SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An international consortium founded in 1994 of affiliates from public and private organizations involved with the Internet and the web. The W3C's primary mission is to promulgate open standards to further enhance the economic growth of Internet web s
Vulnerability analysis
World Wide Web Consortium (W3C)
Batch processing
Audit
2. The possibility of an act or event occurring that would have an adverse effect on the organization and its information systems
COCO
Program flowcharts
SMTP (Simple Mail Transport Protocol)
Risk
3. These controls exist to detect and report when errors; omissions and unauthorized uses or entries occur.
Operating system audit trails
Tape management system (TMS)
Detective controls
Masking
4. A packet-switched wide-area-network technology that provides faster performance than older packet-switched WAN technologies such as X.25 networks; because it was designed for today's reliable circuits and performs less rigorous error detection. Frame
Frame relay
Audit charter
COBIT
ICMP (internet control message protocol)
5. The total of any numeric data field on a document or computer file. This total is checked against a control total of the same field to facilitate accuracy of processing.
COBIT
Cluster controller
Hash total
Bus topology
6. The calendar can contain 'real' accounting periods and/or adjusting accounting periods. The 'real' accounting periods must not overlap; and cannot have any gaps between 'real' accounting periods. Adjusting accounting periods can overlap with other ac
Access path
Split DNS
Journal entry
Adjusting period
7. A method for downloading public files using the File Transfer Protocol (FTP). Anonymous FTP is called anonymous because users do not need to identify themselves before accessing files from a particular server. In general; users enter the word anonymo
Intranet
Internet packet (IP) spoofing
Anonymous File Transfer Protocol (FTP)
Redo logs
8. In vulnerability analysis; passive monitoring approaches in which passwords or other access credentials are required. This sort of check usually involves accessing a system data object.
Appearance of independence
Credentialed analysis
Integrated services digital network (ISDN)
Project team
9. The transfer of service from an incapacitated primary component to its backup component
world wide web (WWW)
Security perimeter
Fail-over
Application system
10. The process of determining what types of activities are permitted. Ordinarily; authorisation is in the context of authentication: once you have authenticated a user; he/she may be authorised to perform different types of access or activity
Authorization
Control objective
Content filtering
Internal control
11. Inheritance refers to database structures that have a strict hierarchy (no multiple inheritance). Inheritance can initiate other objects irrespective of the class hierarchy; thus there is no strict hierarchy of objects.
Filtering router
Batch control
Audit charter
Inheritance (objects)
12. The potential loss to an area due to the occurrence of an adverse event
Netware
Exposure
Link editor (linkage editor)
Trust
13. Transactions that cannot be denied after the fact
Telnet
Nonrepudiable trnasactions
Packet
Budget
14. An edit check designed to ensure the data in a particular field is numeric
Piggy backing
Network administrator
RADIUS (remote authentication dial-in user service)
Numeric check
15. A destructive computer program that spreads from computer to computer using a range of methods; including infecting floppy disks and other programs. Viruses typically attach themselves to a program and modify it so that the virus code runs when the p
Operating system
Local area network (LAN)
Virus
FTP (file transfer protocol)
16. In intrusion detection; an error that occurs when a normal activity is misdiagnosed as an attack
False positive
Downloading
IEEE (Institute of Electrical and Electronics Engineers)--Pronounced I-triple-E
NAT (Network Address Translation)
17. A data dictionary is a database that contains the name; type; range of values; source and authorization for access for each data element in a database. It also indicates which application programs use that data so that when a data structure is contem
Application programming
Program flowcharts
Embedded audit module
Data dictionary
18. The rate of transmission for telecommunication data. It is expressed in bits per second (bps).
Operating system
Harden
Attribute sampling
Baud rate
19. A discussion document which sets out an ''Enterprise Governance Model'' focusing strongly on both the enterprise business goals and the information technology enablers which facilitate good enterprise governance; published by the Information Systems
Edit controls
Redundancy check
Control Objectives for Enterprise Governance
Internet Inter-ORB Protocol (IIOP)
20. Unusual or statistically rare
HTTP (hyper text transfer protocol)
Anomaly
Control section
Active recovery site (mirrored)
21. A private network that uses the infrastructure and standards of the Internet and World Wide Web; but is isolated from the public Internet by firewall barriers.
Parity check
Computer-assisted audit technique (CAATs)
Intranet
Database management system (DBMS)
22. A protocol originally developed by Netscape Communications to provide a high level of security for its browser software. It has become accepted widely as a means of securing Internet message exchanges. It ensures confidentiality of the data in transm
COCO
Source code compare programs
Scure socket layer (SSL)
Recovery testing
23. Used to enable remote access to a server computer. Commands typed are run on the remote server.
Multiplexing
Virtual private network (VPN)
Telnet
Duplex routing
24. A device that forwards packets between LAN devices or segments. LANs that use switches are called switched LANs.
Piggy backing
Source lines of code (SLOC)
Antivirus software
Switch
25. A series of tests designed to ensure that the modified program interacts correctly with other system components. These test procedures typically are performed by the system maintenance staff in their development library.
Degauss
Dry-pipe fire extinguisher system
Security administrator
System testing
26. The process of generating; recording and reviewing a chronological record of system events to ascertain their accuracy
Regression testing
Audit
Personal identification number (PIN)
Fail-safe
27. The elimination of redundant data
Production programs
Windows NT
Intranet
Normalization
28. The consolidation in 1998 of the ''Cadbury;'' ''Greenbury'' and ''Hampel'' Reports. Named after the Committee Chairs; these reports were sponsored by the UK Financial Reporting Council; the London Stock Exchange; the Confederation of British Industry
Trap door
Application security
Combined Code on Corporate Governance
SMTP (Simple Mail Transport Protocol)
29. Processing is achieved by entering information into the computer via a video display terminal. The computer immediately accepts or rejects the information; as it is entered.
Online data processing
Irregularities
System narratives
Administrative controls
30. A set of protocols developed by the IETF to support the secure exchange of packets
Software
Application system
Systems development life cycle (SDLC)
IPSec (Internet protocol security)
31. Is an electronic pathway that may be displayed in the form of highlighted text; graphics or a button that connects one web page with another web page address.
Central processing unit (CPU)
Independent attitude
Hyperlink
War dialler
32. A set of communications protocols that encompasses media access; packet transport; session communications; file transfer; electronic mail; terminal emulation; remote file access and network management. TCP/IP provides the basis for the Internet.
TCP/IP protocol (Transmission Control Protocol/Internet Protocol)
Token ring topology
Voice mail
Dial-in access controls
33. A stored collection of related data needed by organizations and individuals to meet their information processing and retrieval requirements
Database
implementation life cycle review
Audit accountability
Utility programs
34. A third party that delivers and manages applications and computer services; including security services to multiple users via the Internet or a private network
Duplex routing
Client-server
ASP/MSP (application or managed service provider)
Application programming interface (API)
35. An individual data element in a computer record. Examples include employee name; customer address; account number; product unit price and product quantity in stock.
Multiplexing
Audit
Privilege
Field
36. A process used to identify and evaluate risks and their potential effects
Log
Challenge/response token
Risk assessment
Repudiation
37. The area of the system that the intrusion detection system is meant to monitor and protect
Protection domain
Cadbury
Public key
Edit controls
38. The ability to exercise judgement; express opinions and present recommendations with impartiality
Rounding down
SMTP (Simple Mail Transport Protocol)
Access control table
Objectivity
39. The rules outlining the way in which information is captured and interpreted
Vaccine
Prototyping
Access control table
Monitoring policy
40. Files created specifically to record various actions occurring on the system to be monitored; such as failed login attempts; full disk drives and e-mail delivery failures
ISO17799
Cross-certification
Biometrics
Logs/Log file
41. A protocol used for transmitting data between two ends of a connection
Analog
Split data systems
PPP (point-to-point protocol)
Tape management system (TMS)
42. Used as a control over dial-up telecommunications lines. The telecommunications link established through dial-up into the computer from a remote location is interrupted so the computer can dial back to the caller. The link is permitted only if the ca
Dial-back
Point-of-presence (POP)
HTTP (hyper text transfer protocol)
Engagement letter
43. Confidentiality concerns the protection of sensitive information from unauthorized disclosure
Top-level management
Confidentiality
Interface testing
Database specifications
44. An exchange rate; which can be used optionally to perform foreign currency conversion. The corporate exchange rate is generally a standard market rate determined by senior financial management for use throughout the organization.
Dynamic analysis
Detailed IS ontrols
Scheduling
Corporate exchange rate
45. The structure through which the objectives of an organization are set; and the means of attaining those objectives; and determines monitoring performance guidelines. Good corporate governance should provide proper incentives for board and management
Corporate governance
Packet
Brute force
Finger
46. The boundary that defines the area of security concern and security policy coverage
Security perimeter
Verification
Default deny policy
Biometrics
47. A communications channel over which data can be sent and received simultaneously
Dynamic analysis
Attitude
Full duplex
Rapid application development
48. An assault on a service from a single source that floods it with so many requests that it becomes overwhelmed and is either stopped completely or operates at a significantly reduced rate
HTTPS (hyper text transfer protocol secure)
Web page
Payment system
DoS (denial-of-service) attack
49. A form of attribute sampling that is used to determine a specified probability of finding at least one example of an occurrence (attribute) in a population
Discovery sampling
Electronic vaulting
War dialler
Hyperlink
50. The forms used to record data that have been captured. A source document may be a piece of paper; a turnaround document or an image displayed for online data input.
Journal entry
Source documents
Application maintenance review
Simple Object Access Protocol (SOAP)