SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Confidentiality concerns the protection of sensitive information from unauthorized disclosure
Fscal year
FIN (final)
Confidentiality
Initial program load (IPL)
2. Purposefully hidden malicious or damaging code within an authorized computer program. Unlike viruses; they do not replicate themselves; but they can be just as destructive to a single computer.
Control group
Digital certification
Uploading
Trojan horse
3. A viewable screen displaying information; presented through a web browser in a single view sometimes requiring the user to scroll to review the entire page. A bank web page may display the bank's logo; provide information about bank products and serv
Web page
Decentralization
Reengineering
COSO
4. Devices that perform the functions of both bridges and routers; are called brouters. Naturally; they operate at both the data link and the network layers. A brouter connects same data link type LAN segments as well as different data link ones; which
Decryption key
Bus
Intranet
Brouters
5. The information systems auditor (IS auditor) gathers information in the course of performing an IS audit. The information used by the IS auditor to meet audit objectives is referred to as audit evidence (evidence). Also used to describe the level of
Audit evidence
Digital signature
Field
Budget
6. General controls which are designed to manage and monitor the IS environment and which; therefore; affect all IS-related activities
Trap door
Data security
Comprehensive audit
Pervasive IS controls
7. Analysis that is performed on a continuous basis; with results gained in time to alter the run-time system
System software
Queue
Fault tolerance
Real-time analysis
8. The process that limits and controls access to resources of a computer system; a logical or physical control designed to protect against unauthorized entry or use. Access control can be defined by the system (mandatory access control; or MAC) or defi
Network hop
Access control
Completeness check
Masking
9. Connects a terminal or computer to a communications network via a telephone line. Modems turn digital pulses from the computer into frequencies within the audio range of the telephone system. When acting in the receiver capacity; a modem decodes inco
Modem (modulator-demodulator)
Standing data
Executable code
Default password
10. A phase of an SDLC methodology where the affected user groups define the requirements of the system for meeting the defined needs
Application program
Partitioned file
Requirements definition
Active recovery site (mirrored)
11. A high level description of the audit work to be performed in a certain period of time (ordinarily a year). It includes the areas to be audited; the type of work planned; the high level objectives and scope of the work; and topics such as budget; res
Audit plan
Error
Windows NT
Ring topology
12. A set of protocols that allow systems to communicate information about the state of services on other systems. It is used; for example; in determining whether systems are up; maximum packet sizes on links; whether a destination host/network/port is a
Netware
Nonrepudiation
Application program
ICMP (internet control message protocol)
13. Programs that provide assurance that the software being audited is the correct version of the software; by providing a meaningful listing of any discrepancies between the two versions of the program
RFC (request for comments)
UDP (User Datagram Protocol)
Source code compare programs
Edit controls
14. Filters out electrical surges and spikes
Surge suppressor
Idle standby
Whitebox testing
LDAP (Lightweight Directory Access Protocol)
15. An automated detail report of computer system activity
Hexadecimal
Console log
Relevant audit evidence
Polymorphism (objects)
16. Is the risk to earnings or capital arising from violations of; or nonconformance with; laws; rules; regulations; prescribed practices or ethical standards. Banks are subject to various forms of legal risk. This can include the risk that assets will t
Internet Inter-ORB Protocol (IIOP)
Coaxial cable
business process integrity
legal risk
17. Data that is not encrypted. Also known as plaintext.
Limit check
Default password
Subject matter (Area of activity)
Cleartext
18. The process of converting a digital computer signal into an analog telecommunications signal
Password cracker
Control perimeter
Incremental testing
Modulation
19. Two trading partners both share one or more secrets. No one else can read their messages. A different key (or set of keys) is needed for each pair of trading partners. Same key is used for encryption and decryption. (Also see Private Key Cryptosystem
Incremental testing
Telnet
Symmetric key encryption
Comprehensive audit
20. The level of trust with which a system object is imbued
Utility programs
Dynamic analysis
Privilege
IDS (intrusion detection system)
21. The area of the central processing unit that performs mathematical and analytical operations
Arithmetic-logic unit (ALU)
Ethernet
Rotating standby
Logs/Log file
22. The act of giving the idea or impression of being or doing something
Appearance
Gateway
Penetration testing
Personal identification number (PIN)
23. An interface point between the CPU and a peripheral device
implementation life cycle review
Field
Port
Job control language (JCL)
24. A router configured to permit or deny traffic based on a set of permission rules installed by the administrator
Useful audit evidence
Screening routers
Embedded audit module
Single point of failure
25. Transactions that cannot be denied after the fact
Nonrepudiable trnasactions
Extended Binary-coded Decimal Interchange Code (EBCDIC)
Transaction protection
Rotating standby
26. The amount of time allowed for the recovery of a business function or resource after a disaster occurs
Recovery time objective (RTO)
Operational audit
Electronic funds transfer (EFT)
RSA
27. Controls over the business processes that are supported by the ERP
Source documents
Decentralization
Professional competence
business process integrity
28. Refers to a sprinkler system that does not have water in the pipes during idle usage; unlike a fully charged fire extinguisher system that has water in the pipes at all times. The dry-pipe system is activated at the time of the fire alarm; and water
Reciprocal agreement
Magnetic ink character recognition (MICR)
Dry-pipe fire extinguisher system
Bulk data transfer
29. Authorized users of a computer system who overstep their legitimate access rights. This category is divided into masqueraders and clandestine users.
Initial program load (IPL)
Internal penetrators
Screening routers
Active response
30. The extent to which a system unit--subroutine; program; module; component; subsystem--performs a single dedicated function. Generally; the more cohesive are units; the easier it is to maintain and enhance a system; since it is easier to determine whe
Format checking
Cohesion
Packet switching
Asynchronous Transfer Mode (ATM)
31. Consists of one or more web pages that may originate at one or more web server computers. A person can view the pages of a website in any order; as he or she would a magazine.
Passive assault
vulnerability
Web site
Finger
32. A measurement of the point prior to an outage to which data are to be restored
Recovery point objective (RPO)—
Substantive testing
Standing data
Downtime report
33. A protocol originally developed by Netscape Communications to provide a high level of security for its browser software. It has become accepted widely as a means of securing Internet message exchanges. It ensures confidentiality of the data in transm
Source code compare programs
Scure socket layer (SSL)
Digital certificate
Whitebox testing
34. Asoftware testing technique whereby the internal workings of the item being tested are not known by the tester. For example - in a black box test on a software design the tester only knows the inputs and what the expected outcomes should be and not h
Man-in-the-middle attack
Private key
Data custodian
Blackbox testing
35. The elimination of redundant data
Filtering router
Integrated services digital network (ISDN)
Normalization
Audit evidence
36. An authentication protocol; often used by remote-access servers
Fail-safe
Network hop
Backup
TACACS+ (terminal access controller access control system plus)
37. English-like; user friendly; nonprocedural computer languages used to program and/or read and process computer files
Utility programs
Fourth generation language (4GL)
Penetration testing
Cleartext
38. A permanent connection between hosts in a packet switched network
Wide area network (WAN)
Expert systems
Cluster controller
Permanent virtual circuit (PVC)
39. Integral part of an application system that is designed to identify and report specific transactions or other information based on pre-determined criteria. Identification of reportable items occurs as part of real-time processing. Reporting may be re
Noise
Source documents
Embedded audit module
Test generators
40. Controls that prevent unauthorized access from remote users that attempt to access a secured environment. These controls range from dial-back controls to remote user authentication.
Dial-in access controls
Machine language
Full duplex
Audit risk
41. A program designed to detect computer viruses
Address
Vaccine
Application software tracing and mapping
Anomaly
42. A protected; generally computer-encrypted string of characters that authenticate a computer user to the computer system
Password
Error risk
Systems acquisition process
Redundancy check
43. A 24-hour; stand-alone mini-bank; located outside branch bank offices or in public places like shopping malls. Through ATMs; clients can make deposits; withdrawals; account inquiries and transfers. Typically; the ATM network is comprised of two spher
Operating system
Communications controller
Diskless workstations
Automated teller machine (ATM)
44. A multiuser; multitasking operating system that is used widely as the master control program in workstations and especially servers
Decryption key
price risk
UNIX
Controls (Control procedures)
45. Allows the network interface to capture all network traffic irrespective of the hardware device to which the packet is addressed
Promiscuous mode
Batch control
Source documents
Audit authority
46. A sampling technique that estimates the amount of overstatement in an account balance
Arithmetic-logic unit (ALU)
Monetary unit sampling
Audit responsibility
COCO
47. A response; in which the system (automatically or in concert with the user) blocks or otherwise affects the progress of a detected attack. The response takes one of three forms--amending the environment; collecting more information or striking back a
Default password
Active response
Systems acquisition process
IT governance
48. A group of budgets linked together at different levels such that the budgeting authority of a lower-level budget is controlled by an upper-level budget.
Redundancy check
Operating system audit trails
Public key cryptosystem
Budget hierarchy
49. An entity that may be given responsibility for performing some of the administrative tasks necessary in the registration of subjects; such as confirming the subject's identity; validating that the subject is entitled to have the attributes requested
Registration authority (RA)
Trojan horse
Mutual takeover
Control risk
50. Program flowcharts show the sequence of instructions in a single program or subroutine. The symbols used should be the internationally accepted standard. Program flowcharts should be updated when necessary.
Program flowcharts
Check digit
Credentialed analysis
Geographic disk mirroring
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests