SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Individuals and departments responsible for the storage and safeguarding of computerized information. This typically is within the IS organization.
Data custodian
World Wide Web Consortium (W3C)
Protocol converter
Control weakness
2. A program that translates programming language (source code) into machine executable instructions (object code)
Compiler
Diskless workstations
Data dictionary
Rootkit
3. An auditing concept regarding the importance of an item of information with regard to its impact or effect on the functioning of the entity being audited. An expression of the relative significance or importance of a particular matter in the context
Computer-assisted audit technique (CAATs)
Materiality
Cadbury
IT governance
4. Refers to the security aspects supported by the ERP; primarily with regard to the roles or responsibilities and audit trails within the applications
Posting
Database specifications
Application security
Multiplexor
5. Programs that are tested and evaluated before approval into the production environment. Test programs; through a series of change control moves; migrate from the test environment to the production environment and become production programs.
Business risk
Database management system (DBMS)
Full duplex
Test programs
6. A project management technique used in the planning and control of system projects
Shell
Cross-certification
Program evaluation and review technique (PERT)
Netware
7. A high-capacity disk storage device or a computer that stores data centrally for network users and manages access to that data. File servers can be dedicated so that no process other than network management can be executed while the network is availa
File server
Bar code
Value-added network (VAN)
Indexed sequential file
8. The number of distinct locations that may be referred to with the machine address. For most binary machines; it is equal to 2n; where n is the number of bits in the machine address.
Twisted pairs
Synchronous transmission
Address space
False negative
9. A flag set in the initial setup packets to indicate that the communicating parties are synchronizing the sequence numbers used for the data transmission
price risk
Active recovery site (mirrored)
SYN (synchronize)
HTTP (hyper text transfer protocol)
10. A programmed edit or routine that detects transposition and transcription errors by calculating and checking the check digit
Check digit verification (self-checking digit)
Multiplexor
Simple fail-over
Logs/Log file
11. Asoftware testing technique whereby the internal workings of the item being tested are not known by the tester. For example - in a black box test on a software design the tester only knows the inputs and what the expected outcomes should be and not h
World Wide Web Consortium (W3C)
Intranet
Misuse detection
Blackbox testing
12. Source lines of code are often used in deriving single-point software-size estimations.
Source lines of code (SLOC)
Hacker
Audit
Record
13. A debit or credit to a general ledger account. See also manual journal entry.
Voice mail
Edit controls
Authorization
Journal entry
14. Disturbances; such as static; in data transmissions that cause messages to be misinterpreted by the receiver
Noise
Dial-back
Waterfall development
System testing
15. A system that authentically distributes users' public keys using certificates
Public key infrastructure
Data analysis
Control objective
Hypertext
16. The transmission of job control language (JCL) and batches of transactions from a remote terminal location
Coverage
Application system
Remote job entry (RJE)
Multiplexor
17. A report on Internal Control--An Integrated Framework sponsored by the Committee of Sponsoring Organizations of the Treadway Commission in 1992. It provides guidance and a comprehensive framework of internal control for all organizations.'
COSO
Engagement letter
Continuity
Gateway
18. A terminal with built-in processing capability. It has no disk or tape storage but has memory. The terminal interacts with the user by editing and validating data as they are entered prior to final processing.
Auditability
Intelligent terminal
Log
Repudiation
19. A third party that delivers and manages applications and computer services; including security services to multiple users via the Internet or a private network
ASP/MSP (application or managed service provider)
Digital signature
UDDI
Embedded audit module
20. 1) The process of establishing and maintaining security in a computer or network system. The stages of this process include prevention of security problems; detection of intrusions; investigation of intrusions and resolution.2) In network management;
Telecommunications
Authorization
Buffer
Security management
21. An individual data element in a computer record. Examples include employee name; customer address; account number; product unit price and product quantity in stock.
Personal identification number (PIN)
Field
Detective controls
Log
22. Group of people responsible for a project; whose terms of reference may include the development; acquisition; implementation or maintenance of an application system. The team members may include line management; operational line staff; external contr
Editing
Internet packet (IP) spoofing
System exit
Project team
23. A methodology that enables organisations to develop strategically important systems faster; while reducing development costs and maintaining quality by using a series of proven application development techniques; within a well-defined methodology.
Payment system
Rapid application development
Packet switching
Indexed sequential access method (ISAM)
24. A biometric device that is used to authenticate a user through palm scans
Handprint scanner
Vulnerability analysis
HTTP (hyper text transfer protocol)
Budget organization
25. Detection on the basis of whether the system activity matches that defined as bad
Benchmark
Masking
Anomaly detection
Misuse detection
26. An attack strategy in which the attacker intercepts the communications stream between two parts of the victim system and then replaces the traffic between the two components with the intruder's own; eventually assuming control of the communication
War dialler
Man-in-the-middle attack
Audit responsibility
Cleartext
27. A form of modulation in which data signals are pulsed directly on the transmission medium without frequency division and usually utilize a transceiver. In baseband the entire bandwidth of the transmission medium (e.g.; coaxial cable) is utilized for
Baseband
Function point analysis
General computer controls
Accountability
28. Recovery strategy that involves two active sites; each capable of taking over the other's workload in the event of a disaster. Each site will have enough idle processing power to restore data from the other site and to accommodate the excess workload
Active recovery site (mirrored)
Checkpoint restart procedures
Project team
Certificate authority (CA)
29. The systems development phase in which systems specifications and conceptual designs are developed; based on end-user needs and requirements
Symmetric key encryption
Business impact analysis (BIA)
Single point of failure
Systems analysis
30. The person responsible for maintaining a LAN and assisting end users
Anonymous File Transfer Protocol (FTP)
Magnetic card reader
Network administrator
Telnet
31. Modern expression for organizational development stemming from IS/IT impacts. The ultimate goal of BPR is to yield a better performing structure; more responsive to the customer base and market conditions; while yielding material cost savings. To ree
Business process reengineering (BPR)
Public key
System exit
Frame relay
32. Organizations that have no official physical site presence and are made up of diverse geographically dispersed or mobile employees.
Statistical sampling
Bandwidth
virtual organizations
Protocol
33. A group of items that is waiting to be serviced or processed
Hexadecimal
Unit testing
Queue
Comprehensive audit
34. 1) Following an authorized person into a restricted access area; 2) electronically attaching to an authorized telecommunications link to intercept and possibly alter transmissions.
Prototyping
price risk
Private key cryptosystems
Piggy backing
35. Software used to create data to be used in the testing of computer programs
IDS (intrusion detection system)
Data diddling
Test generators
Information processing facility (IPF)
36. Promulgated through the World Wide Web Consortium; XML is a web-based application development technique that allows designers to create their own customized tags; thus; enabling the definition; transmission; validation and interpretation of data betw
Administrative controls
Extensible Markup Language (XML)
Worm
Appearance
37. A series of tests designed to ensure that the modified program interacts correctly with other system components. These test procedures typically are performed by the system maintenance staff in their development library.
Internal control
System testing
Run instructions
Trust
38. The person responsible for implementing; monitoring and enforcing security rules established and authorized by management
Console log
Benchmark
Trap door
Security administrator
39. A computer network connecting different remote locations that may range from short distances; such as a floor or building; to extremely long transmissions that encompass a large region or several countries
End-user computing
Service provider
Wide area network (WAN)
Relevant audit evidence
40. Disconnecting from the computer
LDAP (Lightweight Directory Access Protocol)
Logoff
Information processing facility (IPF)
Criteria
41. A fail-over process in which the primary node owns the resource group. The backup node runs idle; only supervising the primary node. In case of a primary node outage; the backup node takes over. The nodes are prioritized; which means the surviving no
Idle standby
Private key cryptosystems
Monetary unit sampling
Compliance testing
42. The current and prospective effect on earnings or capital arising from adverse business decisions; improper implementation of decisions or lack of responsiveness to industry changes.
Strategic risk
Application acquisition review
Master file
Internet banking
43. An IS backup facility that has the necessary electrical and physical components of a computer facility; but does not have the computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user
Third-party review
Comparison program
File layout
Cold site
44. Audit evidence is sufficient if it is adequate; convincing and would lead another IS auditor to form the same conclusions.
Sufficient audit evidence
Half duplex
Packet switching
Audit expert systems
45. A system development technique that enables users and developers to reach agreement on system requirements. Prototyping uses programmed simulation techniques to represent a model of the final system to the user for advisement and critique. The emphas
Addressing
IDS (intrusion detection system)
Network hop
Prototyping
46. The list of rules and/or guidance that is used to analyze event data
Indexed sequential access method (ISAM)
Subject matter (Area of activity)
Rulebase
Local loop
47. The physical layout of how computers are linked together. Examples include ring; star and bus.
Control risk self-assessment
Rapid application development
Authorization
Topology
48. The flow of data from the input (in Internet banking; ordinarily user input at his/her desktop) to output (in Internet banking; ordinarily data in a bank's central database). Data flow includes travelling through the communication lines; routers; swi
Validity check
Terms of reference
Static analysis
Data flow
49. The actions/controls dealing with operational effectiveness; efficiency and adherence to regulations and management policies
Packet
Production programs
Administrative controls
X.25 interface
50. A method used in the information processing facility (IPF) to determine and establish the sequence of computer job processing
Administrative controls
Shell
Internet packet (IP) spoofing
Scheduling
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests