SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A response; in which the system (automatically or in concert with the user) blocks or otherwise affects the progress of a detected attack. The response takes one of three forms--amending the environment; collecting more information or striking back a
Data security
Trusted processes
Active response
Credit risk
2. The ability of end users to design and implement their own information system utilizing computer software products
Internal penetrators
End-user computing
Information engineering
Audit
3. A sampling technique used to estimate the average or total value of a population based on a sample; a statistical model used to project a quantitative characteristic; such as a dollar amount
Variable sampling
Audit objective
Service bureau
Honey pot
4. Is the risk to earnings or capital arising from violations of; or nonconformance with; laws; rules; regulations; prescribed practices or ethical standards. Banks are subject to various forms of legal risk. This can include the risk that assets will t
Objectivity
Interest rate risk
L2F (Layer 2 forwarding)
legal risk
5. The primary language used by both application programmers and end users in accessing relational databases
Structured Query Language (SQL)
Monitoring policy
System exit
Hash function
6. An attack strategy in which the attacker intercepts the communications stream between two parts of the victim system and then replaces the traffic between the two components with the intruder's own; eventually assuming control of the communication
Simple Object Access Protocol (SOAP)
Man-in-the-middle attack
Availability
Random access memory (RAM)
7. The computer's primary working memory. Each byte of memory can be accessed randomly regardless of adjacent bytes.
Database administrator (DBA)
Check digit
Random access memory (RAM)
Data owner
8. Specifies the length of the file's record and the sequence and size of its fields. A file layout also will specify the type of data contained within each field. For example; alphanumeric; zoned decimal; packed and binary are types of data.
File layout
Vulnerabilities
PPTP (point-to-point tunneling protocol)
Intranet
9. A numbering system that uses a base of 16 and uses 16 digits: 0; 1; 2; 3; 4; 5; 6; 7; 8; 9; A; B; C; D; E and F. Programmers use hexadecimal numbers as a convenient way of representing binary numbers.
Hexadecimal
X.25
Control Objectives for Enterprise Governance
FIN (final)
10. A piece of information; a digitized form of signature; that provides sender authenticity; message integrity and nonrepudiation. A digital signature is generated using the sender's private key or applying a one-way hash function.
Firewall
Warm-site
Mutual takeover
Digital signature
11. Special system software features and utilities that allow the user to perform complex system maintenance. Use of these exits often permits the user to operate outside of the security access control system.
Data integrity
Hacker
Materiality
System exit
12. A complex set of software programs that control the organization; storage and retrieval of data in a database. It also controls the security and integrity of the database.
DMZ (demilitarized zone)
Database management system (DBMS)
Rotating standby
Business process reengineering (BPR)
13. An automated detail report of computer system activity
Console log
Source code
Cold site
Masking
14. The password used to gain access when a system is first installed on a computer or network device. There is a large list published on the Internet and maintained at several locations. Failure to change these after the installation leaves the system v
Default password
Bus
System testing
Feasibility study
15. An approach to system development where the basic unit of attention is an object; which represents an encapsulation of both data (an object's attributes) and functionality (an object's methods). Objects usually are created using a general template ca
Automated teller machine (ATM)
ISO17799
Fourth generation language (4GL)
Object orientation
16. The process of feeding test data into two systems; the modified system and an alternative system (possibly the original system) and comparing results
Materiality
Preventive controls
Reputational risk
Parallel testing
17. A cipher technique whereby different cryptographic keys are used to encrypt and decrypt a message (see public key cryptosystems)
World Wide Web Consortium (W3C)
Abend
Hypertext
Asymmetric key (public key)
18. A program that translates programming language (source code) into machine executable instructions (object code)
DDoS (distributed denial-of-service) attack
Interface testing
Compiler
Backup
19. A discussion document which sets out an ''Enterprise Governance Model'' focusing strongly on both the enterprise business goals and the information technology enablers which facilitate good enterprise governance; published by the Information Systems
Variable sampling
File
Diskless workstations
Control Objectives for Enterprise Governance
20. A document that confirms the client's and the IS auditor's acceptance of a review assignment
Terms of reference
Computationally greedy
Utility software
Compiler
21. A group of budgets linked together at different levels such that the budgeting authority of a lower-level budget is controlled by an upper-level budget.
Scure socket layer (SSL)
Budget hierarchy
Compiler
Business risk
22. Any yearly accounting period without regard to its relationship to a calendar year.
Fscal year
BSP (business service provider)
Default deny policy
Output analyzer
23. Range checks ensure that data fall within a predetermined range (also see limit checks).
Range check
Security software
Hacker
Database specifications
24. Diligence which a person; who possesses a special skill; would exercise under a given set of circumstances
Due professional care
Firewall
Online data processing
Assembler
25. The main memory of the computer's central processing unit
Internal storage
Sniff
TCP (transmission control protocol)
Static analysis
26. The rate of transmission for telecommunication data. It is expressed in bits per second (bps).
Indexed sequential file
Private key
Internet Inter-ORB Protocol (IIOP)
Baud rate
27. A public key cryptosystem developed by R. Rivest; A. Shamir and L. Adleman. The RSA has two different keys; the public encryption key and the secret decryption key. The strength of the RSA depends on the difficulty of the prime number factorization.
Frame relay
business process integrity
RSA
Wide area network (WAN)
28. A device that forwards packets between LAN devices or segments. LANs that use switches are called switched LANs.
Surge suppressor
Attitude
Cold site
Switch
29. Promulgated through the World Wide Web Consortium; XML is a web-based application development technique that allows designers to create their own customized tags; thus; enabling the definition; transmission; validation and interpretation of data betw
Hub
Queue
Extensible Markup Language (XML)
Addressing
30. A trusted third party that serves authentication infrastructures or organizations and registers entities and issues them certificates
Job control language (JCL)
Certificate authority (CA)
Protection domain
Structured programming
31. A destructive computer program that spreads from computer to computer using a range of methods; including infecting floppy disks and other programs. Viruses typically attach themselves to a program and modify it so that the virus code runs when the p
vulnerability
Anonymity
Prototyping
Virus
32. Memory reserved to temporarily hold data. Buffers are used to offset differences between the operating speeds of different devices; such as a printer and a computer. In a program; buffers are reserved areas of RAM that hold data while they are being
Cold site
Base case
Sniff
Buffer
33. A debit or credit to a general ledger account. See also manual journal entry.
Inherent risk
Access path
Web site
Journal entry
34. The Internet standards setting organization with affiliates internationally from network industry representatives. This includes all network industry developers and researchers concerned with evolution and planned growth of the Internet.
Split data systems
RADIUS
Internet Engineering Task Force (IETF)
Recovery time objective (RTO)
35. A protocol originally developed by Netscape Communications to provide a high level of security for its browser software. It has become accepted widely as a means of securing Internet message exchanges. It ensures confidentiality of the data in transm
Bus topology
Scure socket layer (SSL)
Object Management Group (OMG)
Packet
36. Unauthorized electronic exits; or doorways; out of an authorized computer program into a set of malicious instructions or programs
Trap door
Asymmetric key (public key)
Application programming interface (API)
Blackbox testing
37. A proxy service that connects programs running on internal networks to services on exterior networks by creating two connections; one from the requesting client and another to the destination service
Exposure
Anomaly detection
Operating system
Application proxy
38. The process of actually entering transactions into computerized or manual files. Such transactions might immediately update the master files or may result in memo posting; in which the transactions are accumulated over a period of time; then applied
Datagram
Exposure
Top-level management
Posting
39. A sampling technique that estimates the amount of overstatement in an account balance
Monetary unit sampling
Incremental testing
Black box testing
Automated teller machine (ATM)
40. Software that is being used and executed to support normal and authorized organizational operations. Such software is to be distinguished from test software; which is being developed or modified; but has not yet been authorized for use by management.
Link editor (linkage editor)
Production software
IP (Internet protocol)
Logon
41. Universal Description; Discovery and Integration
UDDI
DMZ (demilitarized zone)
Indexed sequential access method (ISAM)
Biometric locks
42. A popular network protocol and cabling scheme that uses a bus topology and CSMA/CD (carrier sense multiple access/collision detection) to prevent network failures or collisions when two devices try to access the network at the same time
Source code
Service bureau
Ethernet
Artificial intelligence
43. The process of creating and managing duplicate versions of a database. Replication not only copies a database but also synchronizes a set of replicas so that changes made to one replica are reflected in all the others. The beauty of replication is th
Sufficient audit evidence
Database replication
Bridge
Editing
44. Controls over the business processes that are supported by the ERP
Data custodian
Financial audit
Professional competence
business process integrity
45. A method of user authentication. Challenge response authentication is carried out through use of the Challenge Handshake Authentication Protocol (CHAP). When a user tries to log into the server; the server sends the user a ''challenge;'' which is a r
Circular routing
Gateway
Modem (modulator-demodulator)
Challenge/response token
46. Programs that provide assurance that the software being audited is the correct version of the software; by providing a meaningful listing of any discrepancies between the two versions of the program
Independence
Operating system audit trails
ISO17799
Source code compare programs
47. A recurring journal entry used to allocate revenues or costs. For example; an allocation entry could be defined to allocate costs to each department based on headcount.
Allocation entry
Intranet
Residual risk
Penetration testing
48. An evaluation of any part of a project to perform maintenance on an application system (e.g.; project management; test plans; user acceptance testing procedures)
Application maintenance review
legal risk
Threat
Data flow
49. A collection of computer programs used in the design; processing and control of all applications. The programs and processing routines that control the computer hardware; including the operating system and utility programs. Refers to the operating sy
COCO
System software
Public key
Project team
50. 1) The set of management statements that documents an organization's philosophy of protecting its computing and information assets 2) The set of security rules enforced by the system's security features
L2TP (Layer 2 tunneling protocol)
Security policy
Function point analysis
Object Management Group (OMG)
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests