SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Detects line errors by retransmitting data back to the sending device for comparison with the original transmission
Decision support systems (DSS)
Bus topology
Echo checks
Program flowcharts
2. The process of converting an analog telecommunications signal into a digital computer signal
Demodulation
Data custodian
Mapping
Comprehensive audit
3. Processing is achieved by entering information into the computer via a video display terminal. The computer immediately accepts or rejects the information; as it is entered.
Symmetric key encryption
SYN (synchronize)
Online data processing
Independence
4. Hardware devices; such as asynchronous and synchronous transmissions; that convert between two different types of transmission
Waterfall development
Protocol converter
Inheritance (objects)
Format checking
5. A data communication network that adds processing services such as error correction; data translation and/or storage to the basic function of transporting data
Value-added network (VAN)
Network hop
Discovery sampling
Business process reengineering (BPR)
6. Is the risk to earnings or capital arising from movements in interest rates. From an economic perspective; a bank focuses on the sensitivity of the value of its assets; liabilities and revenues to changes in interest rates. Internet banking may attra
Interest rate risk
Job control language (JCL)
Control Objectives for Enterprise Governance
Router
7. Measure of interconnectivity among software program modules' structure. Coupling depends on the interface complexity between modules. This can be defined as the point at which entry or reference is made to a module; and what data passes across the in
Network
Independent appearance
Coupling
Redundancy check
8. The ability to exercise judgement; express opinions and present recommendations with impartiality
ISP (Internet service provider)
Protocol stack
ASCII (American Standard Code for Information Interchange)
Objectivity
9. Deliberately testing only the value-added functionality of a software component
Incremental testing
Web page
End-user computing
Outsourcing
10. 1) Following an authorized person into a restricted access area; 2) electronically attaching to an authorized telecommunications link to intercept and possibly alter transmissions.
Latency
Piggy backing
Credentialed analysis
Electronic data interchange (EDI)
11. Memory reserved to temporarily hold data. Buffers are used to offset differences between the operating speeds of different devices; such as a printer and a computer. In a program; buffers are reserved areas of RAM that hold data while they are being
Rapid application development
Batch processing
Reengineering
Buffer
12. A public key cryptosystem developed by R. Rivest; A. Shamir and L. Adleman. The RSA has two different keys; the public encryption key and the secret decryption key. The strength of the RSA depends on the difficulty of the prime number factorization.
Twisted pairs
RSA
Filtering router
Packet filtering
13. The process that limits and controls access to resources of a computer system; a logical or physical control designed to protect against unauthorized entry or use. Access control can be defined by the system (mandatory access control; or MAC) or defi
Cohesion
Anomaly detection
Discovery sampling
Access control
14. A document that confirms the client's and the IS auditor's acceptance of a review assignment
HTTP (hyper text transfer protocol)
Permanent virtual circuit (PVC)
Content filtering
Terms of reference
15. A language used to control run routines in connection with performing tasks on a computer
Twisted pairs
Job control language (JCL)
Tcpdump
Trust
16. A recovery solution provided by recovery and/or hardware vendors and includes a pre-established contract to deliver hardware resources within a specified number amount of hours after a disaster occurs. This solution usually provides organizations wit
Fail-over
Quick ship
Spool (simultaneous peripheral operations online)
Passive response
17. The policies; procedures; practices and organizational structures designed to provide reasonable assurance that business objectives will be achieved and that undesired events will be prevented or detected and corrected.
Fiber optic cable
Information processing facility (IPF)
Internal control
Simple Object Access Protocol (SOAP)
18. A workstation or PC on a network that does not have its own disk. Instead; it stores files on a network file server.
Diskless workstations
Authorization
Range check
Computer sequence checking
19. The computer's primary working memory. Each byte of memory can be accessed randomly regardless of adjacent bytes.
Audit objective
IDS (intrusion detection system)
Baud rate
Random access memory (RAM)
20. A communication protocol used to connect to servers on the World Wide Web. Its primary function is to establish a connection with a web server and transmit HTML pages to the client browser.
HTTP (hyper text transfer protocol)
Link editor (linkage editor)
Symmetric key encryption
Reputational risk
21. A cipher technique whereby different cryptographic keys are used to encrypt and decrypt a message (see public key cryptosystems)
Automated teller machine (ATM)
Data flow
Asymmetric key (public key)
X.500
22. A communication line permanently assigned to connect two points; as opposed to a dial-up line that is only available and open when a connection is made by dialing the target machine or network. Also known as a dedicated line.
Interest rate risk
Materiality
browser
Leased lines
23. An assault on a service from a single source that floods it with so many requests that it becomes overwhelmed and is either stopped completely or operates at a significantly reduced rate
DoS (denial-of-service) attack
legal risk
Substantive testing
Single point of failure
24. A test to check the system's ability to recover after a software or hardware failure
Geographic disk mirroring
Taps
Electronic data interchange (EDI)
Recovery testing
25. 1)A computer dedicated to servicing requests for resources from other computers on a network. Servers typically run network operating systems. 2)A computer that provides services to another computer (the client).
Reasonable assurance
Node
Computer server
Uploading
26. The information systems auditor (IS auditor) gathers information in the course of performing an IS audit. The information used by the IS auditor to meet audit objectives is referred to as audit evidence (evidence). Also used to describe the level of
Hardware
Data integrity
Audit evidence
virtual organizations
27. A general hardware control; which helps to detect data errors when data are read from memory or communicated from one computer to another. A 1-bit digit (either 0 or 1) is added to a data item to indicate whether the sum of that data item's bit is od
Audit evidence
ASP/MSP (application or managed service provider)
Parity check
Business impact analysis (BIA)
28. A protocol used for transmitting data between two ends of a connection
X.500
PPP (point-to-point protocol)
Uploading
Geographic disk mirroring
29. An IS backup facility that has the necessary electrical and physical components of a computer facility; but does not have the computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user
Cold site
Utility programs
Fscal year
Error
30. The process of feeding test data into two systems; the modified system and an alternative system (possibly the original system) and comparing results
Due professional care
Teleprocessing
Data owner
Parallel testing
31. A communications channel over which data can be sent and received simultaneously
Decryption key
Electronic data interchange (EDI)
Service bureau
Full duplex
32. Individuals and departments responsible for the storage and safeguarding of computerized information. This typically is within the IS organization.
Computationally greedy
Data custodian
Electronic cash
Master file
33. The risk that the IS auditor's substantive procedures will not detect an error which could be material; individually or in combination with other errors
Web Services Description Language (WSDL)
DNS (domain name system)
Bypass label processing (BLP)
Detection risk
34. An audit designed to determine the accuracy of financial records; as well as evaluate the internal controls of a function or department
Comprehensive audit
Internal storage
Executable code
Professional competence
35. The property that data meet with a priority expectation of quality and that the data can be relied upon
Diskless workstations
Irregularities
Data integrity
Ethernet
36. A display terminal without processing capability. Dumb terminals are dependent upon the main computer for processing. All entered data are accepted without further editing or validation.
Interface testing
Dumb terminal
Wiretapping
Brute force
37. Standard that defines how global directories should be structured. X.500 directories are hierarchical with different levels for each category of information; such as country; state and city.
X.500
Privilege
Risk assessment
Proxy server
38. A technique used to determine the size of a development task; based on the number of function points. Function points are factors such as inputs; outputs; inquiries and logical internal sites.
Multiplexor
Registration authority (RA)
Function point analysis
Mutual takeover
39. A file format in which the file is divided into multiple subfiles and a directory is established to locate each subfile
Partitioned file
Wide area network (WAN)
Shell
Subject matter (Area of activity)
40. A system that authentically distributes users' public keys using certificates
PPTP (point-to-point tunneling protocol)
Public key infrastructure
Objectivity
Uploading
41. A connectionless Internet protocol that is designed for network efficiency and speed at the expense of reliability. A data request by the client is served by sending packets without testing to verify if they actually arrive at the destination; not if
UDP (User Datagram Protocol)
Man-in-the-middle attack
Accountability
Outsourcing
42. The process of generating; recording and reviewing a chronological record of system events to ascertain their accuracy
Geographic disk mirroring
Magnetic ink character recognition (MICR)
UDP (User Datagram Protocol)
Audit
43. A test that has been designed to evaluate the performance of a system. In a benchmark test; a system is subjected to a known workload and the performance of the system against this workload is measured. Typically; the purpose is to compare the measur
Data diddling
Credentialed analysis
Benchmark
Telnet
44. A low-level computer programming language which uses symbolic code and produces machine instructions
Risk assessment
Public key
Assembly language
Edit controls
45. An entity that may be given responsibility for performing some of the administrative tasks necessary in the registration of subjects; such as confirming the subject's identity; validating that the subject is entitled to have the attributes requested
legal risk
Registration authority (RA)
Offline files
Artificial intelligence
46. The highest level of management in the organization; responsible for direction and control of the organization as a whole (such as director; general manager; partner; chief officer and executive manager).
Electronic vaulting
Top-level management
Anomaly
Error
47. A collection of computer programs used in the design; processing and control of all applications. The programs and processing routines that control the computer hardware; including the operating system and utility programs. Refers to the operating sy
System software
Extended Binary-coded Decimal Interchange Code (EBCDIC)
Permanent virtual circuit (PVC)
Tuple
48. Parallel simulation involves the IS auditor writing a program to replicate those application processes that are critical to an audit opinion and using this program to reprocess application system data. The results produced are compared with the resul
Reciprocal agreement
System flowcharts
Parallel simulation
Nonrepudiable trnasactions
49. To apply a variable; alternating current (AC) field for the purpose of demagnetizing magnetic recording media. The process involves increasing the AC field gradually from zero to some maximum value and back to zero; which leaves a very low residue of
Enterprise resource planning
Cluster controller
Degauss
Production software
50. A top-down technique of designing programs and systems. It makes programs more readable; more reliable and more easily maintained.
Structured programming
Security management
Simple Object Access Protocol (SOAP)
Brouters