SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Detection on the basis of whether the system activity matched that defined as abnormal
Utility software
Computer sequence checking
Anomaly detection
Misuse detection
2. Software used to administer logical security. It usually includes authentication of users; access granting according to predefined rules; monitoring and reporting functions.
Operator console
Record; screen and report layouts
Dry-pipe fire extinguisher system
Security software
3. A packet (encapsulated with a frame containing information); which is transmitted in a packet-switching network from source to destination
Datagram
Database
Cohesion
Protocol
4. Used to electronically input; read and interpret information directly from a source document; requires the source document to have specially-coded magnetic ink typeset
Magnetic ink character recognition (MICR)
Tcpdump
Penetration testing
Link editor (linkage editor)
5. The process of monitoring the events occurring in a computer system or network; detecting signs of security problems
Real-time processing
Cadbury
Intrusion detection
DMZ (demilitarized zone)
6. Detection on the basis of whether the system activity matches that defined as bad
Firmware
PPP (point-to-point protocol)
Misuse detection
Vulnerability analysis
7. Data-oriented development techniques that work on the premise that data are at the center of information processing and that certain data relationships are significant to a business and must be represented in the data structure of its systems
Information engineering
Voice mail
Security testing
Enterprise resource planning
8. A layer within the International Organization for Standardization (ISO)/Open Systems Interconnection (OSI) model. It is used in information transfers between users through application programs and other devices. In this layer various protocols are ne
Application layer
Audit evidence
Integrated test facilities (ITF)
Useful audit evidence
9. Point-of-sale systems enable capture of data at the time and place of transaction. POS terminals may include use of optical scanners for use with bar codes or magnetic card readers for use with credit cards. POS systems may be online to a central com
Noise
Point-of-sale systems (POS)
Information processing facility (IPF)
Engagement letter
10. Software used to create data to be used in the testing of computer programs
Shell
ICMP (internet control message protocol)
Personal identification number (PIN)
Test generators
11. A group of computers connected by a communications network; where the client is the requesting machine and the server is the supplying machine. Software is specialized at both ends. Processing may take place on either the client or the server but it
Client-server
Privacy
Internet Inter-ORB Protocol (IIOP)
Real-time analysis
12. Test data are processed in production systems. The data usually represent a set of fictitious entities such as departments; customers and products. Output reports are verified to confirm the correctness of the processing.
Objectivity
ASCII (American Standard Code for Information Interchange)
Data security
Integrated test facilities (ITF)
13. A document which defines the IS audit function's responsibility; authority and accountability
Card swipes
Audit charter
Logical access controls
Smart card
14. Generally; the assumption that an entity will behave substantially as expected. Trust may apply only for a specific function. The key role of this term in an authentication framework is to describe the relationship between an authenticating entity an
Electronic funds transfer (EFT)
Security/transaction risk
Trust
Edit controls
15. The code used to designate the location of a specific piece of data within computer storage
Consumer
Address
Analog
Alpha
16. A protocol originally developed by Netscape Communications to provide a high level of security for its browser software. It has become accepted widely as a means of securing Internet message exchanges. It ensures confidentiality of the data in transm
Error risk
Computer-aided software engineering (CASE)
Hash total
Scure socket layer (SSL)
17. Specifies the length of the file's record and the sequence and size of its fields. A file layout also will specify the type of data contained within each field. For example; alphanumeric; zoned decimal; packed and binary are types of data.
Application proxy
File layout
Hash function
Peripherals
18. In a passive assault; intruders attempt to learn some characteristic of the data being transmitted. They may be able to read the contents of the data so the privacy of the data is violated. Alternatively; although the content of the data itself may r
Firewall
Passive assault
Fscal year
Credentialed analysis
19. Organizations that have no official physical site presence and are made up of diverse geographically dispersed or mobile employees.
virtual organizations
Program flowcharts
Data security
Utility programs
20. A communication network that serves several users within a specified geographic area. It is made up of servers; workstations; a network operating system and a communications link. Personal computer LANs function as distributed processing systems in w
Digital certification
Real-time processing
Local area network (LAN)
COBIT
21. (remote authentication dial-in user service)
Audit risk
RADIUS
Security administrator
Coverage
22. Small computers used to connect and coordinate communication links between distributed or remote devices and the main computer; thus freeing the main computer from this overhead function
Communications controller
Extensible Markup Language (XML)
Independent appearance
Hierarchical database
23. A device used for combining several lower-speed channels into a higher-speed channel
TCP (transmission control protocol)
Multiplexor
Offline files
Trojan horse
24. A protocol developed by the object management group (OMG) to implement Common Object Request Broker Architecture (CORBA) solutions over the World Wide Web. CORBA enables modules of network-based programs to communicate with one another. These modules
Frame relay
Application proxy
Application programming
Internet Inter-ORB Protocol (IIOP)
25. Refers to the security of the infrastructure that supports the ERP networking and telecommunications; operating systems and databases.
Program flowcharts
Technical infrastructure security
Optical scanner
IEEE (Institute of Electrical and Electronics Engineers)--Pronounced I-triple-E
26. Typically in large organisations where the quantum of data processed by the ERPs are extremely voluminous; analysis of patterns and trends prove to be extremely useful in ascertaining the efficiency and effectiveness of operations. Most ERPs provide
Digital certification
TCP (transmission control protocol)
Data analysis
Cleartext
27. A 24-hour; stand-alone mini-bank; located outside branch bank offices or in public places like shopping malls. Through ATMs; clients can make deposits; withdrawals; account inquiries and transfers. Typically; the ATM network is comprised of two spher
Cross-certification
Harden
Automated teller machine (ATM)
End-user computing
28. An XML-formatted language used to describe a web service's capabilities as collections of communication endpoints capable of exchanging messages. WSDL is the language that UDDI uses. (Also see Universal Description; Discovery and Integration (UDDI))
Cleartext
Web Services Description Language (WSDL)
Credit risk
Rulebase
29. A telecommunications carrier's facilities in a local area in which service is provided where local service is switched to long distance
Centralized data processing
Central office (CO)
Client-server
File
30. A high level description of the audit work to be performed in a certain period of time (ordinarily a year). It includes the areas to be audited; the type of work planned; the high level objectives and scope of the work; and topics such as budget; res
Intrusive monitoring
TCP/IP protocol (Transmission Control Protocol/Internet Protocol)
Piggy backing
Audit plan
31. A protocol used to transfer files over a TCP/IP network (Internet; UNIX; etc.)
Bar code
FTP (file transfer protocol)
Performance testing
Applet
32. A transmission signal that varies continuously in amplitude and time and is generated in wave formation. Analog signals are used in telecommunications.
Analog
ICMP (internet control message protocol)
File layout
Reputational risk
33. The act of capturing network packets; including those not necessarily destined for the computer running the sniffing software
Computer-aided software engineering (CASE)
Due care
Due professional care
Sniff
34. A type of password (i.e.; a secret number assigned to an individual) that; in conjunction with some means of identifying the individual; serves to verify the authenticity of the individual. PINs have been adopted by financial institutions as the prim
Financial audit
Idle standby
Personal identification number (PIN)
Residual risk
35. A certificate issued by one certification authority to a second certification authority so that users of the first certification authority are able to obtain the public key of the second certification authority and verify the certificates it has crea
Cross-certification
Vulnerability analysis
Digital certificate
Format checking
36. A structure of relationships and processes to direct and control the enterprise in order to achieve the enterprise's goals by adding value while balancing risk versus return over IT and its processes
Inherent risk
IT governance
Source documents
Asynchronous transmission
37. A recovery solution provided by recovery and/or hardware vendors and includes a pre-established contract to deliver hardware resources within a specified number amount of hours after a disaster occurs. This solution usually provides organizations wit
Dial-in access controls
Bypass label processing (BLP)
Quick ship
Baud rate
38. Computer operating instructions which detail the step-by-step processes that are to occur so an application system can be properly executed. It also identifies how to address problems that occur during processing.
Run instructions
Control group
Intrusive monitoring
Validity check
39. A device that forms a barrier between a secure and an open environment. Usually; the open environment is considered hostile. The most notable hostile environment is the Internet. In other words; a firewall enforces a boundary between two or more netw
Digital signature
Man-in-the-middle attack
Firewall
Source code compare programs
40. Detects transmission errors by appending calculated bits onto the end of each segment of data
HTTP (hyper text transfer protocol)
RADIUS (remote authentication dial-in user service)
Redundancy check
Anonymous File Transfer Protocol (FTP)
41. Point at which terminals are given access to a network
Node
Optical character recognition
Access path
Repudiation
42. A flag set in a packet to indicate that this packet is the final data packet of the transmission
UDDI
Detailed IS ontrols
Addressing
FIN (final)
43. An exception report is generated by a program that identifies transactions or data that appear to be incorrect. These items may be outside a predetermined range or may not conform to specified criteria.
Exception reports
Reliable audit evidence
Man-in-the-middle attack
COBIT
44. Impartial point of view which allows the IS auditor to act objectively and with fairness
Anonymity
Independent attitude
DoS (denial-of-service) attack
Data communications
45. In vulnerability analysis; gaining information by performing checks that affects the normal operation of the system; even crashing the system
Intrusive monitoring
Database management system (DBMS)
Hash total
Manual journal entry
46. A set of utilities that implement a particular network protocol. For instance; in Windows machines a TCP/IP stack consists of TCP/IP software; sockets software and hardware driver software.
Whitebox testing
Protocol stack
Allocation entry
Appearance
47. A system of interconnected computers and the communications equipment used to connect them
Network
Masking
Indexed sequential file
PPTP (point-to-point tunneling protocol)
48. Audit evidence is relevant if it pertains to the audit objectives and has a logical relationship to the findings and conclusions it is used to support.
Telecommunications
Interest rate risk
Control risk self-assessment
Relevant audit evidence
49. A packet-switched wide-area-network technology that provides faster performance than older packet-switched WAN technologies such as X.25 networks; because it was designed for today's reliable circuits and performs less rigorous error detection. Frame
Monitoring policy
Protocol stack
Program narratives
Frame relay
50. A system development technique that enables users and developers to reach agreement on system requirements. Prototyping uses programmed simulation techniques to represent a model of the final system to the user for advisement and critique. The emphas
Prototyping
Detection risk
Operational risk
Security policy
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests