Test your basic knowledge |

CISA Certified Information Systems Auditor Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The processing of a group of transactions at the same time. Transactions are collected and processed against the master files at a specified time.






2. A report that identifies the elapsed time when a computer is not operating correctly because of machine failure






3. A mathematical key (kept secret by the holder) used to create digital signatures and; depending upon the algorithm; to decrypt messages or files encrypted (for confidentiality) with the corresponding public key






4. The rules outlining the way in which information is captured and interpreted






5. A document which defines the IS audit function's responsibility; authority and accountability






6. Any intentional violation of the security policy of a system






7. A low-level computer programming language which uses symbolic code and produces machine instructions






8. Used to enable remote access to a server computer. Commands typed are run on the remote server.






9. The transfer of data between separate computer processing sites/devices using telephone lines; microwave and/or satellite links






10. In a passive assault; intruders attempt to learn some characteristic of the data being transmitted. They may be able to read the contents of the data so the privacy of the data is violated. Alternatively; although the content of the data itself may r






11. An abnormal end to a computer job; termination of a task prior to its completion because of an error condition that cannot be resolved by recovery facilities while the task is executing






12. A communications terminal control hardware unit that controls a number of computer terminals. All messages are buffered by the controller and then transmitted to the receiver.






13. The information an auditor gathers in the course of performing an IS audit. Evidence is relevant if it pertains to the audit objectives and has a logical relationship to the findings and conclusions it is used to support.






14. These are the requirements for establishing a database application. They include field definitions; field requirements and reporting requirements for the individual information in the database.






15. Formal document which defines the IS auditor's responsibility; authority and accountability for a specific assignment






16. A networking device that can send (route) data packets from one local area network (LAN) or wide area network (WAN) to another; based on addressing at the network layer (Layer 3) in the OSI model. Networks connected by routers can use different or si






17. A disk access method that stores data sequentially; while also maintaining an index of key fields to all the records in the file for direct access capability






18. Applications that detect; prevent and possibly remove all known viruses from files located in a microcomputer hard drive






19. An auditing concept regarding the importance of an item of information with regard to its impact or effect on the functioning of the entity being audited. An expression of the relative significance or importance of a particular matter in the context






20. A physical control technique that uses a secured card or ID to gain access to a highly sensitive location. Card swipes; if built correctly; act as a preventative control over physical access to those sensitive locations. After a card has been swiped;






21. The transmission of more than one signal across a physical channel






22. A code whose representation is limited to 0 and 1






23. Tests of specified amount fields against stipulated high or low limits of acceptability. When both high and low values are used; the test may be called a range check.






24. A computer facility that provides data processing services to clients on a continual basis






25. A certificate identifying a public key to its subscriber; corresponding to a private key held by that subscriber. It is a unique code that typically is used to allow the authenticity and integrity of communicated data to be verified.






26. The transmission of job control language (JCL) and batches of transactions from a remote terminal location






27. To configure a computer or other network device to resist attacks






28. The process of feeding test data into two systems; the modified system and an alternative system (possibly the original system) and comparing results






29. An evaluation of an application system under development which considers matters such as: appropriate controls are designed into the system; the application will process information in a complete; accurate and reliable manner; the application will fu






30. An XML-formatted language used to describe a web service's capabilities as collections of communication endpoints capable of exchanging messages. WSDL is the language that UDDI uses. (Also see Universal Description; Discovery and Integration (UDDI))






31. A system that authentically distributes users' public keys using certificates






32. An audit designed to evaluate the various internal controls; economy and efficiency of a function or department






33. A public end-to-end digital telecommunications network with signaling; switching and transport capabilities supporting a wide range of service accessed by standardized interfaces with integrated customer control. The standard allows transmission of d






34. A process involving the extraction of components from existing systems and restructuring these components to develop new systems or to enhance the efficiency of existing systems. Existing software systems thus can be modernized to prolong their funct






35. A method of selecting a portion of a population; by means of mathematical calculations and probabilities; for the purpose of making scientifically and mathematically sound inferences regarding the characteristics of the entire population






36. Risks that could impact the organization's ability to perform business or provide a service. They can be financial; regulatory or control oriented.






37. The traditional Internet service protocol widely used for many years on UNIX-based operating systems and supported by the Internet Engineering Task Force (IETF) that allows a program on one computer to execute a program on another (e.g.; server). The






38. Program narratives provide a detailed explanation of program flowcharts; including control points and any external input.






39. The boundary that defines the area of security concern and security policy coverage






40. Measure of interconnectivity among software program modules' structure. Coupling depends on the interface complexity between modules. This can be defined as the point at which entry or reference is made to a module; and what data passes across the in






41. Devices that perform the functions of both bridges and routers; are called brouters. Naturally; they operate at both the data link and the network layers. A brouter connects same data link type LAN segments as well as different data link ones; which






42. An individual using a terminal; PC or an application can access a network to send an unstructured message to another individual or group of people.






43. First; it denotes the planning and management of resources in an enterprise. Second; it denotes a software system that can be used to manage whole business processes; integrating purchasing; inventory; personnel; customer service; shipping; financial






44. An organized assembly of resources and procedures required to collect; process and distribute data for use in decision making






45. A row or record consisting of a set of attribute value pairs (column or field) in a relational data structure






46. An edit check designed to ensure the data in a particular field is numeric






47. Refers to the security of the infrastructure that supports the ERP networking and telecommunications; operating systems and databases.






48. A card reader that reads cards with a magnetizable surface on which data can be stored and retrieved






49. These controls deal with the everyday operation of a company or organization to ensure all objectives are achieved.






50. The transfer of service from an incapacitated primary component to its backup component