Test your basic knowledge |

CISA Certified Information Systems Auditor Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Individuals and departments responsible for the storage and safeguarding of computerized information. This typically is within the IS organization.






2. The process of determining what types of activities are permitted. Ordinarily; authorisation is in the context of authentication: once you have authenticated a user; he/she may be authorised to perform different types of access or activity






3. Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes






4. The portion of a security policy that states the general process that will be performed to accomplish a security goal






5. A device that forwards packets between LAN devices or segments. LANs that use switches are called switched LANs.






6. Records of system events generated by a specialized operating system mechanism






7. An exception report is generated by a program that identifies transactions or data that appear to be incorrect. These items may be outside a predetermined range or may not conform to specified criteria.






8. Analysis that is performed on a continuous basis; with results gained in time to alter the run-time system






9. A testing approach that uses knowledge of a program/module's underlying implementation and code intervals to verify its expected behavior.






10. A device for sending and receiving computerized data over transmission lines






11. An audit designed to evaluate the various internal controls; economy and efficiency of a function or department






12. The logical language a computer understands






13. The process of feeding test data into two systems; the modified system and an alternative system (possibly the original system) and comparing results






14. The central database that stores and organizes data






15. It is composed of an insulated wire that runs through the middle of each cable; a second wire that surrounds the insulation of the inner wire like a sheath; and the outer insulation which wraps the second wire. Coaxial cable has a greater transmissio






16. Diligence which a person would exercise under a given set of circumstances






17. An evaluation of any part of a project to perform maintenance on an application system (e.g.; project management; test plans; user acceptance testing procedures)






18. An edit check designed to ensure the data in a particular field is numeric






19. A testing approach which focuses on the functionality of the application or product and does not require knowledge of the code intervals.






20. First; it denotes the planning and management of resources in an enterprise. Second; it denotes a software system that can be used to manage whole business processes; integrating purchasing; inventory; personnel; customer service; shipping; financial






21. The processing of a group of transactions at the same time. Transactions are collected and processed against the master files at a specified time.






22. A certificate identifying a public key to its subscriber; corresponding to a private key held by that subscriber. It is a unique code that typically is used to allow the authenticity and integrity of communicated data to be verified.






23. Generally; the assumption that an entity will behave substantially as expected. Trust may apply only for a specific function. The key role of this term in an authentication framework is to describe the relationship between an authenticating entity an






24. An IS backup facility that has the necessary electrical and physical components of a computer facility; but does not have the computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user






25. A method of computer fraud involving a computer code that instructs the computer to slice off small amounts of money from an authorized computer transaction and reroute this amount to the perpetrator's account






26. Point-of-sale systems enable capture of data at the time and place of transaction. POS terminals may include use of optical scanners for use with bar codes or magnetic card readers for use with credit cards. POS systems may be online to a central com






27. The objectives of management that are used as the framework for developing and implementing controls (control procedures).






28. Parallel simulation involves the IS auditor writing a program to replicate those application processes that are critical to an audit opinion and using this program to reprocess application system data. The results produced are compared with the resul






29. These controls deal with the everyday operation of a company or organization to ensure all objectives are achieved.






30. A device that forms a barrier between a secure and an open environment. Usually; the open environment is considered hostile. The most notable hostile environment is the Internet. In other words; a firewall enforces a boundary between two or more netw






31. A data recovery strategy that includes a recovery from complete backups that are physically shipped off site once a week. Specifically; logs are batched electronically several times daily; and then loaded into a tape library located at the same facil






32. A trusted third party that serves authentication infrastructures or organizations and registers entities and issues them certificates






33. Inheritance refers to database structures that have a strict hierarchy (no multiple inheritance). Inheritance can initiate other objects irrespective of the class hierarchy; thus there is no strict hierarchy of objects.






34. Processing is achieved by entering information into the computer via a video display terminal. The computer immediately accepts or rejects the information; as it is entered.






35. Disconnecting from the computer






36. A weakness in system security procedures; system design; implementation or internal controls that could be exploited to violate system security.






37. A language used to control run routines in connection with performing tasks on a computer






38. A platform-independent XML-based formatted protocol enabling applications to communicate with each other over the Internet. Use of this protocol may provide a significant security risk to web application operations; since use of SOAP piggybacks onto






39. A mathematical expression used to calculate budget amounts based on actual results; other budget amounts and statistics. With budget formulas; budgets using complex equations; calculations and allocations can be automatically created.






40. Electronic communications by special devices over distances or around devices that preclude direct interpersonal exchange






41. The specific information subject to the IS auditor's report and related procedures which can include things such as the design or operation of internal controls and compliance with privacy practices or standards or specified laws and regulations.






42. Detects errors in the input portion of information that is sent to the computer for processing. The controls may be manual or automated and allow the user to edit data errors before processing.






43. Processes certified as supporting a security goal






44. Diligence which a person; who possesses a special skill; would exercise under a given set of circumstances






45. A standardized body of data created for testing purposes. Users normally establish the data. Base cases validate production application systems and test the ongoing accurate operation of the system.






46. Refers to the security of the infrastructure that supports the ERP networking and telecommunications; operating systems and databases.






47. Point at which terminals are given access to a network






48. Connects a terminal or computer to a communications network via a telephone line. Modems turn digital pulses from the computer into frequencies within the audio range of the telephone system. When acting in the receiver capacity; a modem decodes inco






49. The property that data meet with a priority expectation of quality and that the data can be relied upon






50. Deliberately testing only the value-added functionality of a software component