Test your basic knowledge |

CISA Certified Information Systems Auditor Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Point-of-sale systems enable capture of data at the time and place of transaction. POS terminals may include use of optical scanners for use with bar codes or magnetic card readers for use with credit cards. POS systems may be online to a central com






2. Typically in large organisations where the quantum of data processed by the ERPs are extremely voluminous; analysis of patterns and trends prove to be extremely useful in ascertaining the efficiency and effectiveness of operations. Most ERPs provide






3. Tests of detailed activities and transactions; or analytical review tests; designed to obtain audit evidence on the completeness; accuracy or existence of those activities or transactions during the audit period






4. 1)A computer dedicated to servicing requests for resources from other computers on a network. Servers typically run network operating systems. 2)A computer that provides services to another computer (the client).






5. A piece of information; in a digitized form; used to recover the plaintext from the corresponding ciphertext by decryption






6. Is the risk to earnings or capital arising from a bank's inability to meet its obligations when they come due; without incurring unacceptable losses. Internet banking may increase deposit volatility from customers who maintain accounts solely on the






7. The main memory of the computer's central processing unit






8. Interface between data terminal equipment and data communications equipment employing serial binary data interchange






9. A program that translates programming language (source code) into machine executable instructions (object code)






10. Programs and supporting documentation that enable and facilitate use of the computer. Software controls the operation of the hardware.






11. Attackers that penetrate systems by using user identifiers and passwords taken from legitimate users






12. Members of the operations area that are responsible for the collection; logging and submission of input for the various user groups






13. A program that processes actions upon business data; such as data entry; update or query. It contrasts with systems program; such as an operating system or network control program; and with utility programs; such as copy or sort.






14. A packet (encapsulated with a frame containing information); which is transmitted in a packet-switching network from source to destination






15. An eight-digit/seven-bit code representing 128 characters; used in most small computers






16. An international consortium founded in 1994 of affiliates from public and private organizations involved with the Internet and the web. The W3C's primary mission is to promulgate open standards to further enhance the economic growth of Internet web s






17. To record details of information or events in an organized record-keeping system; usually sequenced in the order they occurred






18. A method of user authentication. Challenge response authentication is carried out through use of the Challenge Handshake Authentication Protocol (CHAP). When a user tries to log into the server; the server sends the user a ''challenge;'' which is a r






19. The denial by one of the parties to a transaction or participation in all or part of that transaction or of the content of communications related to that transaction.






20. An internal control that reduces the risk of an existing or potential control weakness resulting in errors and omissions






21. A group of computers connected by a communications network; where the client is the requesting machine and the server is the supplying machine. Software is specialized at both ends. Processing may take place on either the client or the server but it






22. Software used to administer logical security. It usually includes authentication of users; access granting according to predefined rules; monitoring and reporting functions.






23. Wiring devices that may be inserted into communication links for use with analysis probes; LAN analyzers and intrusion detection security systems






24. An interface point between the CPU and a peripheral device






25. A device for sending and receiving computerized data over transmission lines






26. An approach used to plan; design; develop; test and implement an application system or a major modification to an application system. Typical phases include the feasibility study; requirements study; requirements definition; detailed design; programm






27. Polymorphism refers to database structures that send the same command to different child objects that can produce different results depending on their family hierarchical tree structure.






28. A collection of related information treated as a unit. Separate fields within the record are used for processing of the information.






29. General controls which are designed to manage and monitor the IS environment and which; therefore; affect all IS-related activities






30. The extent to which a system unit--subroutine; program; module; component; subsystem--performs a single dedicated function. Generally; the more cohesive are units; the easier it is to maintain and enhance a system; since it is easier to determine whe






31. Defined minimum performance measures at or above which the service delivered is considered acceptable






32. Software used to create data to be used in the testing of computer programs






33. A communication line permanently assigned to connect two points; as opposed to a dial-up line that is only available and open when a connection is made by dialing the target machine or network. Also known as a dedicated line.






34. 1) Two or more networks connected by a router 2) The world's largest network using TCP/IP protocols to link government; university and commercial institutions






35. Processing is achieved by entering information into the computer via a video display terminal. The computer immediately accepts or rejects the information; as it is entered.






36. Confidentiality concerns the protection of sensitive information from unauthorized disclosure






37. An attack strategy in which the attacker successively hacks into a series of connected systems; obscuring his/her identify from the victim of the attack






38. Source code is the language in which a program is written. Source code is translated into object code by assemblers and compilers. In some cases; source code may be converted automatically into another language by a conversion program. Source code is






39. Detects transmission errors by appending calculated bits onto the end of each segment of data






40. Is an electronic pathway that may be displayed in the form of highlighted text; graphics or a button that connects one web page with another web page address.






41. A process to authenticate (or certify) a party's digital signature; carried out by trusted third parties.






42. In intrusion detection; an error that occurs when a normal activity is misdiagnosed as an attack






43. A mathematical expression used to calculate budget amounts based on actual results; other budget amounts and statistics. With budget formulas; budgets using complex equations; calculations and allocations can be automatically created.






44. A disk access method that stores data sequentially; while also maintaining an index of key fields to all the records in the file for direct access capability






45. In broadband; multiple channels are formed by dividing the transmission medium into discrete frequency segments. It generally requires the use of a modem.






46. A test to check the system's ability to recover after a software or hardware failure






47. Refers to the security aspects supported by the ERP; primarily with regard to the roles or responsibilities and audit trails within the applications






48. A system's level of resilience to seamlessly react from hardware and/or software failure






49. A layer within the International Organization for Standardization (ISO)/Open Systems Interconnection (OSI) model. It is used in information transfers between users through application programs and other devices. In this layer various protocols are ne






50. The current and prospective effect on earnings or capital arising from adverse business decisions; improper implementation of decisions or lack of responsiveness to industry changes.