Test your basic knowledge |

CISA Certified Information Systems Auditor Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The potential loss to an area due to the occurrence of an adverse event






2. Used to enable remote access to a server computer. Commands typed are run on the remote server.






3. The act or function of developing and maintaining applications programs in production






4. A system software tool that logs; monitors and directs computer tape usage






5. A visible trail of evidence enabling one to trace information contained in statements or reports back to the original input source






6. The susceptibility of an audit area to error which could be material; individually or in combination with other errors; assuming that there are no related internal controls






7. The name given to a class of algorithms that repeatedly try all possible combinations until a solution is found






8. A packet-switched wide-area-network technology that provides faster performance than older packet-switched WAN technologies such as X.25 networks; because it was designed for today's reliable circuits and performs less rigorous error detection. Frame






9. Polymorphism refers to database structures that send the same command to different child objects that can produce different results depending on their family hierarchical tree structure.






10. General controls which are designed to manage and monitor the IS environment and which; therefore; affect all IS-related activities






11. A sub-network of the Internet through which information is exchanged by text; graphics; audio and video.






12. Refers to the controls that support the process of transformation of the organisation's legacy information systems into the ERP applications. This would largely cover all aspects of systems implementation and configuration; such as change management






13. Weaknesses in systems that can be exploited in ways that violate security policy






14. Verifies that the control number follows sequentially and any control numbers out of sequence are rejected or noted on an exception report for further research






15. The systems development phase in which systems specifications and conceptual designs are developed; based on end-user needs and requirements






16. Programmed checking of data validity in accordance with predetermined criteria






17. A resource whose loss will result in the loss of service or production






18. A complex set of software programs that control the organization; storage and retrieval of data in a database. It also controls the security and integrity of the database.






19. A special terminal used by computer operations personnel to control computer and systems operations functions. These terminals typically provide a high level of computer access and should be properly secured.






20. An eight-bit code representing 256 characters; used in most large computer systems






21. An evaluation of any part of an implementation project (e.g.; project management; test plans; user acceptance testing procedures)






22. Specialized system software used to perform particular computerized functions and routines that are frequently required during normal processing. Examples include sorting; backing up and erasing data.






23. Any intentional violation of the security policy of a system






24. A specially configured server; designed to attract intruders so that their actions do not affect production systems; also known as a decoy server






25. The amount of time allowed for the recovery of a business function or resource after a disaster occurs






26. English-like; user friendly; nonprocedural computer languages used to program and/or read and process computer files






27. The proportion of known attacks detected by an intrusion detection system






28. Individuals; normally managers or directors; who have responsibility for the integrity; accurate reporting and use of computerized data






29. Is the risk to earnings or capital arising from movements in interest rates. From an economic perspective; a bank focuses on the sensitivity of the value of its assets; liabilities and revenues to changes in interest rates. Internet banking may attra






30. A printed machine-readable code that consists of parallel bars of varied width and spacing






31. Diagramming data that are to be exchanged electronically; including how it is to be used and what business management systems need it. It is a preliminary step for developing an applications link. (Also see application tracing and mapping.)






32. The rules outlining the way in which information is captured and interpreted






33. A testing technique that is used to test program logic within a particular program or module. The purpose of the test is to ensure that the program meets system development guidelines and does not abnormally end during processing.






34. A protocol for packet-switching networks






35. A network monitoring and data acquisition tool that performs filter translation; packet acquisition and packet display






36. Use of the Internet as a remote delivery channel for banking services. Services include the traditional ones; such as opening an account or transferring funds to different accounts; and new banking services; such as electronic bill presentment and pa






37. Is the risk to earnings or capital arising from violations of; or nonconformance with; laws; rules; regulations; prescribed practices or ethical standards. Banks are subject to various forms of legal risk. This can include the risk that assets will t






38. The process of creating and managing duplicate versions of a database. Replication not only copies a database but also synchronizes a set of replicas so that changes made to one replica are reflected in all the others. The beauty of replication is th






39. A device for sending and receiving computerized data over transmission lines






40. A method of computer fraud involving a computer code that instructs the computer to remove small amounts of money from an authorized computer transaction by rounding down to the nearest whole value denomination and rerouting the rounded off amount to






41. A platform-independent XML-based formatted protocol enabling applications to communicate with each other over the Internet. Use of this protocol may provide a significant security risk to web application operations; since use of SOAP piggybacks onto






42. The processing of a group of transactions at the same time. Transactions are collected and processed against the master files at a specified time.






43. Identified by one central processor and databases that form a distributed processing configuration






44. Generally; the assumption that an entity will behave substantially as expected. Trust may apply only for a specific function. The key role of this term in an authentication framework is to describe the relationship between an authenticating entity an






45. A permanent connection between hosts in a packet switched network






46. The Committee on the Financial Aspects of Corporate Governance; set up in May 1991 by the UK Financial Reporting Council; the London Stock Exchange and the UK accountancy profession; was chaired by Sir Adrian Cadbury and produced a report on the subj






47. To configure a computer or other network device to resist attacks






48. A program written in a portable; platform independent computer language; such as Java. It is usually embedded in an HTML page and then executed by a browser. Applets can only perform a restricted set of operations; thus preventing; or at least minimi






49. Cooperating packages of executable software that make their services available through defined interfaces. Components used in developing systems may be commercial off-the-shelf software (COTS) or may be purposely built. However; the goal of component






50. An input device that reads characters and images that are printed or painted on a paper form into the computer.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests