Test your basic knowledge |

CISA Certified Information Systems Auditor Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The structure through which the objectives of an organization are set; and the means of attaining those objectives; and determines monitoring performance guidelines. Good corporate governance should provide proper incentives for board and management






2. A public end-to-end digital telecommunications network with signaling; switching and transport capabilities supporting a wide range of service accessed by standardized interfaces with integrated customer control. The standard allows transmission of d






3. Generally; the assumption that an entity will behave substantially as expected. Trust may apply only for a specific function. The key role of this term in an authentication framework is to describe the relationship between an authenticating entity an






4. A communications channel that can handle only one signal at a time. The two stations must alternate their transmissions.






5. Also known as traditional development; it is a very procedure-focused development cycle with formal sign-off at the completion of each level.






6. Point at which terminals are given access to a network






7. Audit evidence is relevant if it pertains to the audit objectives and has a logical relationship to the findings and conclusions it is used to support.






8. A set of routines; protocols and tools referred to as ''building blocks'' used in business application software development. A good API makes it easier to develop a program by providing all the building blocks related to functional characteristics of






9. Simulated transactions that can be used to test processing logic; computations and controls actually programmed in computer applications. Individual programs or an entire system can be tested. This technique includes Integrated Test Facilities (ITFs)






10. An individual or department responsible for the security and information classification of the shared data stored on a database system. This responsibility includes the design; definition and maintenance of the database.






11. Control Objectives for Information and related Technology; the international set of IT control objectives published by ISACF;® 2000; 1998; 1996






12. A fail-over process in which the primary node owns the resource group. The backup node runs idle; only supervising the primary node. In case of a primary node outage; the backup node takes over. The nodes are prioritized; which means the surviving no






13. The process of feeding test data into two systems; the modified system and an alternative system (possibly the original system) and comparing results






14. An individual who attempts to gain unauthorized access to a computer system






15. A response; in which the system (automatically or in concert with the user) blocks or otherwise affects the progress of a detected attack. The response takes one of three forms--amending the environment; collecting more information or striking back a






16. Promulgated through the World Wide Web Consortium; XML is a web-based application development technique that allows designers to create their own customized tags; thus; enabling the definition; transmission; validation and interpretation of data betw






17. Advanced computer systems that can simulate human capabilities; such as analysis; based on a predetermined set of rules






18. A sampling technique that estimates the amount of overstatement in an account balance






19. A communications channel over which data can be sent and received simultaneously






20. Group of people responsible for a project; whose terms of reference may include the development; acquisition; implementation or maintenance of an application system. The team members may include line management; operational line staff; external contr






21. A testing technique that is used to evaluate output from one application; while the information is sent as input to another application






22. The risk that an error which could occur in an audit area; and which could be material; individually or in combination with other errors; will not be prevented or detected and corrected on a timely basis by the internal control system






23. Changing data with malicious intent before or during input into the system






24. A process used to identify and evaluate risks and their potential effects






25. A weakness in system security procedures; system design; implementation or internal controls that could be exploited to violate system security.






26. Test data are processed in production systems. The data usually represent a set of fictitious entities such as departments; customers and products. Output reports are verified to confirm the correctness of the processing.






27. A program that translates programming language (source code) into machine executable instructions (object code)






28. Those controls that seek to maintain confidentiality; integrity and availability of information






29. A vacuum tube that displays data by means of an electron beam striking the screen; which is coated with suitable phosphor material or a device similar to a television screen upon which data can be displayed






30. An internal control that reduces the risk of an existing or potential control weakness resulting in errors and omissions






31. The actions/controls dealing with operational effectiveness; efficiency and adherence to regulations and management policies






32. A 24-hour; stand-alone mini-bank; located outside branch bank offices or in public places like shopping malls. Through ATMs; clients can make deposits; withdrawals; account inquiries and transfers. Typically; the ATM network is comprised of two spher






33. The standards and benchmarks used to measure and present the subject matter and against which the IS auditor evaluates the subject matter. Criteria should be: Objective—free from bias Measurable—provide for consistent measurement Complete—include all






34. In vulnerability analysis; gaining information by performing checks that affects the normal operation of the system; even crashing the system






35. Provide verification that all transmitted data are read and processed






36. Considered for acquisition the person responsible for high-level decisions; such as changes to the scope and/or budget of the project; and whether or not to implement






37. Provides short-term backup power from batteries for a computer system when the electrical power fails or drops to an unacceptable voltage level






38. A resource whose loss will result in the loss of service or production






39. Behavior adequate to meet the situations occurring during audit work (interviews; meetings; reporting; etc.). The IS auditor should be aware that appearance of independence depends upon the perceptions of others and can be influenced by improper acti






40. A form of attribute sampling that is used to determine a specified probability of finding at least one example of an occurrence (attribute) in a population






41. A visible trail of evidence enabling one to trace information contained in statements or reports back to the original input source






42. The electronic transmission of transactions (information) between two organizations. EDI promotes a more efficient paperless environment. EDI transmissions can replace the use of standard documents; including invoices or purchase orders.






43. Files maintained by a system; primarily a database management system; for the purposed of reapplying changes following an error or outage recovery






44. An automated function that can be operating system or application based in which electronic data being transmitted between storage areas are spooled or stored until the receiving device or storage area is prepared and able to receive the information.






45. A program for the examination of data; using logical or conditional tests to determine or to identify similarities or differences






46. Refers to the security of the infrastructure that supports the ERP networking and telecommunications; operating systems and databases.






47. A protocol originally developed by Netscape Communications to provide a high level of security for its browser software. It has become accepted widely as a means of securing Internet message exchanges. It ensures confidentiality of the data in transm






48. A type of service providing an authentication and accounting system often used for dial-up and remote access security






49. Cooperating packages of executable software that make their services available through defined interfaces. Components used in developing systems may be commercial off-the-shelf software (COTS) or may be purposely built. However; the goal of component






50. The person responsible for maintaining a LAN and assisting end users