SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The risk that an error which could occur in an audit area; and which could be material; individually or in combination with other errors; will not be prevented or detected and corrected on a timely basis by the internal control system
Interest rate risk
Control risk
Rapid application development
Authentication
2. A piece of information; a digitized form of signature; that provides sender authenticity; message integrity and nonrepudiation. A digital signature is generated using the sender's private key or applying a one-way hash function.
Fault tolerance
implementation life cycle review
Digital signature
Data communications
3. A printed machine-readable code that consists of parallel bars of varied width and spacing
Smart card
Quick ship
Operator console
Bar code
4. A protocol for packet-switching networks
ISP (Internet service provider)
Segregation/separation of duties
System testing
X.25
5. A complex set of software programs that control the organization; storage and retrieval of data in a database. It also controls the security and integrity of the database.
Distributed data processing network
False negative
Database management system (DBMS)
Audit authority
6. Inheritance refers to database structures that have a strict hierarchy (no multiple inheritance). Inheritance can initiate other objects irrespective of the class hierarchy; thus there is no strict hierarchy of objects.
RS-232 interface
Cold site
Inheritance (objects)
Reasonableness check
7. 1)A computer dedicated to servicing requests for resources from other computers on a network. Servers typically run network operating systems. 2)A computer that provides services to another computer (the client).
Biometric locks
Access path
Computer server
Symmetric key encryption
8. An Internet standard that allows a network to use one set of IP addresses for internal traffic and a second set of addresses for external traffic. The server; providing the NAT service; changes the source address of outgoing packets from the internal
Intrusion detection
Firmware
Asymmetric key (public key)
NAT (Network Address Translation)
9. These controls deal with the everyday operation of a company or organization to ensure all objectives are achieved.
Latency
Internet Engineering Task Force (IETF)
Coaxial cable
Operational control
10. Processes certified as supporting a security goal
Production programs
Automated teller machine (ATM)
Buffer
Trusted processes
11. The information an auditor gathers in the course of performing an IS audit. Evidence is relevant if it pertains to the audit objectives and has a logical relationship to the findings and conclusions it is used to support.
False negative
Evidence
Firmware
Centralized data processing
12. The application of an edit; using a predefined field definition to a submitted information stream; a test to ensure that data conform to a predefined format
Format checking
Hyperlink
Irregularities
Dumb terminal
13. Changing data with malicious intent before or during input into the system
Utility programs
Data diddling
Judgment sampling
DNS (domain name system)
14. The assurance that a party cannot later deny originating data; that it is the provision of proof of the integrity and origin of the data which can be verified by a third party. Nonrepudiation may be provided by a digital signature.
Asymmetric key (public key)
Rulebase
Nonrepudiation
Compensating control
15. The process of electronically inputting source documents by taking an image of the document; thereby eliminating the need for key entry
Image processing
Untrustworthy host
Performance testing
Procedure
16. Refers to the processes by which organisations conduct business electronically with their customers and or public at large using the Internet as the enabling technology.
Structured Query Language (SQL)
Certificate authority (CA)
Business-to-consumer e-commerce (B2C)
Business process reengineering (BPR)
17. The area of the central processing unit (CPU) that executes software; allocates internal memory and transfers operations between the arithmetic-logic; internal storage and output sections of the computer
Control section
Computationally greedy
Access control
Packet switching
18. A process to authenticate (or certify) a party's digital signature; carried out by trusted third parties.
Range check
Peripherals
Digital certification
Exposure
19. A set of utilities that implement a particular network protocol. For instance; in Windows machines a TCP/IP stack consists of TCP/IP software; sockets software and hardware driver software.
L2TP (Layer 2 tunneling protocol)
Private key
Protocol stack
Record; screen and report layouts
20. The risk to earnings or capital arising from an obligor's failure to meet the terms of any contract with the bank or otherwise to perform as agreed. Internet banking provides the opportunity for banks to expand their geographic range. Customers can r
Monitoring policy
ACK (acknowledgement)
Central processing unit (CPU)
Credit risk
21. Typically in large organisations where the quantum of data processed by the ERPs are extremely voluminous; analysis of patterns and trends prove to be extremely useful in ascertaining the efficiency and effectiveness of operations. Most ERPs provide
Electronic cash
Node
Biometrics
Data analysis
22. 1) Two or more networks connected by a router 2) The world's largest network using TCP/IP protocols to link government; university and commercial institutions
Service user
FIN (final)
Detective controls
Internet
23. Impartial point of view which allows the IS auditor to act objectively and with fairness
Independent attitude
Hot site
Strategic risk
Service user
24. A data communication network that adds processing services such as error correction; data translation and/or storage to the basic function of transporting data
Numeric check
Base case
Value-added network (VAN)
Ciphertext
25. A series of tests designed to ensure that the modified program interacts correctly with other system components. These test procedures typically are performed by the system maintenance staff in their development library.
System testing
Integrated test facilities (ITF)
Star topology
Budget hierarchy
26. A policy whereby access is denied unless it is specifically allowed. The inverse of default allow.
Internet Engineering Task Force (IETF)
Decryption
Partitioned file
Default deny policy
27. The organization using the outsourced service
Format checking
FIN (final)
Service user
Taps
28. 1) The set of management statements that documents an organization's philosophy of protecting its computing and information assets 2) The set of security rules enforced by the system's security features
Security policy
Audit accountability
Taps
ISO17799
29. Devices that perform the functions of both bridges and routers; are called brouters. Naturally; they operate at both the data link and the network layers. A brouter connects same data link type LAN segments as well as different data link ones; which
Brouters
Edit controls
Risk assessment
Central processing unit (CPU)
30. A special terminal used by computer operations personnel to control computer and systems operations functions. These terminals typically provide a high level of computer access and should be properly secured.
Addressing
Hub
Operator console
Public key
31. A series of steps to complete an audit objective
Console log
Test programs
Audit program
Optical scanner
32. A group of computers connected by a communications network; where the client is the requesting machine and the server is the supplying machine. Software is specialized at both ends. Processing may take place on either the client or the server but it
Credit risk
Decision support systems (DSS)
Client-server
Payment system
33. The transfer of service from an incapacitated primary component to its backup component
IEEE (Institute of Electrical and Electronics Engineers)--Pronounced I-triple-E
Uninterruptible power supply (UPS)
Fail-over
Protocol stack
34. The act of transferring computerized information from one computer to another computer
Project team
Downloading
Point-of-presence (POP)
Security policy
35. Detects errors in the input portion of information that is sent to the computer for processing. The controls may be manual or automated and allow the user to edit data errors before processing.
Firewall
Edit controls
Confidentiality
Verification
36. A system development technique that enables users and developers to reach agreement on system requirements. Prototyping uses programmed simulation techniques to represent a model of the final system to the user for advisement and critique. The emphas
Database specifications
Prototyping
Asynchronous transmission
PPTP (point-to-point tunneling protocol)
37. A layer within the International Organization for Standardization (ISO)/Open Systems Interconnection (OSI) model. It is used in information transfers between users through application programs and other devices. In this layer various protocols are ne
Masqueraders
Encryption key
Threat
Application layer
38. A basic control that prevents or detects errors and irregularities by assigning responsibility for initiating transactions; recording transactions and custody of assets to separate individuals. Commonly used in large IT organizations so that no singl
Segregation/separation of duties
PPTP (point-to-point tunneling protocol)
Regression testing
Bar case
39. An automated detail report of computer system activity
UDP (User Datagram Protocol)
Console log
Components (as in component-based development)
Data communications
40. The logical route an end user takes to access computerized information. Typically; it includes a route through the operating system; telecommunications software; selected application software and the access control system.
Access path
Private key
Ciphertext
Appearance
41. This approach allows IS auditors to monitor system reliability on a continuous basis and to gather selective audit evidence through the computer.
Access method
ASP/MSP (application or managed service provider)
Handprint scanner
Continuous auditing approach
42. The denial by one of the parties to a transaction or participation in all or part of that transaction or of the content of communications related to that transaction.
Control objective
Cadbury
Repudiation
Anomaly
43. Tests of specified amount fields against stipulated high or low limits of acceptability. When both high and low values are used; the test may be called a range check.
Limit check
RADIUS (remote authentication dial-in user service)
Static analysis
Protection domain
44. The consolidation in 1998 of the ''Cadbury;'' ''Greenbury'' and ''Hampel'' Reports. Named after the Committee Chairs; these reports were sponsored by the UK Financial Reporting Council; the London Stock Exchange; the Confederation of British Industry
Combined Code on Corporate Governance
ISP (Internet service provider)
Audit responsibility
Sampling risk
45. A standardized body of data created for testing purposes. Users normally establish the data. Base cases validate production application systems and test the ongoing accurate operation of the system.
Base case
Corporate governance
Parallel simulation
Blackbox testing
46. A popular local area network operating system developed by the Novell Corp.
Netware
File server
Business-to-consumer e-commerce (B2C)
Remote procedure calls (RPCs)
47. The ability to exercise judgement; express opinions and present recommendations with impartiality
Cohesion
Audit plan
Objectivity
Optical character recognition
48. A code whose representation is limited to 0 and 1
Binary code
Evidence
Proxy server
vulnerability
49. The standards and benchmarks used to measure and present the subject matter and against which the IS auditor evaluates the subject matter. Criteria should be: Objective—free from bias Measurable—provide for consistent measurement Complete—include all
Digital signature
Criteria
Mapping
Dumb terminal
50. Checks the accuracy of the results produced by a test run. There are three types of checks that an output analyzer can perform. First; if a standard set of test data and test results exists for a program; the output of a test run after program mainte
Simple fail-over
Risk assessment
Output analyzer
Administrative controls