SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Verifies that the control number follows sequentially and any control numbers out of sequence are rejected or noted on an exception report for further research
Repudiation
Computer sequence checking
Intrusion
Console log
2. Simulated transactions that can be used to test processing logic; computations and controls actually programmed in computer applications. Individual programs or an entire system can be tested. This technique includes Integrated Test Facilities (ITFs)
Test data
Error
L2TP (Layer 2 tunneling protocol)
Local loop
3. A program for the examination of data; using logical or conditional tests to determine or to identify similarities or differences
Base case
Comparison program
Audit responsibility
Test data
4. A form of modulation in which data signals are pulsed directly on the transmission medium without frequency division and usually utilize a transceiver. In baseband the entire bandwidth of the transmission medium (e.g.; coaxial cable) is utilized for
Audit program
Sufficient audit evidence
Hacker
Baseband
5. A display terminal without processing capability. Dumb terminals are dependent upon the main computer for processing. All entered data are accepted without further editing or validation.
Dumb terminal
Application implementation review
Mutual takeover
Privacy
6. Describes the design properties of a computer system that allow it to resist active attempts to attack or bypass it
Peripherals
Fail-safe
Middleware
Application software tracing and mapping
7. The denial by one of the parties to a transaction or participation in all or part of that transaction or of the content of communications related to that transaction.
Data-oriented systems development
Packet switching
Repudiation
Virtual private network (VPN)
8. Impartial point of view which allows the IS auditor to act objectively and with fairness
Ciphertext
Datagram
Independent attitude
Fraud risk
9. Diagramming data that are to be exchanged electronically; including how it is to be used and what business management systems need it. It is a preliminary step for developing an applications link. (Also see application tracing and mapping.)
Taps
Run-to-run totals
Hash function
Mapping
10. A set of metrics designed to measure the extent to which performance objectives are being achieved on an on-going basis. They can include service level agreements; critical success factors; customer satisfaction ratings; internal or external benchmar
Alpha
Performance indicators
Rotating standby
Source documents
11. The process of taking an unencrypted message (plaintext); applying a mathematical function to it (encryption algorithm with a key) and producing an encrypted message (ciphertext)
Service level agreement (SLA)
Encryption
Production programs
TCP (transmission control protocol)
12. A private key cryptosystem published by the National Bureau of Standards (NBS); the predecessor of the US National Institute of Standards and Technology (NIST). DES has been used commonly for data encryption in the forms of software and hardware impl
Data Encryption Standard (DES)
Address
Due professional care
Multiplexor
13. It is composed of an insulated wire that runs through the middle of each cable; a second wire that surrounds the insulation of the inner wire like a sheath; and the outer insulation which wraps the second wire. Coaxial cable has a greater transmissio
Audit sampling
Limit check
Coaxial cable
Indexed sequential access method (ISAM)
14. A language used to control run routines in connection with performing tasks on a computer
Assembler
Digital certification
Job control language (JCL)
Echo checks
15. To apply a variable; alternating current (AC) field for the purpose of demagnetizing magnetic recording media. The process involves increasing the AC field gradually from zero to some maximum value and back to zero; which leaves a very low residue of
Production software
Computer server
Coaxial cable
Degauss
16. The area of the central processing unit that performs mathematical and analytical operations
Arithmetic-logic unit (ALU)
Logon
Circuit-switched network
Proxy server
17. Editing ensures that data conform to predetermined criteria and enable early identification of potential errors.
Degauss
Components (as in component-based development)
System testing
Editing
18. A server that acts on behalf of a user. Typical proxies accept a connection from a user; make a decision as to whether or not the user or client IP address is permitted to use the proxy; perhaps perform additional authentication; and complete a conne
Transaction
Proxy server
Windows NT
Tcpdump
19. An entity (department; cost center; division or other group) responsible for entering and maintaining budget data.
Coverage
legal risk
Budget organization
Misuse detection
20. Disconnecting from the computer
Engagement letter
Coaxial cable
Logoff
Computer-assisted audit technique (CAATs)
21. A form of attribute sampling that is used to determine a specified probability of finding at least one example of an occurrence (attribute) in a population
Allocation entry
Discovery sampling
Modem (modulator-demodulator)
Format checking
22. An evaluation of an application system under development which considers matters such as: appropriate controls are designed into the system; the application will process information in a complete; accurate and reliable manner; the application will fu
Application development review
Worm
Access rights
Logoff
23. The primary language used by both application programmers and end users in accessing relational databases
Scheduling
Structured Query Language (SQL)
Attribute sampling
Indexed sequential file
24. An international standard that defines information confidentiality; integrity and availability controls
Encapsulation (objects)
Synchronous transmission
ISO17799
Voice mail
25. An exception report is generated by a program that identifies transactions or data that appear to be incorrect. These items may be outside a predetermined range or may not conform to specified criteria.
UDDI
BSP (business service provider)
Exception reports
Ethernet
26. The information systems auditor (IS auditor) gathers information in the course of performing an IS audit. The information used by the IS auditor to meet audit objectives is referred to as audit evidence (evidence). Also used to describe the level of
Transaction
Audit charter
Audit evidence
Independent attitude
27. Detects line errors by retransmitting data back to the sending device for comparison with the original transmission
Echo checks
Decision support systems (DSS)
Twisted pairs
Public key infrastructure
28. An interactive system that provides the user with easy access to decision models and data; to support semistructured decision-making tasks
Decentralization
Decision support systems (DSS)
Edit controls
IPSec (Internet protocol security)
29. Software used to administer logical security. It usually includes authentication of users; access granting according to predefined rules; monitoring and reporting functions.
Outsourcing
Single point of failure
Security software
Object orientation
30. A phase of an SDLC methodology that researches the feasibility and adequacy of resources for the development or acquisition of a system solution to a user need
Frame relay
Feasibility study
Access path
Reputational risk
31. Files created specifically to record various actions occurring on the system to be monitored; such as failed login attempts; full disk drives and e-mail delivery failures
Black box testing
Logs/Log file
Security perimeter
DMZ (demilitarized zone)
32. A device that forwards packets between LAN devices or segments. LANs that use switches are called switched LANs.
Switch
System narratives
Hierarchical database
Interface testing
33. Information generated by an encryption algorithm to protect the plaintext. The ciphertext is unintelligible to the unauthorized reader.
Top-level management
Data leakage
liquidity risk
Ciphertext
34. Risks that could impact the organization's ability to perform business or provide a service. They can be financial; regulatory or control oriented.
Local loop
Asymmetric key (public key)
Business risk
Engagement letter
35. An eight-bit code representing 256 characters; used in most large computer systems
Security administrator
Due professional care
Logon
Extended Binary-coded Decimal Interchange Code (EBCDIC)
36. In intrusion detection; an error that occurs when a normal activity is misdiagnosed as an attack
False positive
Comprehensive audit
External router
FIN (final)
37. Compares data to predefined reasonability limits or occurrence rates established for the data.
Access control
Asynchronous transmission
Image processing
Reasonableness check
38. Specifies the length of the file's record and the sequence and size of its fields. A file layout also will specify the type of data contained within each field. For example; alphanumeric; zoned decimal; packed and binary are types of data.
LDAP (Lightweight Directory Access Protocol)
File layout
Voice mail
Analog
39. The ability to map a given activity or event back to the responsible party
Information engineering
Asynchronous transmission
Optical scanner
Accountability
40. One who obtains products or services from a bank to be used primarily for personal; family or household purposes.
Inherent risk
Internal control structure
Backup
Consumer
41. Detects transmission errors by appending calculated bits onto the end of each segment of data
Budget organization
Redundancy check
Audit authority
Object-oriented system development
42. The procedures established to purchase application software; or an upgrade; including evaluation of the supplier's financial stability; track record; resources and references from existing customers
Magnetic card reader
Systems acquisition process
Topology
Compiler
43. 1) The process of establishing and maintaining security in a computer or network system. The stages of this process include prevention of security problems; detection of intrusions; investigation of intrusions and resolution.2) In network management;
Trojan horse
Challenge/response token
Security management
Log
44. The transfer of service from an incapacitated primary component to its backup component
Peripherals
Modem (modulator-demodulator)
Error risk
Fail-over
45. Techniques and procedures used to verify; validate and edit data; to ensure that only correct data are entered into the computer
Input controls
UNIX
Recovery testing
Residual risk
46. Memory reserved to temporarily hold data. Buffers are used to offset differences between the operating speeds of different devices; such as a printer and a computer. In a program; buffers are reserved areas of RAM that hold data while they are being
Administrative controls
Client-server
Buffer
Local area network (LAN)
47. These controls are designed to correct errors; omissions and unauthorized uses and intrusions; once they are detected.
Corrective controls
Abend
Normalization
Format checking
48. A document which defines the IS audit function's responsibility; authority and accountability
ACK (acknowledgement)
Audit charter
Promiscuous mode
Harden
49. The initialization procedure that causes an operating system to be loaded into storage at the beginning of a workday or after a system malfunction
Verification
Initial program load (IPL)
Fail-over
Application implementation review
50. The ability to exercise judgement; express opinions and present recommendations with impartiality
Objectivity
Risk assessment
Data diddling
Assembly language
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests