SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A third party that provides organizations with a variety of Internet; and Internet-related services
Teleprocessing
Detailed IS ontrols
ISP (Internet service provider)
Accountability
2. Commonly it is the network segment between the Internet and a private network. It allows access to services from the Internet and the internal private network; while denying access from the Internet directly to the private network.
Function point analysis
Cold site
DMZ (demilitarized zone)
Untrustworthy host
3. 1)A computer dedicated to servicing requests for resources from other computers on a network. Servers typically run network operating systems. 2)A computer that provides services to another computer (the client).
Business process reengineering (BPR)
Computer server
Anonymous File Transfer Protocol (FTP)
Components (as in component-based development)
4. A type of service providing an authentication and accounting system often used for dial-up and remote access security
Objectivity
Performance testing
Network hop
RADIUS (remote authentication dial-in user service)
5. Memory chips with embedded program code that hold their content when power is turned off
Firmware
Piggy backing
Adjusting period
Private key cryptosystems
6. A document which defines the IS audit function's responsibility; authority and accountability
Noise
Audit charter
Data custodian
Control section
7. Allows the network interface to capture all network traffic irrespective of the hardware device to which the packet is addressed
Promiscuous mode
Spool (simultaneous peripheral operations online)
Decision support systems (DSS)
X.500
8. An entity that may be given responsibility for performing some of the administrative tasks necessary in the registration of subjects; such as confirming the subject's identity; validating that the subject is entitled to have the attributes requested
Repository
Terms of reference
Registration authority (RA)
browser
9. Any intentional violation of the security policy of a system
Object code
SMTP (Simple Mail Transport Protocol)
Intrusion
Business process reengineering (BPR)
10. Deliberately testing only the value-added functionality of a software component
Detailed IS ontrols
Mapping
Incremental testing
Run instructions
11. Use of the Internet as a remote delivery channel for banking services. Services include the traditional ones; such as opening an account or transferring funds to different accounts; and new banking services; such as electronic bill presentment and pa
RADIUS (remote authentication dial-in user service)
Bus topology
Hash total
Internet banking
12. A sampling technique that estimates the amount of overstatement in an account balance
Security perimeter
Console log
Criteria
Monetary unit sampling
13. Audit evidence is relevant if it pertains to the audit objectives and has a logical relationship to the findings and conclusions it is used to support.
Relevant audit evidence
Central processing unit (CPU)
Local area network (LAN)
Baseband
14. A communication protocol used to connect to servers on the World Wide Web. Its primary function is to establish a connection with a web server and transmit HTML pages to the client browser.
Nonrepudiation
Link editor (linkage editor)
Due care
HTTP (hyper text transfer protocol)
15. The information systems auditor (IS auditor) gathers information in the course of performing an IS audit. The information used by the IS auditor to meet audit objectives is referred to as audit evidence (evidence). Also used to describe the level of
Passive response
Operator console
Output analyzer
Audit evidence
16. The procedures established to purchase application software; or an upgrade; including evaluation of the supplier's financial stability; track record; resources and references from existing customers
Redundancy check
Systems acquisition process
Attitude
Error risk
17. A telecommunications carrier's facilities in a local area in which service is provided where local service is switched to long distance
Application proxy
Reliable audit evidence
Central office (CO)
Web Services Description Language (WSDL)
18. The act of connecting to the computer. It typically requires entry of a user ID and password into a computer terminal.
Logon
Misuse detection
Private key
Internal control structure
19. A device that forms a barrier between a secure and an open environment. Usually; the open environment is considered hostile. The most notable hostile environment is the Internet. In other words; a firewall enforces a boundary between two or more netw
Firewall
File
Application development review
Authorization
20. The password used to gain access when a system is first installed on a computer or network device. There is a large list published on the Internet and maintained at several locations. Failure to change these after the installation leaves the system v
Internet Engineering Task Force (IETF)
Default password
System flowcharts
Proxy server
21. Techniques and procedures used to verify; validate and edit data; to ensure that only correct data are entered into the computer
Intrusion detection
Hot site
Strategic risk
Input controls
22. The process of electronically sending computerized information from one computer to another computer. Most often; the transfer is from a smaller computer to a larger one.
Uploading
Access control
Brute force
Application programming interface (API)
23. A database structured in a tree/root or parent/child relationship. Each parent can have many children; but each child may have only one parent.
Client-server
Mutual takeover
RS-232 interface
Hierarchical database
24. Correctness checks built into data processing systems and applied to batches of input data; particularly in the data preparation stage. There are two main forms of batch controls: 1) sequence control; which involves numbering the records in a batch c
Batch control
Local area network (LAN)
Handprint scanner
Discovery sampling
25. Controls over the business processes that are supported by the ERP
Salami technique
Internet banking
business process integrity
Optical scanner
26. The risk that activities will include deliberate circumvention of controls with the intent to conceal the perpetuation of irregularities. The unauthorized use of assets or services and abetting or helping to conceal.
Harden
File
Fraud risk
Operational risk
27. An engagement where management does not make a written assertion about the effectiveness of their control procedures; and the IS auditor provides an opinion about subject matter directly; such as the effectiveness of the control procedures
Certificate authority (CA)
Direct reporting engagement
Validity check
Request for proposal (RFP)
28. The accuracy and completeness of information as well as to its validity in accordance with business values and expectations
Certificate Revocation List
Integrity
Bus topology
Assembly language
29. The rules outlining the way in which information is captured and interpreted
Intrusive monitoring
Systems development life cycle (SDLC)
Monitoring policy
Audit responsibility
30. Auxiliary computer hardware equipment used for input; output and data storage. Examples include disk drives and printers.
Access control table
Cluster controller
Peripherals
Masqueraders
31. Diligence which a person; who possesses a special skill; would exercise under a given set of circumstances
Due professional care
Components (as in component-based development)
E-mail/interpersonal messaging
Harden
32. The electronic transmission of transactions (information) between two organizations. EDI promotes a more efficient paperless environment. EDI transmissions can replace the use of standard documents; including invoices or purchase orders.
Protocol
Masqueraders
Electronic data interchange (EDI)
Objectivity
33. Specifies the length of the file's record and the sequence and size of its fields. A file layout also will specify the type of data contained within each field. For example; alphanumeric; zoned decimal; packed and binary are types of data.
Voice mail
Sequential file
File layout
Internet Inter-ORB Protocol (IIOP)
34. The method or communication mode of routing data over the communication network (also see half duplex and full duplex)
Access control table
Data flow
Whitebox testing
Duplex routing
35. Programs that are used to process live or actual data that were received as input into the production environment.
ISP (Internet service provider)
Digital certification
Bulk data transfer
Production programs
36. An Internet standard that allows a network to use one set of IP addresses for internal traffic and a second set of addresses for external traffic. The server; providing the NAT service; changes the source address of outgoing packets from the internal
NAT (Network Address Translation)
Attribute sampling
Reputational risk
Downloading
37. The main memory of the computer's central processing unit
Parallel testing
Internal storage
Object Management Group (OMG)
Auditability
38. Modern expression for organizational development stemming from IS/IT impacts. The ultimate goal of BPR is to yield a better performing structure; more responsive to the customer base and market conditions; while yielding material cost savings. To ree
Preventive controls
Active recovery site (mirrored)
Reciprocal agreement
Business process reengineering (BPR)
39. An organization composed of engineers; scientists and students. The IEEE is best known for developing standards for the computer and electronics industry.
Machine language
Spoofing
IEEE (Institute of Electrical and Electronics Engineers)--Pronounced I-triple-E
Fault tolerance
40. The portion of a security policy that states the general process that will be performed to accomplish a security goal
Credit risk
Checkpoint restart procedures
Password cracker
Procedure
41. A fail-over process in which there are two nodes (as in idle standby but without priority). The node that enters the cluster first owns the resource group; and the second will join as a standby node.
Rotating standby
Machine language
Indexed sequential file
Limit check
42. The act or function of developing and maintaining applications programs in production
Regression testing
Nonrepudiation
Information processing facility (IPF)
Application programming
43. The act of capturing network packets; including those not necessarily destined for the computer running the sniffing software
Sniff
Logical access controls
Redo logs
Black box testing
44. A formal agreement with a third party to perform an IS function for an organization
Relevant audit evidence
Outsourcing
Brute force
Transaction
45. Expert or decision support systems that can be used to assist IS auditors in the decision-making process by automating the knowledge of experts in the field. This technique includes automated risk analysis; systems software and control objectives sof
Vulnerabilities
Hub
Audit expert systems
Transaction
46. An evaluation of any part of a project to perform maintenance on an application system (e.g.; project management; test plans; user acceptance testing procedures)
Check digit
ACK (acknowledgement)
Application maintenance review
Modulation
47. A multiuser; multitasking operating system that is used widely as the master control program in workstations and especially servers
Audit risk
System software
Requirements definition
UNIX
48. Software that is being used and executed to support normal and authorized organizational operations. Such software is to be distinguished from test software; which is being developed or modified; but has not yet been authorized for use by management.
Production software
Polymorphism (objects)
Detection risk
Security software
49. Describes the design properties of a computer system that allow it to resist active attempts to attack or bypass it
Structured programming
Request for proposal (RFP)
Decentralization
Fail-safe
50. Availability relates to information being available when required by the business process now and in the future. It also concerns the safeguarding of necessary resources and associated capabilities.
Availability
Circular routing
Data dictionary
Application security