SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Changing data with malicious intent before or during input into the system
Security/transaction risk
Open systems
Audit responsibility
Data diddling
2. A protocol used to transfer files over a TCP/IP network (Internet; UNIX; etc.)
Business risk
FTP (file transfer protocol)
Test generators
Middleware
3. Estimated cost and revenue amounts for a given range of periods and set of books. There can be multiple budget versions for the same set of books.
Relevant audit evidence
Budget
Twisted pairs
Coupling
4. The dynamic; integrated processes; effected by the governing body; management and all other staff; that are designed to provide reasonable assurance regarding the achievement of the following general objectives: Effectiveness; efficiency and economy
Internal control structure
Extensible Markup Language (XML)
Digital certificate
Ring topology
5. The person responsible for maintaining a LAN and assisting end users
Network administrator
Application programming
Corrective controls
Confidentiality
6. An individual using a terminal; PC or an application can access a network to send an unstructured message to another individual or group of people.
Prototyping
E-mail/interpersonal messaging
Table look-ups
Bandwidth
7. Modern expression for organizational development stemming from IS/IT impacts. The ultimate goal of BPR is to yield a better performing structure; more responsive to the customer base and market conditions; while yielding material cost savings. To ree
Business process reengineering (BPR)
Run-to-run totals
Random access memory (RAM)
Network administrator
8. A program that takes as input a program written in assembly language and translates it into machine code or relocatable code
Data diddling
Assembler
Smart card
Program evaluation and review technique (PERT)
9. A method used in the information processing facility (IPF) to determine and establish the sequence of computer job processing
Netware
PPP (point-to-point protocol)
Transaction protection
Scheduling
10. The application of an edit; using a predefined field definition to a submitted information stream; a test to ensure that data conform to a predefined format
Artificial intelligence
Shell
Objectivity
Format checking
11. A database structured in a tree/root or parent/child relationship. Each parent can have many children; but each child may have only one parent.
Computer-aided software engineering (CASE)
Hierarchical database
Cathode ray tube (CRT)
Content filtering
12. A series of tests designed to ensure that the modified program interacts correctly with other system components. These test procedures typically are performed by the system maintenance staff in their development library.
Audit authority
Challenge/response token
Source lines of code (SLOC)
System testing
13. An exchange rate; which can be used optionally to perform foreign currency conversion. The corporate exchange rate is generally a standard market rate determined by senior financial management for use throughout the organization.
Offline files
Black box testing
Corporate exchange rate
Technical infrastructure security
14. The name given to a class of algorithms that repeatedly try all possible combinations until a solution is found
Cohesion
Bus
Masqueraders
Brute force
15. A condition in which each of an organization's regional locations maintains its own financial and operational data while sharing processing with an organizationwide; centralized database. This permits easy sharing of data while maintaining a certain
Business process reengineering (BPR)
Decision support systems (DSS)
Control risk self-assessment
Split data systems
16. A public end-to-end digital telecommunications network with signaling; switching and transport capabilities supporting a wide range of service accessed by standardized interfaces with integrated customer control. The standard allows transmission of d
Extensible Markup Language (XML)
Integrated services digital network (ISDN)
Application controls
X.25 interface
17. A viewable screen displaying information; presented through a web browser in a single view sometimes requiring the user to scroll to review the entire page. A bank web page may display the bank's logo; provide information about bank products and serv
Central processing unit (CPU)
Web page
Interface testing
HTTPS (hyper text transfer protocol secure)
18. Describes the design properties of a computer system that allow it to resist active attempts to attack or bypass it
Privilege
Test programs
Salami technique
Fail-safe
19. The calendar can contain 'real' accounting periods and/or adjusting accounting periods. The 'real' accounting periods must not overlap; and cannot have any gaps between 'real' accounting periods. Adjusting accounting periods can overlap with other ac
Adjusting period
Universal Description; Discovery and Integration (UDDI)
Electronic cash
Test programs
20. Purposefully hidden malicious or damaging code within an authorized computer program. Unlike viruses; they do not replicate themselves; but they can be just as destructive to a single computer.
Trojan horse
Bypass label processing (BLP)
Discovery sampling
Systems acquisition process
21. (remote authentication dial-in user service)
Misuse detection
Open systems
Test generators
RADIUS
22. A common connection point for devices in a network; hubs commonly are used to connect segments of a LAN. A hub contains multiple ports. When a packet arrives at one port; it is copied to the other ports so that all segments of the LAN can see all pac
Test generators
Embedded audit module
Fiber optic cable
Hub
23. The processing of a group of transactions at the same time. Transactions are collected and processed against the master files at a specified time.
Batch processing
Bridge
Data Encryption Standard (DES)
Fiber optic cable
24. Any yearly accounting period without regard to its relationship to a calendar year.
Internal storage
Request for proposal (RFP)
Concurrent access
Fscal year
25. A certificate issued by one certification authority to a second certification authority so that users of the first certification authority are able to obtain the public key of the second certification authority and verify the certificates it has crea
Point-of-presence (POP)
Cross-certification
Dial-in access controls
Consumer
26. Audit evidence is relevant if it pertains to the audit objectives and has a logical relationship to the findings and conclusions it is used to support.
Operational risk
Encryption key
Relevant audit evidence
L2F (Layer 2 forwarding)
27. A stored collection of related data needed by organizations and individuals to meet their information processing and retrieval requirements
Symmetric key encryption
Broadband
Database
Fourth generation language (4GL)
28. An approach used to plan; design; develop; test and implement an application system or a major modification to an application system. Typical phases include the feasibility study; requirements study; requirements definition; detailed design; programm
TCP (transmission control protocol)
Redundancy check
Geographic disk mirroring
Systems development life cycle (SDLC)
29. The information systems auditor (IS auditor) gathers information in the course of performing an IS audit. The information used by the IS auditor to meet audit objectives is referred to as audit evidence (evidence). Also used to describe the level of
Audit evidence
Multiplexor
Application programming interface (API)
World Wide Web Consortium (W3C)
30. An empowering method/process by which management and staff of all levels collectively identify and evaluate IS related risks and controls under the guidance of a facilitator who could be an IS auditor. The IS auditor can utilise CRSA for gathering re
Validity check
Control risk self-assessment
Extended Binary-coded Decimal Interchange Code (EBCDIC)
Service provider
31. Software used to create data to be used in the testing of computer programs
Signatures
Privilege
RS-232 interface
Test generators
32. A high-capacity disk storage device or a computer that stores data centrally for network users and manages access to that data. File servers can be dedicated so that no process other than network management can be executed while the network is availa
Quick ship
File server
Nonrepudiation
Rootkit
33. The central database that stores and organizes data
Repository
Transaction
Teleprocessing
Central processing unit (CPU)
34. The area of the central processing unit (CPU) that executes software; allocates internal memory and transfers operations between the arithmetic-logic; internal storage and output sections of the computer
e-commerce
Control section
Brouters
Security management
35. The level to which transactions can be traced and audited through a system
Anonymous File Transfer Protocol (FTP)
Test data
Rotating standby
Auditability
36. A flag set in a packet to indicate that this packet is the final data packet of the transmission
Hierarchical database
Direct reporting engagement
FIN (final)
Circular routing
37. A set of utilities that implement a particular network protocol. For instance; in Windows machines a TCP/IP stack consists of TCP/IP software; sockets software and hardware driver software.
Executable code
Protocol stack
Piggy backing
Coupling
38. Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes
Application proxy
Coverage
Security software
Data leakage
39. The policies; procedures; practices and organizational structures designed to provide reasonable assurance that business objectives will be achieved and that undesired events will be prevented or detected and corrected.
System flowcharts
Internal control
Screening routers
System narratives
40. Freedom from unauthorized intrusion
Privacy
Packet
Message switching
Exposure
41. Diagramming data that are to be exchanged electronically; including how it is to be used and what business management systems need it. It is a preliminary step for developing an applications link. (Also see application tracing and mapping.)
Vulnerabilities
Utility software
Mapping
Firmware
42. Generally; the assumption that an entity will behave substantially as expected. Trust may apply only for a specific function. The key role of this term in an authentication framework is to describe the relationship between an authenticating entity an
Indexed sequential file
Trust
Privacy
HTTPS (hyper text transfer protocol secure)
43. Used to electronically input; read and interpret information directly from a source document; requires the source document to have specially-coded magnetic ink typeset
Data integrity
Latency
Magnetic ink character recognition (MICR)
X.25 interface
44. A debit or credit to a general ledger account. See also manual journal entry.
Journal entry
Computer-assisted audit technique (CAATs)
Completeness check
Logoff
45. A protected; generally computer-encrypted string of characters that authenticate a computer user to the computer system
Software
Encapsulation (objects)
Password
Memory dump
46. The act of copying raw data from one place to another with little or no formatting for readability. Usually; dump refers to copying data from main memory to a display screen or a printer. Dumps are useful for diagnosing bugs. After a program fails; o
Default password
BSP (business service provider)
Memory dump
Systems analysis
47. In intrusion detection; an error that occurs when a normal activity is misdiagnosed as an attack
End-user computing
Foreign exchange risk
System exit
False positive
48. A platform-independent XML-based formatted protocol enabling applications to communicate with each other over the Internet. Use of this protocol may provide a significant security risk to web application operations; since use of SOAP piggybacks onto
IP (Internet protocol)
IDS (intrusion detection system)
Subject matter (Area of activity)
Simple Object Access Protocol (SOAP)
49. To the basic border firewall; add a host that resides on an untrusted network where the firewall cannot protect it. That host is minimally configured and carefully managed to be as secure as possible. The firewall is configured to require incoming an
Production programs
X.25 interface
Recovery time objective (RTO)
Untrustworthy host
50. A device that forms a barrier between a secure and an open environment. Usually; the open environment is considered hostile. The most notable hostile environment is the Internet. In other words; a firewall enforces a boundary between two or more netw
Promiscuous mode
Firewall
BSP (business service provider)
Sniffing
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests