Test your basic knowledge |

CISA Certified Information Systems Auditor Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The calendar can contain 'real' accounting periods and/or adjusting accounting periods. The 'real' accounting periods must not overlap; and cannot have any gaps between 'real' accounting periods. Adjusting accounting periods can overlap with other ac






2. Any yearly accounting period without regard to its relationship to a calendar year.






3. Weaknesses in systems that can be exploited in ways that violate security policy






4. Devices that perform the functions of both bridges and routers; are called brouters. Naturally; they operate at both the data link and the network layers. A brouter connects same data link type LAN segments as well as different data link ones; which






5. A hardware/software package that is used to connect networks with different protocols. The gateway has its own processor and memory and can perform protocol and bandwidth conversions.






6. In open systems architecture; circular routing is the logical path of a message in a communications network based on a series of gates at the physical network layer in the open systems interconnection (OSI) model.






7. In intrusion detection; an error that occurs when an attack is misdiagnosed as a normal activity






8. Programmed checking of data validity in accordance with predetermined criteria






9. An attack strategy in which the attacker successively hacks into a series of connected systems; obscuring his/her identify from the victim of the attack






10. A version of the Windows operating system that supports preemptive multitasking






11. A trusted third party that serves authentication infrastructures or organizations and registers entities and issues them certificates






12. A type of LAN architecture in which the cable forms a loop; with stations attached at intervals around the loop. Signals transmitted around the ring take the form of messages. Each station receives the messages and each station determines; on the bas






13. Is an electronic pathway that may be displayed in the form of highlighted text; graphics or a button that connects one web page with another web page address.






14. The act of copying raw data from one place to another with little or no formatting for readability. Usually; dump refers to copying data from main memory to a display screen or a printer. Dumps are useful for diagnosing bugs. After a program fails; o






15. An extension to PPP to facilitate the creation of VPNs. L2TP merges the best features of PPTP (from Microsoft) and L2F (from Cisco).






16. A program that takes as input a program written in assembly language and translates it into machine code or relocatable code






17. The Committee on the Financial Aspects of Corporate Governance; set up in May 1991 by the UK Financial Reporting Council; the London Stock Exchange and the UK accountancy profession; was chaired by Sir Adrian Cadbury and produced a report on the subj






18. A public end-to-end digital telecommunications network with signaling; switching and transport capabilities supporting a wide range of service accessed by standardized interfaces with integrated customer control. The standard allows transmission of d






19. Generally; the assumption that an entity will behave substantially as expected. Trust may apply only for a specific function. The key role of this term in an authentication framework is to describe the relationship between an authenticating entity an






20. A process used to identify and evaluate risks and their potential effects






21. An edit check designed to ensure the data in a particular field is numeric






22. A list of retracted certificates






23. Controls over the acquisition; implementation; delivery and support of IS systems and services. They are made up of application controls plus those general controls not included in pervasive controls.






24. The outward impression of being self-governing and free from conflict of interest and undue influence






25. An approach to system development where the basic unit of attention is an object; which represents an encapsulation of both data (an object's attributes) and functionality (an object's methods). Objects usually are created using a general template ca






26. A viewable screen displaying information; presented through a web browser in a single view sometimes requiring the user to scroll to review the entire page. A bank web page may display the bank's logo; provide information about bank products and serv






27. A certificate identifying a public key to its subscriber; corresponding to a private key held by that subscriber. It is a unique code that typically is used to allow the authenticity and integrity of communicated data to be verified.






28. The processing of a group of transactions at the same time. Transactions are collected and processed against the master files at a specified time.






29. A sampling technique used to estimate the average or total value of a population based on a sample; a statistical model used to project a quantitative characteristic; such as a dollar amount






30. A disk access method that stores data sequentially; while also maintaining an index of key fields to all the records in the file for direct access capability






31. The method used to identify the location of a participant in a network. Ideally; addressing specifies where the participant is located rather than who they are (name) or how to get there (routing).






32. To the basic border firewall; add a host that resides on an untrusted network where the firewall cannot protect it. That host is minimally configured and carefully managed to be as secure as possible. The firewall is configured to require incoming an






33. An organized assembly of resources and procedures required to collect; process and distribute data for use in decision making






34. A fail-over process; in which all nodes run the same resource group (there can be no IP or MAC addresses in a concurrent resource group) and access the external storage concurrently






35. A system of computers connected together by a communications network. Each computer processes its data and the network supports the system as a whole. Such a network enhances communication among the linked computers and allows access to shared files.






36. The transfer of service from an incapacitated primary component to its backup component






37. A device used for combining several lower-speed channels into a higher-speed channel






38. Error control deviations (compliance testing) or misstatements (substantive testing)






39. These controls are designed to correct errors; omissions and unauthorized uses and intrusions; once they are detected.






40. Control Objectives for Information and related Technology; the international set of IT control objectives published by ISACF;® 2000; 1998; 1996






41. The portion of a security policy that states the general process that will be performed to accomplish a security goal






42. The act of capturing network packets; including those not necessarily destined for the computer running the sniffing software






43. A formal agreement with a third party to perform an IS function for an organization






44. Hardware devices; such as asynchronous and synchronous transmissions; that convert between two different types of transmission






45. Audit evidence is reliable if; in the IS auditor's opinion; it is valid; factual; objective and supportable.






46. These controls are designed to prevent or restrict an error; omission or unauthorized intrusion.






47. The level to which transactions can be traced and audited through a system






48. A system software tool that logs; monitors and directs computer tape usage






49. To record details of information or events in an organized record-keeping system; usually sequenced in the order they occurred






50. A phone number that represents the area in which the communications provider or Internet service provider (ISP) provides service