SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Is the risk to earnings or capital arising from a bank's inability to meet its obligations when they come due; without incurring unacceptable losses. Internet banking may increase deposit volatility from customers who maintain accounts solely on the
System exit
liquidity risk
Security perimeter
Independent attitude
2. The total of any numeric data field on a document or computer file. This total is checked against a control total of the same field to facilitate accuracy of processing.
Business risk
Worm
Logical access controls
Hash total
3. A popular local area network operating system developed by the Novell Corp.
Netware
Communications controller
Gateway
Decision support systems (DSS)
4. Detects line errors by retransmitting data back to the sending device for comparison with the original transmission
Echo checks
Credentialed analysis
Performance indicators
Coupling
5. A programmed edit or routine that detects transposition and transcription errors by calculating and checking the check digit
Run-to-run totals
Check digit verification (self-checking digit)
Data communications
Batch control
6. A collection of computer programs used in the design; processing and control of all applications. The programs and processing routines that control the computer hardware; including the operating system and utility programs. Refers to the operating sy
Operational risk
Default deny policy
System software
Access control
7. Any information collection mechanism utilized by an intrusion detection system
Monitor
Enterprise resource planning
Ring topology
Privilege
8. Detection on the basis of whether the system activity matched that defined as abnormal
Anomaly detection
Electronic data interchange (EDI)
Worm
Attitude
9. Audit evidence is useful if it assists the IS auditors in meeting their audit objectives.
Warm-site
Detailed IS ontrols
Network hop
Useful audit evidence
10. A router that is configured to control network access by comparing the attributes of the incoming or outgoing packets to a set of rules
ACK (acknowledgement)
Central processing unit (CPU)
Filtering router
Telnet
11. Analysis of the security state of a system or its compromise on the basis of information collected at intervals
Tape management system (TMS)
Compensating control
Switch
Vulnerability analysis
12. A system development methodology that is organised around ''objects'' rather than ''actions;' and 'data ' rather than 'logic.' Object-oriented analysis is an assessment of a physical system to determine which objects in the real world need to be repr
Object-oriented system development
Frame relay
Procedure
Audit charter
13. Auxiliary computer hardware equipment used for input; output and data storage. Examples include disk drives and printers.
Peripherals
Compensating control
Payment system
E-mail/interpersonal messaging
14. A fail-over process in which the primary node owns the resource group. The backup node runs idle; only supervising the primary node. In case of a primary node outage; the backup node takes over. The nodes are prioritized; which means the surviving no
Packet switching
Communications controller
Data leakage
Idle standby
15. A phase of an SDLC methodology where the affected user groups define the requirements of the system for meeting the defined needs
Interface testing
Numeric check
Vulnerability analysis
Requirements definition
16. Commonly it is the network segment between the Internet and a private network. It allows access to services from the Internet and the internal private network; while denying access from the Internet directly to the private network.
DMZ (demilitarized zone)
Independence
Cryptography
Audit authority
17. Refers to the controls that support the process of transformation of the organisation's legacy information systems into the ERP applications. This would largely cover all aspects of systems implementation and configuration; such as change management
implementation life cycle review
Diskless workstations
Gateway
Controls (Control procedures)
18. Impartial point of view which allows the IS auditor to act objectively and with fairness
Independent attitude
Object Management Group (OMG)
Piggy backing
Administrative controls
19. 1) The set of management statements that documents an organization's philosophy of protecting its computing and information assets 2) The set of security rules enforced by the system's security features
Security testing
Half duplex
Objectivity
Security policy
20. The transfer of data between separate computer processing sites/devices using telephone lines; microwave and/or satellite links
Data communications
L2TP (Layer 2 tunneling protocol)
Appearance
TCP/IP protocol (Transmission Control Protocol/Internet Protocol)
21. The susceptibility of an audit area to error which could be material; individually or in combination with other errors; assuming that there are no related internal controls
Systems analysis
ACK (acknowledgement)
Inherent risk
File
22. The art of designing; analyzing and attacking cryptographic schemes
Internal storage
Utility software
Cryptography
System testing
23. The application of audit procedures to less than 100 percent of the items within a population to obtain audit evidence about a particular characteristic of the population
Audit sampling
Multiplexing
Useful audit evidence
File layout
24. A file of semipermanent information that is used frequently for processing data or for more than one purpose
Router
Master file
legal risk
Business impact analysis (BIA)
25. Defined by ISACA as the processes by which organisations conduct business electronically with their customers; suppliers and other external business partners; using the Internet as an enabling technology. It therefore encompasses both business-to-bus
Relevant audit evidence
Synchronous transmission
e-commerce
Brute force
26. Audit evidence is relevant if it pertains to the audit objectives and has a logical relationship to the findings and conclusions it is used to support.
Relevant audit evidence
Encryption key
IPSec (Internet protocol security)
Hash function
27. Programs that are tested and evaluated before approval into the production environment. Test programs; through a series of change control moves; migrate from the test environment to the production environment and become production programs.
Split DNS
FTP (file transfer protocol)
Sufficient audit evidence
Test programs
28. Polymorphism refers to database structures that send the same command to different child objects that can produce different results depending on their family hierarchical tree structure.
Polymorphism (objects)
Teleprocessing
Assembler
Non-intrusive monitoring
29. A financial system that establishes the means for transferring money between suppliers and users of funds; ordinarily by exchanging debits or credits between banks or financial institutions.
Active response
Ring topology
Payment system
Misuse detection
30. An international consortium founded in 1994 of affiliates from public and private organizations involved with the Internet and the web. The W3C's primary mission is to promulgate open standards to further enhance the economic growth of Internet web s
Database replication
Detection risk
World Wide Web Consortium (W3C)
Risk
31. A physical control technique that uses a secured card or ID to gain access to a highly sensitive location. Card swipes; if built correctly; act as a preventative control over physical access to those sensitive locations. After a card has been swiped;
SMTP (Simple Mail Transport Protocol)
Card swipes
Parallel simulation
Comprehensive audit
32. The amount of time allowed for the recovery of a business function or resource after a disaster occurs
Recovery time objective (RTO)
Rotating standby
Audit plan
Recovery testing
33. Systems that employ sufficient hardware and software assurance measures to allow their use for processing of a range of sensitive or classified information
Trusted systems
Decision support systems (DSS)
Packet filtering
Nonrepudiable trnasactions
34. The roles; scope and objectives documented in the service level agreement between management and audit
Audit responsibility
Manual journal entry
File
Computer sequence checking
35. Any intentional violation of the security policy of a system
Intrusion
Data owner
Electronic signature
Packet switching
36. The process of actually entering transactions into computerized or manual files. Such transactions might immediately update the master files or may result in memo posting; in which the transactions are accumulated over a period of time; then applied
Credit risk
Project team
Due professional care
Posting
37. Compares data to predefined reasonability limits or occurrence rates established for the data.
Cathode ray tube (CRT)
Telecommunications
Reasonableness check
Encryption key
38. Requiring a great deal of computing power; processor intensive
Due care
Artificial intelligence
Warm-site
Computationally greedy
39. Specifies the length of the file's record and the sequence and size of its fields. A file layout also will specify the type of data contained within each field. For example; alphanumeric; zoned decimal; packed and binary are types of data.
Smart card
Worm
Job control language (JCL)
File layout
40. English-like; user friendly; nonprocedural computer languages used to program and/or read and process computer files
Fourth generation language (4GL)
War dialler
Content filtering
Anonymous File Transfer Protocol (FTP)
41. The transmission of more than one signal across a physical channel
L2TP (Layer 2 tunneling protocol)
War dialler
Extensible Markup Language (XML)
Multiplexing
42. A set of routines; protocols and tools referred to as ''building blocks'' used in business application software development. A good API makes it easier to develop a program by providing all the building blocks related to functional characteristics of
Integrity
Intelligent terminal
Dial-in access controls
Application programming interface (API)
43. The organization providing the outsourced service
Continuity
Computationally greedy
Finger
Service provider
44. A router configured to permit or deny traffic based on a set of permission rules installed by the administrator
Queue
Screening routers
Variable sampling
browser
45. The exchange of money via telecommunications. EFT refers to any financial transaction that originates at a terminal and transfers a sum of money from one account to another.
ASCII (American Standard Code for Information Interchange)
Electronic funds transfer (EFT)
Promiscuous mode
Objectivity
46. A discussion document which sets out an ''Enterprise Governance Model'' focusing strongly on both the enterprise business goals and the information technology enablers which facilitate good enterprise governance; published by the Information Systems
Compiler
Control Objectives for Enterprise Governance
Windows NT
Business impact analysis (BIA)
47. A policy whereby access is denied unless it is specifically allowed. The inverse of default allow.
Audit risk
Anomaly detection
Default deny policy
PPTP (point-to-point tunneling protocol)
48. An assault on a service from a single source that floods it with so many requests that it becomes overwhelmed and is either stopped completely or operates at a significantly reduced rate
DoS (denial-of-service) attack
Router
Salami technique
Judgment sampling
49. The objectives of management that are used as the framework for developing and implementing controls (control procedures).
Telecommunications
Control objective
Procedure
Surge suppressor
50. 1) The process of establishing and maintaining security in a computer or network system. The stages of this process include prevention of security problems; detection of intrusions; investigation of intrusions and resolution.2) In network management;
Logs/Log file
Security management
Decryption
Encryption
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests