Test your basic knowledge |

CISA Certified Information Systems Auditor Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Editing ensures that data conform to predetermined criteria and enable early identification of potential errors.






2. Typically in large organisations where the quantum of data processed by the ERPs are extremely voluminous; analysis of patterns and trends prove to be extremely useful in ascertaining the efficiency and effectiveness of operations. Most ERPs provide






3. A technique of reading a computer file while bypassing the internal file/data set label. This process could result in bypassing of the security access control system.






4. Auxiliary computer hardware equipment used for input; output and data storage. Examples include disk drives and printers.






5. A network monitoring and data acquisition tool that performs filter translation; packet acquisition and packet display






6. A set of routines; protocols and tools referred to as ''building blocks'' used in business application software development. A good API makes it easier to develop a program by providing all the building blocks related to functional characteristics of






7. The individual responsible for the safeguard and maintenance of all program and data files






8. A protocol developed by the object management group (OMG) to implement Common Object Request Broker Architecture (CORBA) solutions over the World Wide Web. CORBA enables modules of network-based programs to communicate with one another. These modules






9. In an asymmetric cryptographic scheme; the key that may be widely published to enable the operation of the scheme






10. Also called permissions or privileges; these are the rights granted to users by the administrator or supervisor. Access rights determine the actions users can perform (e.g.; read; write; execute; create and delete) on files in shared volumes or file






11. Considered for acquisition the person responsible for high-level decisions; such as changes to the scope and/or budget of the project; and whether or not to implement






12. The logical language a computer understands






13. In intrusion detection; an error that occurs when an attack is misdiagnosed as a normal activity






14. Estimated cost and revenue amounts for a given range of periods and set of books. There can be multiple budget versions for the same set of books.






15. In vulnerability analysis; gaining information by performing checks that affects the normal operation of the system; even crashing the system






16. A testing technique used to retest earlier program abends or logical errors that occurred during the initial testing phase






17. A fail-over process in which there are two nodes (as in idle standby but without priority). The node that enters the cluster first owns the resource group; and the second will join as a standby node.






18. The process of distributing computer processing to different locations within an organization






19. A document that confirms the client's and the IS auditor's acceptance of a review assignment






20. A numeric value; which has been calculated mathematically; is added to data to ensure that original data have not been altered or that an incorrect; but valid match has occurred. This control is effective in detecting transposition and transcription






21. An automated detail report of computer system activity






22. The procedures established to purchase application software; or an upgrade; including evaluation of the supplier's financial stability; track record; resources and references from existing customers






23. A high level description of the audit work to be performed in a certain period of time (ordinarily a year). It includes the areas to be audited; the type of work planned; the high level objectives and scope of the work; and topics such as budget; res






24. A program that processes actions upon business data; such as data entry; update or query. It contrasts with systems program; such as an operating system or network control program; and with utility programs; such as copy or sort.






25. A communications channel that can handle only one signal at a time. The two stations must alternate their transmissions.






26. Comparing the system's performance to other equivalent systems using well defined benchmarks






27. Any automated audit technique; such as generalized audit software; test data generators; computerized audit programs and specialized audit utilities






28. Making sure the modified/new system includes appropriate access controls and does not introduce any security holes that might compromise other systems






29. Controls that prevent unauthorized access from remote users that attempt to access a secured environment. These controls range from dial-back controls to remote user authentication.






30. A high-capacity line-of-sight transmission of data signals through the atmosphere which often requires relay stations






31. Detects transmission errors by appending calculated bits onto the end of each segment of data






32. The machine language code that is generally referred to as the object or load module






33. Specifies the length of the file's record and the sequence and size of its fields. A file layout also will specify the type of data contained within each field. For example; alphanumeric; zoned decimal; packed and binary are types of data.






34. Transactions that cannot be denied after the fact






35. Files created specifically to record various actions occurring on the system to be monitored; such as failed login attempts; full disk drives and e-mail delivery failures






36. Techniques and procedures used to verify; validate and edit data; to ensure that only correct data are entered into the computer






37. Is the risk to earnings or capital arising from changes in the value of portfolios of financial instruments. Price risk arises from market making; dealing and position taking in interest rate; foreign exchange; equity and commodities markets. Banks m






38. A general hardware control; which helps to detect data errors when data are read from memory or communicated from one computer to another. A 1-bit digit (either 0 or 1) is added to a data item to indicate whether the sum of that data item's bit is od






39. A code whose representation is limited to 0 and 1






40. The initialization procedure that causes an operating system to be loaded into storage at the beginning of a workday or after a system malfunction






41. Machine-readable instructions produced from a compiler or assembler program that has accepted and translated the source code






42. A device that connects two similar networks together






43. A document distributed to software vendors requesting them to submit a proposal to develop or provide a software product






44. An approach used to plan; design; develop; test and implement an application system or a major modification to an application system. Typical phases include the feasibility study; requirements study; requirements definition; detailed design; programm






45. A platform-independent XML-based formatted protocol enabling applications to communicate with each other over the Internet. Use of this protocol may provide a significant security risk to web application operations; since use of SOAP piggybacks onto






46. A type of local area network (LAN) architecture in which each station is directly attached to a common communication channel. Signals transmitted over the channel take the form of messages. As each message passes along the channel; each station recei






47. An authentication protocol; often used by remote-access servers






48. The extent to which a system unit--subroutine; program; module; component; subsystem--performs a single dedicated function. Generally; the more cohesive are units; the easier it is to maintain and enhance a system; since it is easier to determine whe






49. An individual who attempts to gain unauthorized access to a computer system






50. The risk of giving an incorrect audit opinion