Test your basic knowledge |

CISA Certified Information Systems Auditor Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Files maintained by a system; primarily a database management system; for the purposed of reapplying changes following an error or outage recovery






2. A device used for combining several lower-speed channels into a higher-speed channel






3. The primary language used by both application programmers and end users in accessing relational databases






4. A device that connects two similar networks together






5. Individuals; normally managers or directors; who have responsibility for the integrity; accurate reporting and use of computerized data






6. The area of the system that the intrusion detection system is meant to monitor and protect






7. Checks the accuracy of the results produced by a test run. There are three types of checks that an output analyzer can perform. First; if a standard set of test data and test results exists for a program; the output of a test run after program mainte






8. A series of tests designed to ensure that the modified program interacts correctly with other system components. These test procedures typically are performed by the system maintenance staff in their development library.






9. A phase of an SDLC methodology where the affected user groups define the requirements of the system for meeting the defined needs






10. Availability relates to information being available when required by the business process now and in the future. It also concerns the safeguarding of necessary resources and associated capabilities.






11. A stored collection of related data needed by organizations and individuals to meet their information processing and retrieval requirements






12. An audit technique used to select items from a population for audit testing purposes based on selecting all those items that have certain attributes or characteristics (such as all items over a certain size)






13. A set of protocols developed by the IETF to support the secure exchange of packets






14. A system's level of resilience to seamlessly react from hardware and/or software failure






15. Making sure the modified/new system includes appropriate access controls and does not introduce any security holes that might compromise other systems






16. A communications channel over which data can be sent and received simultaneously






17. Organizations that have no official physical site presence and are made up of diverse geographically dispersed or mobile employees.






18. An individual data element in a computer record. Examples include employee name; customer address; account number; product unit price and product quantity in stock.






19. A warm-site is similar to a hot-site; however; it is not fully equipped with all necessary hardware needed for recovery.






20. A permanent connection between hosts in a packet switched network






21. The person responsible for maintaining a LAN and assisting end users






22. A consortium with more than 700 affiliates from the software industry. Its purpose is to provide a common framework for developing applications using object-oriented programming techniques. For example; OMG is known principally for promulgating the C






23. A communications terminal control hardware unit that controls a number of computer terminals. All messages are buffered by the controller and then transmitted to the receiver.






24. Verifies that the control number follows sequentially and any control numbers out of sequence are rejected or noted on an exception report for further research (can be alpha or numeric and usually utilizes a key field)






25. A common connection point for devices in a network; hubs commonly are used to connect segments of a LAN. A hub contains multiple ports. When a packet arrives at one port; it is copied to the other ports so that all segments of the LAN can see all pac






26. A telecommunications carrier's facilities in a local area in which service is provided where local service is switched to long distance






27. A high-capacity line-of-sight transmission of data signals through the atmosphere which often requires relay stations






28. A web-based version of the traditional phone book's yellow and white pages enabling businesses to be publicly listed in promoting greater e-commerce activities.






29. The denial by one of the parties to a transaction or participation in all or part of that transaction or of the content of communications related to that transaction.






30. Source lines of code are often used in deriving single-point software-size estimations.






31. The method used to identify the location of a participant in a network. Ideally; addressing specifies where the participant is located rather than who they are (name) or how to get there (routing).






32. Provide verification that all transmitted data are read and processed






33. An input device that reads characters and images that are printed or painted on a paper form into the computer.






34. A public end-to-end digital telecommunications network with signaling; switching and transport capabilities supporting a wide range of service accessed by standardized interfaces with integrated customer control. The standard allows transmission of d






35. A set of utilities that implement a particular network protocol. For instance; in Windows machines a TCP/IP stack consists of TCP/IP software; sockets software and hardware driver software.






36. Connects a terminal or computer to a communications network via a telephone line. Modems turn digital pulses from the computer into frequencies within the audio range of the telephone system. When acting in the receiver capacity; a modem decodes inco






37. A data dictionary is a database that contains the name; type; range of values; source and authorization for access for each data element in a database. It also indicates which application programs use that data so that when a data structure is contem






38. A testing technique that is used to evaluate output from one application; while the information is sent as input to another application






39. Computer operating instructions which detail the step-by-step processes that are to occur so an application system can be properly executed. It also identifies how to address problems that occur during processing.






40. Test data are processed in production systems. The data usually represent a set of fictitious entities such as departments; customers and products. Output reports are verified to confirm the correctness of the processing.






41. A trusted third party that serves authentication infrastructures or organizations and registers entities and issues them certificates






42. The risk that an error which could occur in an audit area; and which could be material; individually or in combination with other errors; will not be prevented or detected and corrected on a timely basis by the internal control system






43. Diligence which a person; who possesses a special skill; would exercise under a given set of circumstances






44. Diagramming data that are to be exchanged electronically; including how it is to be used and what business management systems need it. It is a preliminary step for developing an applications link. (Also see application tracing and mapping.)






45. Any situation or event that has the potential to harm a system






46. An independent audit of the control structure of a service organization; such as a service bureau; with the objective of providing assurances to the users of the service organization that the internal control structure is adequate; effective and soun






47. An auditing concept regarding the importance of an item of information with regard to its impact or effect on the functioning of the entity being audited. An expression of the relative significance or importance of a particular matter in the context






48. A high-capacity disk storage device or a computer that stores data centrally for network users and manages access to that data. File servers can be dedicated so that no process other than network management can be executed while the network is availa






49. The process of generating; recording and reviewing a chronological record of system events to ascertain their accuracy






50. A system of interconnected computers and the communications equipment used to connect them