Test your basic knowledge |

CISA Certified Information Systems Auditor Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The application of an edit; using a predefined field definition to a submitted information stream; a test to ensure that data conform to a predefined format






2. A phone number that represents the area in which the communications provider or Internet service provider (ISP) provides service






3. The risk of errors occurring in the area being audited






4. A utility program that combines several separately compiled modules into one; resolving internal references between them






5. An internal computerized table of access rules regarding the levels of computer access permitted to logon IDs and computer terminals






6. A workstation or PC on a network that does not have its own disk. Instead; it stores files on a network file server.






7. A protected; generally computer-encrypted string of characters that authenticate a computer user to the computer system






8. Those policies and procedures implemented to achieve a related control objective






9. An edit check designed to ensure the data in a particular field is numeric






10. The highest level of management in the organization; responsible for direction and control of the organization as a whole (such as director; general manager; partner; chief officer and executive manager).






11. Individuals and departments responsible for the storage and safeguarding of computerized information. This typically is within the IS organization.






12. Inheritance refers to database structures that have a strict hierarchy (no multiple inheritance). Inheritance can initiate other objects irrespective of the class hierarchy; thus there is no strict hierarchy of objects.






13. Specifies the format of packets and the addressing scheme






14. A device that is used to authenticate a user; typically in addition to a username and password. It is usually a credit card-sized device that displays a pseudo random number that changes every few minutes.






15. Proven level of ability; often linked to qualifications issued by relevant professional bodies and compliance with their codes of practice and standards






16. An automated detail report of computer system activity






17. A method for downloading public files using the File Transfer Protocol (FTP). Anonymous FTP is called anonymous because users do not need to identify themselves before accessing files from a particular server. In general; users enter the word anonymo






18. A test that has been designed to evaluate the performance of a system. In a benchmark test; a system is subjected to a known workload and the performance of the system against this workload is measured. Typically; the purpose is to compare the measur






19. Is an electronic pathway that may be displayed in the form of highlighted text; graphics or a button that connects one web page with another web page address.






20. A high-capacity disk storage device or a computer that stores data centrally for network users and manages access to that data. File servers can be dedicated so that no process other than network management can be executed while the network is availa






21. A protocol and program that allows the remote identification of users logged into a system






22. English-like; user friendly; nonprocedural computer languages used to program and/or read and process computer files






23. Two trading partners both share one or more secrets. No one else can read their messages. A different key (or set of keys) is needed for each pair of trading partners. Same key is used for encryption and decryption. (Also see Private Key Cryptosystem






24. Describes the design properties of a computer system that allow it to resist active attempts to attack or bypass it






25. The area of the system that the intrusion detection system is meant to monitor and protect






26. Door and entry locks that are activated by such biometric features as voice; eye retina; fingerprint or signature






27. A consortium with more than 700 affiliates from the software industry. Its purpose is to provide a common framework for developing applications using object-oriented programming techniques. For example; OMG is known principally for promulgating the C






28. Self-governance and freedom from conflict of interest and undue influence. The IS auditor should be free to make his/her own decisions; not influenced by the organization being audited and its people (managers and employers).






29. Estimated cost and revenue amounts for a given range of periods and set of books. There can be multiple budget versions for the same set of books.






30. Used to electronically input; read and interpret information directly from a source document; requires the source document to have specially-coded magnetic ink typeset






31. Analysis that is performed on a continuous basis; with results gained in time to alter the run-time system






32. Relates to the technical and physical features of the computer






33. Intentional violations of established management policy or regulatory requirements. Deliberate misstatements or omissions of information concerning the area under audit or the organization as a whole; gross negligence or unintentional illegal acts.






34. The process of electronically inputting source documents by taking an image of the document; thereby eliminating the need for key entry






35. A program that translates programming language (source code) into machine executable instructions (object code)






36. The main memory of the computer's central processing unit






37. Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes






38. To configure a computer or other network device to resist attacks






39. The ability to map a given activity or event back to the responsible party






40. Diligence which a person would exercise under a given set of circumstances






41. The transfer of data between separate computer processing sites/devices using telephone lines; microwave and/or satellite links






42. In intrusion detection; an error that occurs when an attack is misdiagnosed as a normal activity






43. A programmed edit or routine that detects transposition and transcription errors by calculating and checking the check digit






44. A protocol for packet-switching networks






45. A visible trail of evidence enabling one to trace information contained in statements or reports back to the original input source






46. A computer program or series of programs designed to perform certain automated functions. These functions include reading computer files; selecting data; manipulating data; sorting data; summarizing data; performing calculations; selecting samples an






47. The method or communication mode of routing data over the communication network (also see half duplex and full duplex)






48. Audit evidence is useful if it assists the IS auditors in meeting their audit objectives.






49. The process of feeding test data into two systems; the modified system and an alternative system (possibly the original system) and comparing results






50. An algorithm that maps or translates one set of bits into another (generally smaller) so that a message yields the same result every time the algorithm is executed using the same message as input. It is computationally infeasible for a message to be