SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An implementation of DNS intended to secure responses provided by the server such that different responses are given to internal vs. external users
Split DNS
Static analysis
Comparison program
Object code
2. Measure of interconnectivity among software program modules' structure. Coupling depends on the interface complexity between modules. This can be defined as the point at which entry or reference is made to a module; and what data passes across the in
X.25 interface
Anomaly detection
Piggy backing
Coupling
3. A communication protocol used to connect to servers on the World Wide Web. Its primary function is to establish a connection with a web server and transmit HTML pages to the client browser.
Irregularities
HTTP (hyper text transfer protocol)
Internal storage
Security policy
4. The risk that an error which could occur in an audit area; and which could be material; individually or in combination with other errors; will not be prevented or detected and corrected on a timely basis by the internal control system
Librarian
Statistical sampling
Control risk
Default password
5. The process that limits and controls access to resources of a computer system; a logical or physical control designed to protect against unauthorized entry or use. Access control can be defined by the system (mandatory access control; or MAC) or defi
Client-server
Trusted processes
Web Services Description Language (WSDL)
Access control
6. An approach to system development where the basic unit of attention is an object; which represents an encapsulation of both data (an object's attributes) and functionality (an object's methods). Objects usually are created using a general template ca
Dial-back
Universal Description; Discovery and Integration (UDDI)
End-user computing
Object orientation
7. Systems for which detailed specifications of their components composition are published in a nonproprietary environment; thereby enabling competing organizations to use these standard components to build competitive systems. The advantages of using o
Open systems
Systems analysis
Production software
L2F (Layer 2 forwarding)
8. The probability that the IS auditor has reached an incorrect conclusion because an audit sample; rather than the whole population; was tested. While sampling risk can be reduced to an acceptably low level by using an appropriate sample size and selec
Sampling risk
Object code
Performance testing
Default password
9. The process of actually entering transactions into computerized or manual files. Such transactions might immediately update the master files or may result in memo posting; in which the transactions are accumulated over a period of time; then applied
Posting
Application software tracing and mapping
Unit testing
Transaction log
10. Group of people responsible for a project; whose terms of reference may include the development; acquisition; implementation or maintenance of an application system. The team members may include line management; operational line staff; external contr
Project team
price risk
Telecommunications
Controls (Control procedures)
11. English-like; user friendly; nonprocedural computer languages used to program and/or read and process computer files
Cadbury
Fourth generation language (4GL)
Electronic cash
Transaction log
12. The policies; procedures; organizational structure and electronic access controls designed to restrict access to computer software and data files
Virus
Logical access controls
Signatures
Mutual takeover
13. The act of verifying the identity of a system entity (e.g.; a user; a system; a network node) and the entity's eligibility to access computerized information. Designed to protect against fraudulent logon activity. Authentication can also refer to the
Authentication
Scure socket layer (SSL)
Information processing facility (IPF)
Bar case
14. A fail-over process in which there are two nodes (as in idle standby but without priority). The node that enters the cluster first owns the resource group; and the second will join as a standby node.
COCO
Internal storage
Rotating standby
Trap door
15. Analysis of information that occurs on a noncontinuous basis; also known as interval-based analysis
Audit trail
Attitude
Static analysis
Client-server
16. A process used to identify and evaluate risks and their potential effects
Risk assessment
Control group
Frame relay
Rounding down
17. An attack strategy in which the attacker intercepts the communications stream between two parts of the victim system and then replaces the traffic between the two components with the intruder's own; eventually assuming control of the communication
Split DNS
Hash function
Man-in-the-middle attack
Attribute sampling
18. 1) The process of establishing and maintaining security in a computer or network system. The stages of this process include prevention of security problems; detection of intrusions; investigation of intrusions and resolution.2) In network management;
Application proxy
Security management
Confidentiality
Strategic risk
19. Programs that are used to process live or actual data that were received as input into the production environment.
Buffer
Production programs
Magnetic ink character recognition (MICR)
Blackbox testing
20. Faking the sending address of a transmission in order to gain illegal entry into a secure system
Spoofing
Brouters
Hash function
Data diddling
21. The actions/controls dealing with operational effectiveness; efficiency and adherence to regulations and management policies
Administrative controls
Queue
world wide web (WWW)
Check digit
22. Audit evidence is relevant if it pertains to the audit objectives and has a logical relationship to the findings and conclusions it is used to support.
Business risk
Relevant audit evidence
Remote job entry (RJE)
Posting
23. Auxiliary computer hardware equipment used for input; output and data storage. Examples include disk drives and printers.
Checkpoint restart procedures
Demodulation
Peripherals
RFC (request for comments)
24. A display terminal without processing capability. Dumb terminals are dependent upon the main computer for processing. All entered data are accepted without further editing or validation.
Computer sequence checking
Dry-pipe fire extinguisher system
Dumb terminal
Editing
25. The most important types of operational risk involve breakdowns in internal controls and corporate governance. Such breakdowns can lead to financial losses through error; fraud or failure to perform in a timely manner or cause the interests of the ba
LDAP (Lightweight Directory Access Protocol)
legal risk
Operational risk
Editing
26. These controls are designed to prevent or restrict an error; omission or unauthorized intrusion.
Queue
Application security
Password cracker
Preventive controls
27. The process of taking an unencrypted message (plaintext); applying a mathematical function to it (encryption algorithm with a key) and producing an encrypted message (ciphertext)
Scure socket layer (SSL)
Encryption
Monetary unit sampling
ISP (Internet service provider)
28. Devices that perform the functions of both bridges and routers; are called brouters. Naturally; they operate at both the data link and the network layers. A brouter connects same data link type LAN segments as well as different data link ones; which
Hyperlink
Distributed data processing network
Degauss
Brouters
29. These controls deal with the everyday operation of a company or organization to ensure all objectives are achieved.
IEEE (Institute of Electrical and Electronics Engineers)--Pronounced I-triple-E
Uninterruptible power supply (UPS)
Operational control
Editing
30. A general hardware control; which helps to detect data errors when data are read from memory or communicated from one computer to another. A 1-bit digit (either 0 or 1) is added to a data item to indicate whether the sum of that data item's bit is od
Firmware
Function point analysis
Hexadecimal
Parity check
31. A 24-hour; stand-alone mini-bank; located outside branch bank offices or in public places like shopping malls. Through ATMs; clients can make deposits; withdrawals; account inquiries and transfers. Typically; the ATM network is comprised of two spher
Automated teller machine (ATM)
Protocol
Application security
Security/transaction risk
32. Confidentiality concerns the protection of sensitive information from unauthorized disclosure
Request for proposal (RFP)
Encryption
Logon
Confidentiality
33. The password used to gain access when a system is first installed on a computer or network device. There is a large list published on the Internet and maintained at several locations. Failure to change these after the installation leaves the system v
Repository
Cluster controller
Default password
Audit program
34. Business events or information grouped together because they have a single or similar purpose. Typically; a transaction is applied to a calculation or event that then results in the updating of a holding or master file.
Detective controls
Brouters
Hyperlink
Transaction
35. Memory reserved to temporarily hold data. Buffers are used to offset differences between the operating speeds of different devices; such as a printer and a computer. In a program; buffers are reserved areas of RAM that hold data while they are being
Hot site
Fail-over
Buffer
Application layer
36. The process of generating; recording and reviewing a chronological record of system events to ascertain their accuracy
UDP (User Datagram Protocol)
Audit
Data leakage
Intrusion detection
37. Any information collection mechanism utilized by an intrusion detection system
Monitor
Network administrator
Audit charter
Virtual private network (VPN)
38. A piece of information; a digitized form of signature; that provides sender authenticity; message integrity and nonrepudiation. A digital signature is generated using the sender's private key or applying a one-way hash function.
Digital signature
Default password
Operational audit
TCP (transmission control protocol)
39. A flag set in a packet to indicate to the sender that the previous packet sent was accepted correctly by the receiver without errors; or that the receiver is now ready to accept a transmission
Program narratives
Asynchronous Transfer Mode (ATM)
Trap door
ACK (acknowledgement)
40. A special terminal used by computer operations personnel to control computer and systems operations functions. These terminals typically provide a high level of computer access and should be properly secured.
Application development review
Honey pot
Operator console
Production programs
41. Data that is not encrypted. Also known as plaintext.
Bar code
NAT (Network Address Translation)
Cleartext
Masqueraders
42. A protocol for accessing a secure web server; whereby all data transferred is encrypted
Web Services Description Language (WSDL)
Local area network (LAN)
HTTPS (hyper text transfer protocol secure)
Modem (modulator-demodulator)
43. The amount of time allowed for the recovery of a business function or resource after a disaster occurs
Risk assessment
Distributed data processing network
Recovery time objective (RTO)
Computer sequence checking
44. Detects errors in the input portion of information that is sent to the computer for processing. The controls may be manual or automated and allow the user to edit data errors before processing.
Operational risk
Sniffing
Black box testing
Edit controls
45. Consists of one or more web pages that may originate at one or more web server computers. A person can view the pages of a website in any order; as he or she would a magazine.
Web site
Tcpdump
Passive response
Misuse detection
46. The application of an edit; using a predefined field definition to a submitted information stream; a test to ensure that data conform to a predefined format
Format checking
Black box testing
FIN (final)
Bar code
47. 1) The set of management statements that documents an organization's philosophy of protecting its computing and information assets 2) The set of security rules enforced by the system's security features
Data dictionary
Security policy
Local loop
Procedure
48. A collection of related information treated as a unit. Separate fields within the record are used for processing of the information.
Service provider
Direct reporting engagement
Record
Interface testing
49. A data communication network that adds processing services such as error correction; data translation and/or storage to the basic function of transporting data
Control perimeter
Value-added network (VAN)
Encapsulation (objects)
ISP (Internet service provider)
50. A protected; generally computer-encrypted string of characters that authenticate a computer user to the computer system
Detailed IS ontrols
Duplex routing
Password
Windows NT