SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A numbering system that uses a base of 16 and uses 16 digits: 0; 1; 2; 3; 4; 5; 6; 7; 8; 9; A; B; C; D; E and F. Programmers use hexadecimal numbers as a convenient way of representing binary numbers.
Internal control structure
Hexadecimal
Adjusting period
Permanent virtual circuit (PVC)
2. The time it takes a system and network delay to respond. System latency is the time a system takes to retrieve data. Network latency is the time it takes for a packet to travel from source to the final destination.
Outsourcing
Public key
Verification
Latency
3. An audit designed to evaluate the various internal controls; economy and efficiency of a function or department
Security perimeter
Operational audit
Completeness check
Third-party review
4. A point in a routine at which sufficient information can be stored to permit restarting the computation from that point. NOTE: seems to pertain to recover - shutting down database after all records have been committed for example
Security policy
Checkpoint restart procedures
Third-party review
Executable code
5. A type of password (i.e.; a secret number assigned to an individual) that; in conjunction with some means of identifying the individual; serves to verify the authenticity of the individual. PINs have been adopted by financial institutions as the prim
Voice mail
Personal identification number (PIN)
Error
Production software
6. Computer hardware that houses the electronic circuits that control/direct all operations of the computer system
Expert systems
Project team
Central processing unit (CPU)
Downloading
7. Unusual or statistically rare
Error
Data integrity
Enterprise governance
Anomaly
8. Small computers used to connect and coordinate communication links between distributed or remote devices and the main computer; thus freeing the main computer from this overhead function
Judgment sampling
Communications controller
Client-server
Telecommunications
9. Polymorphism refers to database structures that send the same command to different child objects that can produce different results depending on their family hierarchical tree structure.
Object Management Group (OMG)
Benchmark
Unit testing
Polymorphism (objects)
10. Universal Description; Discovery and Integration
Feasibility study
UDDI
liquidity risk
Permanent virtual circuit (PVC)
11. Controlling access to a network by analyzing the attributes of the incoming and outgoing packets and either letting them pass; or denying them; based on a list of rules
Hub
Packet filtering
Data custodian
Internal control structure
12. Purposefully hidden malicious or damaging code within an authorized computer program. Unlike viruses; they do not replicate themselves; but they can be just as destructive to a single computer.
Vulnerabilities
Applet
Trojan horse
Inherent risk
13. A type of LAN architecture in which the cable forms a loop; with stations attached at intervals around the loop. Signals transmitted around the ring take the form of messages. Each station receives the messages and each station determines; on the bas
Ring topology
Adjusting period
Voice mail
Completeness check
14. An Internet standard that allows a network to use one set of IP addresses for internal traffic and a second set of addresses for external traffic. The server; providing the NAT service; changes the source address of outgoing packets from the internal
Middleware
Hardware
Degauss
NAT (Network Address Translation)
15. The act or function of developing and maintaining applications programs in production
Application programming
Central processing unit (CPU)
Access rights
Normalization
16. A discussion document which sets out an ''Enterprise Governance Model'' focusing strongly on both the enterprise business goals and the information technology enablers which facilitate good enterprise governance; published by the Information Systems
Monetary unit sampling
ACK (acknowledgement)
Database management system (DBMS)
Control Objectives for Enterprise Governance
17. The process of feeding test data into two systems; the modified system and an alternative system (possibly the original system) and comparing results
Circular routing
Duplex routing
Parallel testing
Feasibility study
18. A biometric device that is used to authenticate a user through palm scans
Whitebox testing
Request for proposal (RFP)
Handprint scanner
Independent attitude
19. The rules by which a network operates and controls the flow and priority of transmissions
Utility programs
Public key cryptosystem
Program narratives
Protocol
20. The risk to earnings or capital arising from an obligor's failure to meet the terms of any contract with the bank or otherwise to perform as agreed. Internet banking provides the opportunity for banks to expand their geographic range. Customers can r
Telecommunications
Credit risk
Sniffing
Partitioned file
21. Program narratives provide a detailed explanation of program flowcharts; including control points and any external input.
Relevant audit evidence
Nonrepudiation
Program narratives
System flowcharts
22. Is the risk to earnings or capital arising from movements in interest rates. From an economic perspective; a bank focuses on the sensitivity of the value of its assets; liabilities and revenues to changes in interest rates. Internet banking may attra
Audit plan
RADIUS
Interest rate risk
Manual journal entry
23. A stored collection of related data needed by organizations and individuals to meet their information processing and retrieval requirements
Registration authority (RA)
Computer-assisted audit technique (CAATs)
Database
TCP (transmission control protocol)
24. A software engineering technique whereby an existing application system code can be redesigned and coded using computer-aided software engineering (CASE) technology
Integrated test facilities (ITF)
FIN (final)
Reverse engineering
System software
25. An organization composed of engineers; scientists and students. The IEEE is best known for developing standards for the computer and electronics industry.
Continuity
Hacker
IEEE (Institute of Electrical and Electronics Engineers)--Pronounced I-triple-E
Internal penetrators
26. A set of utilities that implement a particular network protocol. For instance; in Windows machines a TCP/IP stack consists of TCP/IP software; sockets software and hardware driver software.
Enterprise governance
Fault tolerance
IT governance
Protocol stack
27. The practice of eavesdropping on information being transmitted over telecommunications links
Prototyping
Information engineering
Wiretapping
Link editor (linkage editor)
28. A common connection point for devices in a network; hubs commonly are used to connect segments of a LAN. A hub contains multiple ports. When a packet arrives at one port; it is copied to the other ports so that all segments of the LAN can see all pac
System exit
Completeness check
Binary code
Hub
29. A type of LAN architecture that utilizes a central controller to which all nodes are directly connected. All transmissions from one station to another pass through the central controller; which is responsible for managing and controlling all communic
Technical infrastructure security
SYN (synchronize)
ASCII (American Standard Code for Information Interchange)
Star topology
30. A protocol used to transmit data securely between two end points to create a VPN
PPTP (point-to-point tunneling protocol)
Data dictionary
Noise
Reasonableness check
31. A file of semipermanent information that is used frequently for processing data or for more than one purpose
Anonymity
Modulation
Master file
Budget formula
32. Also called permissions or privileges; these are the rights granted to users by the administrator or supervisor. Access rights determine the actions users can perform (e.g.; read; write; execute; create and delete) on files in shared volumes or file
Modulation
UDDI
Access rights
Audit trail
33. Freedom from unauthorized intrusion
Detection risk
Remote procedure calls (RPCs)
Static analysis
Privacy
34. A series of steps to complete an audit objective
Node
IDS (intrusion detection system)
Audit program
Outsourcing
35. A system of computers connected together by a communications network. Each computer processes its data and the network supports the system as a whole. Such a network enhances communication among the linked computers and allows access to shared files.
Tape management system (TMS)
Application software tracing and mapping
Distributed data processing network
Router
36. Information generated by an encryption algorithm to protect the plaintext. The ciphertext is unintelligible to the unauthorized reader.
Ciphertext
Database management system (DBMS)
Application program
E-mail/interpersonal messaging
37. The list of rules and/or guidance that is used to analyze event data
Rulebase
Baseband
Modulation
Appearance of independence
38. Analysis of information that occurs on a noncontinuous basis; also known as interval-based analysis
Static analysis
Repudiation
Link editor (linkage editor)
Router
39. A packet-switched wide-area-network technology that provides faster performance than older packet-switched WAN technologies such as X.25 networks; because it was designed for today's reliable circuits and performs less rigorous error detection. Frame
False positive
Trusted systems
Universal Description; Discovery and Integration (UDDI)
Frame relay
40. Refers to a sprinkler system that does not have water in the pipes during idle usage; unlike a fully charged fire extinguisher system that has water in the pipes at all times. The dry-pipe system is activated at the time of the fire alarm; and water
Promiscuous mode
Attribute sampling
Dry-pipe fire extinguisher system
Password cracker
41. A technique of reading a computer file while bypassing the internal file/data set label. This process could result in bypassing of the security access control system.
Bypass label processing (BLP)
Procedure
Corporate governance
Monetary unit sampling
42. A top-down technique of designing programs and systems. It makes programs more readable; more reliable and more easily maintained.
PPP (point-to-point protocol)
Integrated services digital network (ISDN)
Structured programming
Reasonable assurance
43. A device that forwards packets between LAN devices or segments. LANs that use switches are called switched LANs.
Vulnerability analysis
Switch
Decryption
Access control table
44. A structure of relationships and processes to direct and control the enterprise in order to achieve the enterprise's goals by adding value while balancing risk versus return over IT and its processes
Comparison program
IT governance
Application implementation review
Password cracker
45. Those controls that seek to maintain confidentiality; integrity and availability of information
Firewall
Data security
Web site
Optical scanner
46. Way of thinking; behaving; feeling; etc.
Abend
Baud rate
Ethernet
Attitude
47. A communications channel that can handle only one signal at a time. The two stations must alternate their transmissions.
Half duplex
Computer-aided software engineering (CASE)
Rounding down
Internet
48. Consists of one or more web pages that may originate at one or more web server computers. A person can view the pages of a website in any order; as he or she would a magazine.
Application
Web site
Materiality
Idle standby
49. A router that is configured to control network access by comparing the attributes of the incoming or outgoing packets to a set of rules
Filtering router
Objectivity
Appearance of independence
Record; screen and report layouts
50. Devices that perform the functions of both bridges and routers; are called brouters. Naturally; they operate at both the data link and the network layers. A brouter connects same data link type LAN segments as well as different data link ones; which
Indexed sequential access method (ISAM)
Brouters
World Wide Web Consortium (W3C)
Statistical sampling
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests