation of any part of an implementation project (e.g.; project management; test plans; user acceptance testing procedures)






49. A protocol and program that allows the remote identification of users logged into a system






50. Systems that employ sufficient hardware and software assurance measures to allow their use for processing of a range of sensitive or classified information