SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Point-of-sale systems enable capture of data at the time and place of transaction. POS terminals may include use of optical scanners for use with bar codes or magnetic card readers for use with credit cards. POS systems may be online to a central com
Recovery time objective (RTO)
Point-of-sale systems (POS)
Components (as in component-based development)
Reasonable assurance
2. Typically in large organisations where the quantum of data processed by the ERPs are extremely voluminous; analysis of patterns and trends prove to be extremely useful in ascertaining the efficiency and effectiveness of operations. Most ERPs provide
Wide area network (WAN)
Untrustworthy host
Data analysis
IT governance
3. Tests of detailed activities and transactions; or analytical review tests; designed to obtain audit evidence on the completeness; accuracy or existence of those activities or transactions during the audit period
Recovery time objective (RTO)
Rapid application development
Service bureau
Substantive testing
4. 1)A computer dedicated to servicing requests for resources from other computers on a network. Servers typically run network operating systems. 2)A computer that provides services to another computer (the client).
Dial-in access controls
Computer server
Internal control
Passive response
5. A piece of information; in a digitized form; used to recover the plaintext from the corresponding ciphertext by decryption
Decryption key
End-user computing
Unit testing
Internet Engineering Task Force (IETF)
6. Is the risk to earnings or capital arising from a bank's inability to meet its obligations when they come due; without incurring unacceptable losses. Internet banking may increase deposit volatility from customers who maintain accounts solely on the
liquidity risk
Cleartext
Protection domain
Segregation/separation of duties
7. The main memory of the computer's central processing unit
DMZ (demilitarized zone)
Handprint scanner
Internal storage
X.500
8. Interface between data terminal equipment and data communications equipment employing serial binary data interchange
DNS (domain name system)
RS-232 interface
HTTP (hyper text transfer protocol)
Substantive testing
9. A program that translates programming language (source code) into machine executable instructions (object code)
Reverse engineering
Client-server
IEEE (Institute of Electrical and Electronics Engineers)--Pronounced I-triple-E
Compiler
10. Programs and supporting documentation that enable and facilitate use of the computer. Software controls the operation of the hardware.
Cluster controller
Leased lines
Operational control
Software
11. Attackers that penetrate systems by using user identifiers and passwords taken from legitimate users
Fail-over
Split data systems
Security management
Masqueraders
12. Members of the operations area that are responsible for the collection; logging and submission of input for the various user groups
Test programs
Corporate exchange rate
Internet Engineering Task Force (IETF)
Control group
13. A program that processes actions upon business data; such as data entry; update or query. It contrasts with systems program; such as an operating system or network control program; and with utility programs; such as copy or sort.
Application program
Computer server
Cryptography
Edit controls
14. A packet (encapsulated with a frame containing information); which is transmitted in a packet-switching network from source to destination
Compiler
E-mail/interpersonal messaging
Datagram
Security management
15. An eight-digit/seven-bit code representing 128 characters; used in most small computers
End-user computing
Requirements definition
Application system
ASCII (American Standard Code for Information Interchange)
16. An international consortium founded in 1994 of affiliates from public and private organizations involved with the Internet and the web. The W3C's primary mission is to promulgate open standards to further enhance the economic growth of Internet web s
Worm
Security policy
World Wide Web Consortium (W3C)
COBIT
17. To record details of information or events in an organized record-keeping system; usually sequenced in the order they occurred
Harden
Log
Trojan horse
Assembly language
18. A method of user authentication. Challenge response authentication is carried out through use of the Challenge Handshake Authentication Protocol (CHAP). When a user tries to log into the server; the server sends the user a ''challenge;'' which is a r
Challenge/response token
DDoS (distributed denial-of-service) attack
Terms of reference
Range check
19. The denial by one of the parties to a transaction or participation in all or part of that transaction or of the content of communications related to that transaction.
Filtering router
Repudiation
Sampling risk
Security administrator
20. An internal control that reduces the risk of an existing or potential control weakness resulting in errors and omissions
Compensating control
Uninterruptible power supply (UPS)
Budget hierarchy
Redundancy check
21. A group of computers connected by a communications network; where the client is the requesting machine and the server is the supplying machine. Software is specialized at both ends. Processing may take place on either the client or the server but it
Client-server
Encapsulation (objects)
Operating system
Software
22. Software used to administer logical security. It usually includes authentication of users; access granting according to predefined rules; monitoring and reporting functions.
Security software
Foreign exchange risk
Application software tracing and mapping
Encryption
23. Wiring devices that may be inserted into communication links for use with analysis probes; LAN analyzers and intrusion detection security systems
Electronic signature
Taps
ASCII (American Standard Code for Information Interchange)
Data security
24. An interface point between the CPU and a peripheral device
Irregularities
Parallel simulation
Port
Hypertext
25. A device for sending and receiving computerized data over transmission lines
Terminal
Redo logs
IT governance
Trusted systems
26. An approach used to plan; design; develop; test and implement an application system or a major modification to an application system. Typical phases include the feasibility study; requirements study; requirements definition; detailed design; programm
Biometric locks
Circuit-switched network
Control perimeter
Systems development life cycle (SDLC)
27. Polymorphism refers to database structures that send the same command to different child objects that can produce different results depending on their family hierarchical tree structure.
Extended Binary-coded Decimal Interchange Code (EBCDIC)
Reputational risk
Polymorphism (objects)
Verification
28. A collection of related information treated as a unit. Separate fields within the record are used for processing of the information.
Local loop
Artificial intelligence
Record
Quick ship
29. General controls which are designed to manage and monitor the IS environment and which; therefore; affect all IS-related activities
Digital signature
Budget
Pervasive IS controls
Tape management system (TMS)
30. The extent to which a system unit--subroutine; program; module; component; subsystem--performs a single dedicated function. Generally; the more cohesive are units; the easier it is to maintain and enhance a system; since it is easier to determine whe
Compiler
Systems analysis
Coupling
Cohesion
31. Defined minimum performance measures at or above which the service delivered is considered acceptable
Cluster controller
Simple Object Access Protocol (SOAP)
Service level agreement (SLA)
Subject matter (Area of activity)
32. Software used to create data to be used in the testing of computer programs
Data security
Recovery point objective (RPO)—
Test generators
Embedded audit module
33. A communication line permanently assigned to connect two points; as opposed to a dial-up line that is only available and open when a connection is made by dialing the target machine or network. Also known as a dedicated line.
Leased lines
System testing
Appearance of independence
Digital signature
34. 1) Two or more networks connected by a router 2) The world's largest network using TCP/IP protocols to link government; university and commercial institutions
Central processing unit (CPU)
Penetration testing
Internet
Compensating control
35. Processing is achieved by entering information into the computer via a video display terminal. The computer immediately accepts or rejects the information; as it is entered.
Online data processing
Active recovery site (mirrored)
Batch processing
Virtual private network (VPN)
36. Confidentiality concerns the protection of sensitive information from unauthorized disclosure
Indexed sequential access method (ISAM)
Monitoring policy
Authentication
Confidentiality
37. An attack strategy in which the attacker successively hacks into a series of connected systems; obscuring his/her identify from the victim of the attack
Full duplex
Network hop
Program flowcharts
Risk
38. Source code is the language in which a program is written. Source code is translated into object code by assemblers and compilers. In some cases; source code may be converted automatically into another language by a conversion program. Source code is
Source code
Record
Artificial intelligence
UNIX
39. Detects transmission errors by appending calculated bits onto the end of each segment of data
Computer-aided software engineering (CASE)
e-commerce
Redundancy check
Application
40. Is an electronic pathway that may be displayed in the form of highlighted text; graphics or a button that connects one web page with another web page address.
PPTP (point-to-point tunneling protocol)
Hyperlink
Protection domain
Coupling
41. A process to authenticate (or certify) a party's digital signature; carried out by trusted third parties.
Request for proposal (RFP)
Image processing
Digital certification
Bus
42. In intrusion detection; an error that occurs when a normal activity is misdiagnosed as an attack
Anonymous File Transfer Protocol (FTP)
False positive
Variable sampling
Baud rate
43. A mathematical expression used to calculate budget amounts based on actual results; other budget amounts and statistics. With budget formulas; budgets using complex equations; calculations and allocations can be automatically created.
Switch
Authentication
liquidity risk
Budget formula
44. A disk access method that stores data sequentially; while also maintaining an index of key fields to all the records in the file for direct access capability
Access control table
Indexed sequential access method (ISAM)
Normalization
Reasonableness check
45. In broadband; multiple channels are formed by dividing the transmission medium into discrete frequency segments. It generally requires the use of a modem.
Broadband
Message switching
Demodulation
Fiber optic cable
46. A test to check the system's ability to recover after a software or hardware failure
Recovery testing
Control weakness
Optical scanner
Business-to-consumer e-commerce (B2C)
47. Refers to the security aspects supported by the ERP; primarily with regard to the roles or responsibilities and audit trails within the applications
Application security
Internet Engineering Task Force (IETF)
Non-intrusive monitoring
Certificate authority (CA)
48. A system's level of resilience to seamlessly react from hardware and/or software failure
Spoofing
Top-level management
Fault tolerance
Cathode ray tube (CRT)
49. A layer within the International Organization for Standardization (ISO)/Open Systems Interconnection (OSI) model. It is used in information transfers between users through application programs and other devices. In this layer various protocols are ne
Peripherals
Application layer
Limit check
Spoofing
50. The current and prospective effect on earnings or capital arising from adverse business decisions; improper implementation of decisions or lack of responsiveness to industry changes.
Strategic risk
Bulk data transfer
Half duplex
Dynamic analysis