SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Deliberately testing only the value-added functionality of a software component
Public key infrastructure
Addressing
Incremental testing
Source lines of code (SLOC)
2. The password used to gain access when a system is first installed on a computer or network device. There is a large list published on the Internet and maintained at several locations. Failure to change these after the installation leaves the system v
Anonymity
Broadband
Distributed data processing network
Default password
3. Software used to administer logical security. It usually includes authentication of users; access granting according to predefined rules; monitoring and reporting functions.
Coverage
Cluster controller
Decision support systems (DSS)
Security software
4. An eight-digit/seven-bit code representing 128 characters; used in most small computers
ASCII (American Standard Code for Information Interchange)
Outsourcing
Asynchronous Transfer Mode (ATM)
Audit evidence
5. A program designed to detect computer viruses
Materiality
Image processing
Vaccine
Recovery point objective (RPO)—
6. The consolidation in 1998 of the ''Cadbury;'' ''Greenbury'' and ''Hampel'' Reports. Named after the Committee Chairs; these reports were sponsored by the UK Financial Reporting Council; the London Stock Exchange; the Confederation of British Industry
Financial audit
Preventive controls
Combined Code on Corporate Governance
Generalized audit software
7. A software engineering technique whereby an existing application system code can be redesigned and coded using computer-aided software engineering (CASE) technology
Budget formula
Reverse engineering
Biometrics
Object orientation
8. The rules outlining the way in which information is captured and interpreted
Image processing
Monitoring policy
Fraud risk
Control group
9. Consists of one or more web pages that may originate at one or more web server computers. A person can view the pages of a website in any order; as he or she would a magazine.
Web site
Real-time processing
Circuit-switched network
Application software tracing and mapping
10. A phase of an SDLC methodology that researches the feasibility and adequacy of resources for the development or acquisition of a system solution to a user need
Feasibility study
Consumer
Analog
Address space
11. The accuracy and completeness of information as well as to its validity in accordance with business values and expectations
Simple Object Access Protocol (SOAP)
Computationally greedy
Binary code
Integrity
12. An eight-bit code representing 256 characters; used in most large computer systems
Object Management Group (OMG)
Completeness check
Exception reports
Extended Binary-coded Decimal Interchange Code (EBCDIC)
13. Detects transmission errors by appending calculated bits onto the end of each segment of data
Corporate exchange rate
Hash function
Monitor
Redundancy check
14. Source lines of code are often used in deriving single-point software-size estimations.
Source lines of code (SLOC)
Generalized audit software
Symmetric key encryption
e-commerce
15. The risk associated with an event when the control is in place to reduce the effect or likelihood of that event being taken into account
Intranet
Token ring topology
Residual risk
Pervasive IS controls
16. A system that authentically distributes users' public keys using certificates
Rounding down
Terminal
Utility programs
Public key infrastructure
17. The risk to earnings or capital arising from an obligor's failure to meet the terms of any contract with the bank or otherwise to perform as agreed. Internet banking provides the opportunity for banks to expand their geographic range. Customers can r
Arithmetic-logic unit (ALU)
Credit risk
ACK (acknowledgement)
Privilege
18. A system development technique that enables users and developers to reach agreement on system requirements. Prototyping uses programmed simulation techniques to represent a model of the final system to the user for advisement and critique. The emphas
Decision support systems (DSS)
ICMP (internet control message protocol)
Peripherals
Prototyping
19. An independent audit of the control structure of a service organization; such as a service bureau; with the objective of providing assurances to the users of the service organization that the internal control structure is adequate; effective and soun
Compliance testing
implementation life cycle review
Hot site
Third-party review
20. A high-capacity line-of-sight transmission of data signals through the atmosphere which often requires relay stations
Microwave transmission
End-user computing
Independent appearance
Message switching
21. Unauthorized electronic exits; or doorways; out of an authorized computer program into a set of malicious instructions or programs
Client-server
Trap door
Filtering router
Database
22. Memory reserved to temporarily hold data. Buffers are used to offset differences between the operating speeds of different devices; such as a printer and a computer. In a program; buffers are reserved areas of RAM that hold data while they are being
Budget hierarchy
Anomaly detection
Buffer
Error risk
23. A statement of the position within the organization; including lines of reporting and the rights of access
Audit authority
Financial audit
Parallel testing
Web site
24. A utility program that combines several separately compiled modules into one; resolving internal references between them
Logon
Link editor (linkage editor)
Source code
Reengineering
25. Parallel simulation involves the IS auditor writing a program to replicate those application processes that are critical to an audit opinion and using this program to reprocess application system data. The results produced are compared with the resul
Central office (CO)
Parallel simulation
Input controls
Hacker
26. Allows the network interface to capture all network traffic irrespective of the hardware device to which the packet is addressed
Taps
Continuous auditing approach
Promiscuous mode
Encryption
27. The quality or state of not being named or identified
Accountability
Token ring topology
Anonymity
Independence
28. A card reader that reads cards with a magnetizable surface on which data can be stored and retrieved
Peripherals
Magnetic card reader
Wide area network (WAN)
Public key infrastructure
29. Specialized tools that can be used to analyze the flow of data; through the processing logic of the application software; and document the logic; paths; control conditions and processing sequences. Both the command language or job control statements
Attitude
Intrusive monitoring
Asymmetric key (public key)
Application software tracing and mapping
30. The policies; procedures; practices and organizational structures designed to provide reasonable assurance that business objectives will be achieved and that undesired events will be prevented or detected and corrected.
Internal control
Security/transaction risk
Centralized data processing
Judgment sampling
31. Specifies the length of the file's record and the sequence and size of its fields. A file layout also will specify the type of data contained within each field. For example; alphanumeric; zoned decimal; packed and binary are types of data.
E-mail/interpersonal messaging
Logoff
File layout
Network administrator
32. A financial system that establishes the means for transferring money between suppliers and users of funds; ordinarily by exchanging debits or credits between banks or financial institutions.
Payment system
Magnetic card reader
IPSec (Internet protocol security)
Firmware
33. A document which defines the IS audit function's responsibility; authority and accountability
End-user computing
Audit charter
ASP/MSP (application or managed service provider)
Run instructions
34. A public key cryptosystem developed by R. Rivest; A. Shamir and L. Adleman. The RSA has two different keys; the public encryption key and the secret decryption key. The strength of the RSA depends on the difficulty of the prime number factorization.
Source code compare programs
RSA
Verification
Batch control
35. A version of the Windows operating system that supports preemptive multitasking
Windows NT
Generalized audit software
Data structure
Data Encryption Standard (DES)
36. A fail-over process in which there are two nodes (as in idle standby but without priority). The node that enters the cluster first owns the resource group; and the second will join as a standby node.
Embedded audit module
Combined Code on Corporate Governance
Ring topology
Rotating standby
37. Audit evidence is sufficient if it is adequate; convincing and would lead another IS auditor to form the same conclusions.
Token
Sufficient audit evidence
Data communications
Telnet
38. A data dictionary is a database that contains the name; type; range of values; source and authorization for access for each data element in a database. It also indicates which application programs use that data so that when a data structure is contem
Virtual private network (VPN)
Data dictionary
Foreign exchange risk
Corporate governance
39. Standard that defines how global directories should be structured. X.500 directories are hierarchical with different levels for each category of information; such as country; state and city.
Risk assessment
X.500
Data diddling
Noise
40. The current and prospective effect on earnings or capital arising from adverse business decisions; improper implementation of decisions or lack of responsiveness to industry changes.
Procedure
Strategic risk
Ethernet
Decryption
41. A group of computers connected by a communications network; where the client is the requesting machine and the server is the supplying machine. Software is specialized at both ends. Processing may take place on either the client or the server but it
Central office (CO)
Error risk
System testing
Client-server
42. A piece of information; in a digitized form; used by an encryption algorithm to convert the plaintext to the ciphertext
Encryption key
Anonymous File Transfer Protocol (FTP)
Baseband
Registration authority (RA)
43. Programs and supporting documentation that enable and facilitate use of the computer. Software controls the operation of the hardware.
Software
Parity check
Database administrator (DBA)
FIN (final)
44. An international consortium founded in 1994 of affiliates from public and private organizations involved with the Internet and the web. The W3C's primary mission is to promulgate open standards to further enhance the economic growth of Internet web s
ACK (acknowledgement)
Bar code
World Wide Web Consortium (W3C)
Evidence
45. A proxy service that connects programs running on internal networks to services on exterior networks by creating two connections; one from the requesting client and another to the destination service
Open systems
Transaction
Intrusive monitoring
Application proxy
46. Diagramming data that are to be exchanged electronically; including how it is to be used and what business management systems need it. It is a preliminary step for developing an applications link. (Also see application tracing and mapping.)
False negative
Mapping
Application programming
Trust
47. Computer operating instructions which detail the step-by-step processes that are to occur so an application system can be properly executed. It also identifies how to address problems that occur during processing.
Run instructions
Operating system audit trails
Bulk data transfer
Data integrity
48. A consortium with more than 700 affiliates from the software industry. Its purpose is to provide a common framework for developing applications using object-oriented programming techniques. For example; OMG is known principally for promulgating the C
Application
Object Management Group (OMG)
Structured programming
Random access memory (RAM)
49. Glass fibers that transmit binary signals over a telecommunications network. Fiber optic systems have low transmission losses as compared to twisted-pair cables. They do not radiate energy or conduct electricity. They are free from corruption and lig
Record
Fiber optic cable
FIN (final)
Trap door
50. Refers to the security of the infrastructure that supports the ERP networking and telecommunications; operating systems and databases.
Bar code
Technical infrastructure security
Application program
Control weakness