SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An individual using a terminal; PC or an application can access a network to send an unstructured message to another individual or group of people.
Backup
Plaintext
Application proxy
E-mail/interpersonal messaging
2. A protocol used to transmit data securely between two end points to create a VPN
Application proxy
Packet filtering
Bar case
PPTP (point-to-point tunneling protocol)
3. The communication lines that provide connectivity between the telecommunications carrier's central office and the subscriber's facilities
Electronic vaulting
Extended Binary-coded Decimal Interchange Code (EBCDIC)
Security policy
Local loop
4. An eight-digit/seven-bit code representing 128 characters; used in most small computers
Format checking
ASCII (American Standard Code for Information Interchange)
browser
Masking
5. A networking device that can send (route) data packets from one local area network (LAN) or wide area network (WAN) to another; based on addressing at the network layer (Layer 3) in the OSI model. Networks connected by routers can use different or si
Bridge
Router
Echo checks
Signatures
6. A project management technique used in the planning and control of system projects
Peripherals
Internet Engineering Task Force (IETF)
Program evaluation and review technique (PERT)
Circuit-switched network
7. The machine language code that is generally referred to as the object or load module
Certificate Revocation List
Executable code
Wide area network (WAN)
Mapping
8. Relates to the technical and physical features of the computer
Checkpoint restart procedures
Procedure
Auditability
Hardware
9. A discussion document which sets out an ''Enterprise Governance Model'' focusing strongly on both the enterprise business goals and the information technology enablers which facilitate good enterprise governance; published by the Information Systems
Half duplex
PPTP (point-to-point tunneling protocol)
Control Objectives for Enterprise Governance
ACK (acknowledgement)
10. The transfer of data between separate computer processing sites/devices using telephone lines; microwave and/or satellite links
Uploading
Database replication
Data communications
Rulebase
11. (remote authentication dial-in user service)
Hyperlink
RADIUS
Proxy server
Population
12. The quality or state of not being named or identified
Tcpdump
Anonymity
Range check
Format checking
13. Diligence which a person; who possesses a special skill; would exercise under a given set of circumstances
Administrative controls
NAT (Network Address Translation)
Outsourcing
Due professional care
14. The interface between the user and the system
Program flowcharts
Shell
Benchmark
Corporate governance
15. Integral part of an application system that is designed to identify and report specific transactions or other information based on pre-determined criteria. Identification of reportable items occurs as part of real-time processing. Reporting may be re
Signatures
Coverage
Embedded audit module
Requirements definition
16. Specifies the length of the file's record and the sequence and size of its fields. A file layout also will specify the type of data contained within each field. For example; alphanumeric; zoned decimal; packed and binary are types of data.
File layout
Reputational risk
Scheduling
Dynamic analysis
17. A high level description of the audit work to be performed in a certain period of time (ordinarily a year). It includes the areas to be audited; the type of work planned; the high level objectives and scope of the work; and topics such as budget; res
Audit plan
Dumb terminal
Business process reengineering (BPR)
Address space
18. A phase of an SDLC methodology that researches the feasibility and adequacy of resources for the development or acquisition of a system solution to a user need
Virtual private network (VPN)
Trojan horse
Feasibility study
Bus topology
19. A high-capacity line-of-sight transmission of data signals through the atmosphere which often requires relay stations
Microwave transmission
Audit accountability
Audit
Service user
20. A form of modulation in which data signals are pulsed directly on the transmission medium without frequency division and usually utilize a transceiver. In baseband the entire bandwidth of the transmission medium (e.g.; coaxial cable) is utilized for
Application program
Baseband
Operational control
Machine language
21. A testing approach which focuses on the functionality of the application or product and does not require knowledge of the code intervals.
Black box testing
L2TP (Layer 2 tunneling protocol)
Due professional care
Magnetic card reader
22. Files; equipment; data and procedures available for use in the event of a failure or loss; if the originals are destroyed or out of service
Criteria
Backup
Biometric locks
Program narratives
23. The central database that stores and organizes data
Repository
Honey pot
IT governance
ISP (Internet service provider)
24. The range between the highest and lowest transmittable frequencies. It equates to the transmission capacity of an electronic line and is expressed in bytes per second or Hertz (cycles per second).
Honey pot
Parity check
Bandwidth
Checkpoint restart procedures
25. Records of system events generated by a specialized operating system mechanism
Telecommunications
Operating system audit trails
Terminal
Dry-pipe fire extinguisher system
26. The initialization procedure that causes an operating system to be loaded into storage at the beginning of a workday or after a system malfunction
Initial program load (IPL)
Service level agreement (SLA)
Local loop
Wide area network (WAN)
27. A set of protocols for accessing information directories. It is based on the X.500 standard; but is significantly simpler.
Security software
Control section
LDAP (Lightweight Directory Access Protocol)
Registration authority (RA)
28. A layer within the International Organization for Standardization (ISO)/Open Systems Interconnection (OSI) model. It is used in information transfers between users through application programs and other devices. In this layer various protocols are ne
Substantive testing
Application layer
Audit authority
Indexed sequential file
29. Availability relates to information being available when required by the business process now and in the future. It also concerns the safeguarding of necessary resources and associated capabilities.
Availability
Voice mail
Hierarchical database
Proxy server
30. Modern expression for organizational development stemming from IS/IT impacts. The ultimate goal of BPR is to yield a better performing structure; more responsive to the customer base and market conditions; while yielding material cost savings. To ree
Verification
Misuse detection
Business process reengineering (BPR)
Vulnerability analysis
31. Cooperating packages of executable software that make their services available through defined interfaces. Components used in developing systems may be commercial off-the-shelf software (COTS) or may be purposely built. However; the goal of component
Appearance
liquidity risk
Components (as in component-based development)
Fiber optic cable
32. A system software tool that logs; monitors and directs computer tape usage
Detection risk
Tape management system (TMS)
Password
Hexadecimal
33. An interface point between the CPU and a peripheral device
Port
Audit responsibility
Packet switching
Microwave transmission
34. A device that forwards packets between LAN devices or segments. LANs that use switches are called switched LANs.
Confidentiality
Substantive testing
Switch
Brouters
35. The art of designing; analyzing and attacking cryptographic schemes
Verification
Link editor (linkage editor)
Cryptography
Bypass label processing (BLP)
36. The primary language used by both application programmers and end users in accessing relational databases
Privacy
Structured Query Language (SQL)
Fraud risk
Applet
37. Promulgated through the World Wide Web Consortium; XML is a web-based application development technique that allows designers to create their own customized tags; thus; enabling the definition; transmission; validation and interpretation of data betw
File layout
Public key infrastructure
Business process reengineering (BPR)
Extensible Markup Language (XML)
38. A workstation or PC on a network that does not have its own disk. Instead; it stores files on a network file server.
Challenge/response token
Control section
Structured Query Language (SQL)
Diskless workstations
39. An organized assembly of resources and procedures required to collect; process and distribute data for use in decision making
Packet switching
Integrity
Management information system (MIS)
Performance indicators
40. A private network that is configured within a public network. For years; common carriers have built VPNs that appear as private national or international networks to the customer; but physically share backbone trunks with other customers. VPNs enjoy
Virtual private network (VPN)
Hyperlink
Service bureau
Fail-over
41. Memory reserved to temporarily hold data. Buffers are used to offset differences between the operating speeds of different devices; such as a printer and a computer. In a program; buffers are reserved areas of RAM that hold data while they are being
Buffer
Internet packet (IP) spoofing
Worm
False positive
42. Way of thinking; behaving; feeling; etc.
Attitude
Exposure
Electronic vaulting
NAT (Network Address Translation)
43. Specialized system software used to perform particular computerized functions and routines that are frequently required during normal processing. Examples include sorting; backing up and erasing data.
Nonrepudiable trnasactions
Utility programs
Spanning port
virtual organizations
44. The processing of a group of transactions at the same time. Transactions are collected and processed against the master files at a specified time.
Batch processing
Completeness check
Audit risk
Mapping
45. Refers to a sprinkler system that does not have water in the pipes during idle usage; unlike a fully charged fire extinguisher system that has water in the pipes at all times. The dry-pipe system is activated at the time of the fire alarm; and water
legal risk
Client-server
System narratives
Dry-pipe fire extinguisher system
46. A computer network connecting different remote locations that may range from short distances; such as a floor or building; to extremely long transmissions that encompass a large region or several countries
Wide area network (WAN)
NAT (Network Address Translation)
Real-time processing
Decentralization
47. A network monitoring and data acquisition tool that performs filter translation; packet acquisition and packet display
Tcpdump
Fail-safe
Logs/Log file
Backup
48. An abnormal end to a computer job; termination of a task prior to its completion because of an error condition that cannot be resolved by recovery facilities while the task is executing
Default password
Range check
Abend
Source documents
49. A standardized body of data created for testing purposes. Users normally establish the data. Base case validates production application systems and tests the ongoing accurate operation of the system.
Compliance testing
L2TP (Layer 2 tunneling protocol)
Bar case
Operating system audit trails
50. Provides short-term backup power from batteries for a computer system when the electrical power fails or drops to an unacceptable voltage level
Trust
Uninterruptible power supply (UPS)
Node
LDAP (Lightweight Directory Access Protocol)