SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The electronic transmission of transactions (information) between two organizations. EDI promotes a more efficient paperless environment. EDI transmissions can replace the use of standard documents; including invoices or purchase orders.
Security perimeter
Centralized data processing
Business-to-consumer e-commerce (B2C)
Electronic data interchange (EDI)
2. To record details of information or events in an organized record-keeping system; usually sequenced in the order they occurred
Controls (Control procedures)
Penetration testing
Monetary unit sampling
Log
3. Way of thinking; behaving; feeling; etc.
Internal penetrators
Attitude
Internet Inter-ORB Protocol (IIOP)
Service bureau
4. A connectionless Internet protocol that is designed for network efficiency and speed at the expense of reliability. A data request by the client is served by sending packets without testing to verify if they actually arrive at the destination; not if
UDP (User Datagram Protocol)
Intrusion
Repudiation
Discovery sampling
5. Data-oriented development techniques that work on the premise that data are at the center of information processing and that certain data relationships are significant to a business and must be represented in the data structure of its systems
Topology
Attribute sampling
ASP/MSP (application or managed service provider)
Information engineering
6. Relates to the technical and physical features of the computer
Hardware
Central office (CO)
Wiretapping
Trap door
7. The boundary that defines the area of security concern and security policy coverage
Security perimeter
Program narratives
Centralized data processing
Monetary unit sampling
8. Expert systems are the most prevalent type of computer systems that arise from the research of artificial intelligence. An expert system has a built in hierarchy of rules; which are acquired from human experts in the appropriate field. Once input is
Expert systems
Password
Passive assault
Promiscuous mode
9. The amount of time allowed for the recovery of a business function or resource after a disaster occurs
Bus
Real-time processing
Recovery time objective (RTO)
Data integrity
10. A computer program or series of programs designed to perform certain automated functions. These functions include reading computer files; selecting data; manipulating data; sorting data; summarizing data; performing calculations; selecting samples an
Generalized audit software
Run instructions
Internet packet (IP) spoofing
Production software
11. A method used in the information processing facility (IPF) to determine and establish the sequence of computer job processing
Structured Query Language (SQL)
Address space
Scheduling
Assembler
12. A multiuser; multitasking operating system that is used widely as the master control program in workstations and especially servers
UNIX
Control group
Trap door
Packet filtering
13. A software suite designed to aid an intruder in gaining unauthorized administrative access to a computer system
Field
Fail-over
Control objective
Rootkit
14. A type of LAN architecture that utilizes a central controller to which all nodes are directly connected. All transmissions from one station to another pass through the central controller; which is responsible for managing and controlling all communic
Star topology
Honey pot
Application proxy
Password cracker
15. The Internet standards setting organization with affiliates internationally from network industry representatives. This includes all network industry developers and researchers concerned with evolution and planned growth of the Internet.
Demodulation
Security/transaction risk
Check digit
Internet Engineering Task Force (IETF)
16. The range between the highest and lowest transmittable frequencies. It equates to the transmission capacity of an electronic line and is expressed in bytes per second or Hertz (cycles per second).
Bridge
Active response
Bandwidth
Split data systems
17. A device for sending and receiving computerized data over transmission lines
Quick ship
War dialler
Terminal
Hub
18. Generally; the assumption that an entity will behave substantially as expected. Trust may apply only for a specific function. The key role of this term in an authentication framework is to describe the relationship between an authenticating entity an
Application software tracing and mapping
World Wide Web Consortium (W3C)
Redo logs
Trust
19. A program that translates programming language (source code) into machine executable instructions (object code)
Compiler
legal risk
Passive response
Bus
20. A piece of information; a digitized form of signature; that provides sender authenticity; message integrity and nonrepudiation. A digital signature is generated using the sender's private key or applying a one-way hash function.
Control group
Digital signature
Appearance
Decryption key
21. Inheritance refers to database structures that have a strict hierarchy (no multiple inheritance). Inheritance can initiate other objects irrespective of the class hierarchy; thus there is no strict hierarchy of objects.
Inheritance (objects)
Random access memory (RAM)
Blackbox testing
System testing
22. Refers to the controls that support the process of transformation of the organisation's legacy information systems into the ERP applications. This would largely cover all aspects of systems implementation and configuration; such as change management
Anonymous File Transfer Protocol (FTP)
implementation life cycle review
Base case
Requirements definition
23. A flag set in a packet to indicate that this packet is the final data packet of the transmission
Network administrator
Circuit-switched network
Masqueraders
FIN (final)
24. A type of password (i.e.; a secret number assigned to an individual) that; in conjunction with some means of identifying the individual; serves to verify the authenticity of the individual. PINs have been adopted by financial institutions as the prim
Personal identification number (PIN)
Public key
Link editor (linkage editor)
Single point of failure
25. A storage facility located away from the building housing the primary information processing facility (IPF); used for storage of computer media such as offline backup data and storage files
Regression testing
Prototyping
Data flow
Offsite storage
26. The process of feeding test data into two systems; the modified system and an alternative system (possibly the original system) and comparing results
business process integrity
Modem (modulator-demodulator)
Parallel testing
Field
27. Detection on the basis of whether the system activity matches that defined as bad
Application controls
Private key
SYN (synchronize)
Misuse detection
28. An extension to PPP to facilitate the creation of VPNs. L2TP merges the best features of PPTP (from Microsoft) and L2F (from Cisco).
Digital signature
Application controls
Internal control structure
L2TP (Layer 2 tunneling protocol)
29. A network monitoring and data acquisition tool that performs filter translation; packet acquisition and packet display
Appearance of independence
Payment system
Tcpdump
Echo checks
30. An Internet standard that allows a network to use one set of IP addresses for internal traffic and a second set of addresses for external traffic. The server; providing the NAT service; changes the source address of outgoing packets from the internal
Source lines of code (SLOC)
NAT (Network Address Translation)
Image processing
Hub
31. The risk that an error which could occur in an audit area; and which could be material; individually or in combination with other errors; will not be prevented or detected and corrected on a timely basis by the internal control system
Control risk
Console log
Queue
Payment system
32. The forms used to record data that have been captured. A source document may be a piece of paper; a turnaround document or an image displayed for online data input.
IPSec (Internet protocol security)
Source documents
Fiber optic cable
Technical infrastructure security
33. A protocol for packet-switching networks
Outsourcing
IDS (intrusion detection system)
Operating system
X.25
34. An exchange rate; which can be used optionally to perform foreign currency conversion. The corporate exchange rate is generally a standard market rate determined by senior financial management for use throughout the organization.
Relevant audit evidence
Windows NT
Corporate exchange rate
Baseband
35. The area of the system that the intrusion detection system is meant to monitor and protect
Operational control
Single point of failure
Binary code
Protection domain
36. A certificate issued by one certification authority to a second certification authority so that users of the first certification authority are able to obtain the public key of the second certification authority and verify the certificates it has crea
System narratives
Consumer
Sufficient audit evidence
Cross-certification
37. A private network that is configured within a public network. For years; common carriers have built VPNs that appear as private national or international networks to the customer; but physically share backbone trunks with other customers. VPNs enjoy
Middleware
browser
Bandwidth
Virtual private network (VPN)
38. Computer operating instructions which detail the step-by-step processes that are to occur so an application system can be properly executed. It also identifies how to address problems that occur during processing.
Encryption key
Point-of-sale systems (POS)
Data structure
Run instructions
39. To configure a computer or other network device to resist attacks
Confidentiality
Validity check
Extensible Markup Language (XML)
Harden
40. The transmission of job control language (JCL) and batches of transactions from a remote terminal location
Real-time processing
Management information system (MIS)
Network administrator
Remote job entry (RJE)
41. The risk of giving an incorrect audit opinion
Audit risk
Output analyzer
Project team
Central processing unit (CPU)
42. Recovery strategy that involves two active sites; each capable of taking over the other's workload in the event of a disaster. Each site will have enough idle processing power to restore data from the other site and to accommodate the excess workload
Service level agreement (SLA)
Database replication
Computationally greedy
Active recovery site (mirrored)
43. A set of routines; protocols and tools referred to as ''building blocks'' used in business application software development. A good API makes it easier to develop a program by providing all the building blocks related to functional characteristics of
Asymmetric key (public key)
Application programming interface (API)
Object Management Group (OMG)
Piggy backing
44. Used as a control over dial-up telecommunications lines. The telecommunications link established through dial-up into the computer from a remote location is interrupted so the computer can dial back to the caller. The link is permitted only if the ca
Rounding down
Unit testing
price risk
Dial-back
45. A set of metrics designed to measure the extent to which performance objectives are being achieved on an on-going basis. They can include service level agreements; critical success factors; customer satisfaction ratings; internal or external benchmar
Record; screen and report layouts
implementation life cycle review
L2TP (Layer 2 tunneling protocol)
Performance indicators
46. An interactive system that provides the user with easy access to decision models and data; to support semistructured decision-making tasks
Symmetric key encryption
Performance testing
Downloading
Decision support systems (DSS)
47. Modern expression for organizational development stemming from IS/IT impacts. The ultimate goal of BPR is to yield a better performing structure; more responsive to the customer base and market conditions; while yielding material cost savings. To ree
Business process reengineering (BPR)
Latency
Inheritance (objects)
Vaccine
48. Program narratives provide a detailed explanation of program flowcharts; including control points and any external input.
Control perimeter
Extensible Markup Language (XML)
Program narratives
Telnet
49. An auditing concept regarding the importance of an item of information with regard to its impact or effect on the functioning of the entity being audited. An expression of the relative significance or importance of a particular matter in the context
Structured programming
Regression testing
Materiality
Firewall
50. Software that is being used and executed to support normal and authorized organizational operations. Such software is to be distinguished from test software; which is being developed or modified; but has not yet been authorized for use by management.
Performance testing
Payment system
Addressing
Production software