SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A computer facility that provides data processing services to clients on a continual basis
Asymmetric key (public key)
Demodulation
Protection domain
Service bureau
2. Character-at-a-time transmission
Independent attitude
liquidity risk
Asynchronous transmission
Audit plan
3. A testing technique that is used to evaluate output from one application; while the information is sent as input to another application
Default password
Biometric locks
Direct reporting engagement
Interface testing
4. Software that is being used and executed to support normal and authorized organizational operations. Such software is to be distinguished from test software; which is being developed or modified; but has not yet been authorized for use by management.
Production software
RADIUS (remote authentication dial-in user service)
Risk
Voice mail
5. An XML-formatted language used to describe a web service's capabilities as collections of communication endpoints capable of exchanging messages. WSDL is the language that UDDI uses. (Also see Universal Description; Discovery and Integration (UDDI))
Sniffing
Parallel testing
Detailed IS ontrols
Web Services Description Language (WSDL)
6. An international standard that defines information confidentiality; integrity and availability controls
External router
Mutual takeover
Information processing facility (IPF)
ISO17799
7. Individuals and departments responsible for the storage and safeguarding of computerized information. This typically is within the IS organization.
Security software
Data custodian
Business-to-consumer e-commerce (B2C)
Audit plan
8. Verifies that the control number follows sequentially and any control numbers out of sequence are rejected or noted on an exception report for further research
External router
Statistical sampling
Computer sequence checking
FIN (final)
9. An attack strategy in which the attacker successively hacks into a series of connected systems; obscuring his/her identify from the victim of the attack
Machine language
Sufficient audit evidence
Proxy server
Network hop
10. Is the risk to earnings or capital arising from movements in interest rates. From an economic perspective; a bank focuses on the sensitivity of the value of its assets; liabilities and revenues to changes in interest rates. Internet banking may attra
Anomaly
vulnerability
Ring topology
Interest rate risk
11. ATM is a high-bandwidth low-delay switching and multiplexing technology. It is a data link layer protocol. This means that it is a protocol-independent transport mechanism. ATM allows integration of real-time voice and video as well as data. ATM allo
ASP/MSP (application or managed service provider)
Asynchronous Transfer Mode (ATM)
Biometric locks
Capacity stress testing
12. Estimated cost and revenue amounts for a given range of periods and set of books. There can be multiple budget versions for the same set of books.
Audit authority
Budget
Telecommunications
Token
13. An interactive system that provides the user with easy access to decision models and data; to support semistructured decision-making tasks
Remote procedure calls (RPCs)
Independence
Librarian
Decision support systems (DSS)
14. A code whose representation is limited to 0 and 1
Backup
Computer server
Credit risk
Binary code
15. Analysis of the security state of a system or its compromise on the basis of information collected at intervals
Validity check
E-mail/interpersonal messaging
Vulnerability analysis
Universal Description; Discovery and Integration (UDDI)
16. A test that has been designed to evaluate the performance of a system. In a benchmark test; a system is subjected to a known workload and the performance of the system against this workload is measured. Typically; the purpose is to compare the measur
Benchmark
Man-in-the-middle attack
Asynchronous transmission
ASP/MSP (application or managed service provider)
17. A public key cryptosystem developed by R. Rivest; A. Shamir and L. Adleman. The RSA has two different keys; the public encryption key and the secret decryption key. The strength of the RSA depends on the difficulty of the prime number factorization.
RSA
Corporate governance
Source lines of code (SLOC)
Inherent risk
18. Glass fibers that transmit binary signals over a telecommunications network. Fiber optic systems have low transmission losses as compared to twisted-pair cables. They do not radiate energy or conduct electricity. They are free from corruption and lig
Project sponsor
Fiber optic cable
Address space
Professional competence
19. These controls exist to detect and report when errors; omissions and unauthorized uses or entries occur.
RADIUS
Computer sequence checking
Brouters
Detective controls
20. A data recovery strategy that allows organizations to recover data within hours after a disaster. It includes recovery of data from an offsite storage media that mirrors data via a communication link. Typically used for batch/journal updates to criti
Computer-assisted audit technique (CAATs)
Appearance of independence
Electronic vaulting
Quick ship
21. A packet-switched wide-area-network technology that provides faster performance than older packet-switched WAN technologies such as X.25 networks; because it was designed for today's reliable circuits and performs less rigorous error detection. Frame
Recovery time objective (RTO)
Frame relay
Star topology
Hash function
22. The rate of transmission for telecommunication data. It is expressed in bits per second (bps).
Utility software
Windows NT
Split data systems
Baud rate
23. Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes
Data leakage
Object-oriented system development
Permanent virtual circuit (PVC)
Misuse detection
24. Used to electronically scan and input written information from a source document
Data diddling
Incremental testing
Switch
Optical character recognition
25. A cipher technique whereby different cryptographic keys are used to encrypt and decrypt a message (see public key cryptosystems)
Librarian
Relevant audit evidence
Asymmetric key (public key)
Master file
26. The password used to gain access when a system is first installed on a computer or network device. There is a large list published on the Internet and maintained at several locations. Failure to change these after the installation leaves the system v
Artificial intelligence
Default password
Hot site
Anonymity
27. A technique of reading a computer file while bypassing the internal file/data set label. This process could result in bypassing of the security access control system.
Online data processing
Bypass label processing (BLP)
Program narratives
Web site
28. Any information collection mechanism utilized by an intrusion detection system
Monitor
General computer controls
Bandwidth
Modulation
29. The process of taking an unencrypted message (plaintext); applying a mathematical function to it (encryption algorithm with a key) and producing an encrypted message (ciphertext)
Datagram
Encryption
Useful audit evidence
False positive
30. A technique used to recover the original plaintext from the ciphertext such that it is intelligible to the reader. The decryption is a reverse process of the encryption.
Decryption
Appearance of independence
Privacy
Web page
31. Emergency processing agreements between two or more organizations with similar equipment or applications. Typically; participants promise to provide processing time to each other when an emergency arises.
Audit
TACACS+ (terminal access controller access control system plus)
Continuity
Reciprocal agreement
32. The process of converting a digital computer signal into an analog telecommunications signal
System narratives
Validity check
Modulation
Abend
33. A type of service providing an authentication and accounting system often used for dial-up and remote access security
Cross-certification
Nonrepudiation
NAT (Network Address Translation)
RADIUS (remote authentication dial-in user service)
34. Door and entry locks that are activated by such biometric features as voice; eye retina; fingerprint or signature
Repudiation
Auditability
Biometric locks
Hot site
35. A program designed to detect computer viruses
Budget organization
ISP (Internet service provider)
Cathode ray tube (CRT)
Vaccine
36. An approach to system development where the basic unit of attention is an object; which represents an encapsulation of both data (an object's attributes) and functionality (an object's methods). Objects usually are created using a general template ca
Librarian
Application programming interface (API)
Buffer
Object orientation
37. The processing of a group of transactions at the same time. Transactions are collected and processed against the master files at a specified time.
File server
Credentialed analysis
Standing data
Batch processing
38. A piece of information; in a digitized form; used by an encryption algorithm to convert the plaintext to the ciphertext
Cleartext
Trust
Encryption key
Journal entry
39. An audit designed to determine the accuracy of financial records and information
Queue
Application system
Financial audit
liquidity risk
40. A language; which enables electronic documents that present information that can be connected together by links instead of being presented sequentially; as is the case with normal text.
Master file
Hypertext
Applet
Logon
41. The risk that an error which could occur in an audit area; and which could be material; individually or in combination with other errors; will not be prevented or detected and corrected on a timely basis by the internal control system
Transaction
X.500
Control risk
UDDI
42. A discussion document which sets out an ''Enterprise Governance Model'' focusing strongly on both the enterprise business goals and the information technology enablers which facilitate good enterprise governance; published by the Information Systems
Control Objectives for Enterprise Governance
Decryption key
Fraud risk
Personal identification number (PIN)
43. An attack using packets with the spoofed source Internet packet (IP) addresses. This technique exploits applications that use authentication based on IP addresses. This technique also may enable an unauthorized user to gain root access on the target
Monitoring policy
Substantive testing
Internet packet (IP) spoofing
Librarian
44. An exchange rate; which can be used optionally to perform foreign currency conversion. The corporate exchange rate is generally a standard market rate determined by senior financial management for use throughout the organization.
Discovery sampling
Corporate exchange rate
War dialler
Recovery time objective (RTO)
45. Data-oriented development techniques that work on the premise that data are at the center of information processing and that certain data relationships are significant to a business and must be represented in the data structure of its systems
Recovery point objective (RPO)—
Information engineering
Database management system (DBMS)
System flowcharts
46. A stored collection of related data needed by organizations and individuals to meet their information processing and retrieval requirements
Database
Numeric check
Application layer
Program evaluation and review technique (PERT)
47. A recovery solution provided by recovery and/or hardware vendors and includes a pre-established contract to deliver hardware resources within a specified number amount of hours after a disaster occurs. This solution usually provides organizations wit
Multiplexor
Quick ship
Systems development life cycle (SDLC)
Application program
48. A low-level computer programming language which uses symbolic code and produces machine instructions
Analog
Packet switching
System flowcharts
Assembly language
49. An individual using a terminal; PC or an application can access a network to send an unstructured message to another individual or group of people.
Performance indicators
Penetration testing
E-mail/interpersonal messaging
Limit check
50. The most important types of operational risk involve breakdowns in internal controls and corporate governance. Such breakdowns can lead to financial losses through error; fraud or failure to perform in a timely manner or cause the interests of the ba
Alpha
Audit authority
Bypass label processing (BLP)
Operational risk
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests