SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Group of people responsible for a project; whose terms of reference may include the development; acquisition; implementation or maintenance of an application system. The team members may include line management; operational line staff; external contr
RADIUS (remote authentication dial-in user service)
Smart card
Project team
Application proxy
2. The ability to exercise judgement; express opinions and present recommendations with impartiality
Certificate authority (CA)
Audit charter
Objectivity
Hyperlink
3. Typically in large organisations where the quantum of data processed by the ERPs are extremely voluminous; analysis of patterns and trends prove to be extremely useful in ascertaining the efficiency and effectiveness of operations. Most ERPs provide
Preventive controls
Data analysis
Vaccine
System flowcharts
4. The person responsible for implementing; monitoring and enforcing security rules established and authorized by management
Split DNS
Digital certificate
Security administrator
Business impact analysis (BIA)
5. An audit technique used to select items from a population for audit testing purposes based on selecting all those items that have certain attributes or characteristics (such as all items over a certain size)
Fraud risk
Attribute sampling
Remote job entry (RJE)
Object orientation
6. Diligence which a person would exercise under a given set of circumstances
Electronic vaulting
Internet Inter-ORB Protocol (IIOP)
Due care
Exposure
7. First; it denotes the planning and management of resources in an enterprise. Second; it denotes a software system that can be used to manage whole business processes; integrating purchasing; inventory; personnel; customer service; shipping; financial
Record
Embedded audit module
Enterprise resource planning
Offsite storage
8. To apply a variable; alternating current (AC) field for the purpose of demagnetizing magnetic recording media. The process involves increasing the AC field gradually from zero to some maximum value and back to zero; which leaves a very low residue of
Criteria
Degauss
Appearance of independence
L2F (Layer 2 forwarding)
9. Auxiliary computer hardware equipment used for input; output and data storage. Examples include disk drives and printers.
Performance indicators
Peripherals
Firmware
COSO
10. Unauthorized electronic exits; or doorways; out of an authorized computer program into a set of malicious instructions or programs
LDAP (Lightweight Directory Access Protocol)
Trap door
Software
Bus topology
11. Comparing the system's performance to other equivalent systems using well defined benchmarks
Reputational risk
Subject matter (Area of activity)
Latency
Performance testing
12. Range checks ensure that data fall within a predetermined range (also see limit checks).
Range check
Optical scanner
TACACS+ (terminal access controller access control system plus)
HTTPS (hyper text transfer protocol secure)
13. A permanent connection between hosts in a packet switched network
Memory dump
Uploading
Buffer
Permanent virtual circuit (PVC)
14. In a passive assault; intruders attempt to learn some characteristic of the data being transmitted. They may be able to read the contents of the data so the privacy of the data is violated. Alternatively; although the content of the data itself may r
Passive assault
Segregation/separation of duties
Dynamic analysis
Business-to-consumer e-commerce (B2C)
15. Audit evidence is relevant if it pertains to the audit objectives and has a logical relationship to the findings and conclusions it is used to support.
RS-232 interface
Executable code
Electronic vaulting
Relevant audit evidence
16. A set of metrics designed to measure the extent to which performance objectives are being achieved on an on-going basis. They can include service level agreements; critical success factors; customer satisfaction ratings; internal or external benchmar
Discovery sampling
TACACS+ (terminal access controller access control system plus)
Performance indicators
Combined Code on Corporate Governance
17. An interface between data terminal equipment (DTE) and data circuit-terminating equipment (DCE) for terminals operating in the packet mode on some public data networks
legal risk
Masqueraders
X.25 interface
Taps
18. Used to enable remote access to a server computer. Commands typed are run on the remote server.
Telnet
Dry-pipe fire extinguisher system
Recovery time objective (RTO)
Record
19. A high-capacity disk storage device or a computer that stores data centrally for network users and manages access to that data. File servers can be dedicated so that no process other than network management can be executed while the network is availa
Mutual takeover
Geographic disk mirroring
Privilege
File server
20. An XML-formatted language used to describe a web service's capabilities as collections of communication endpoints capable of exchanging messages. WSDL is the language that UDDI uses. (Also see Universal Description; Discovery and Integration (UDDI))
Concurrent access
Web Services Description Language (WSDL)
Data structure
Cryptography
21. Faking the sending address of a transmission in order to gain illegal entry into a secure system
Network administrator
RADIUS (remote authentication dial-in user service)
Spoofing
Decentralization
22. The objectives of management that are used as the framework for developing and implementing controls (control procedures).
Control objective
Diskless workstations
Hacker
Application maintenance review
23. A broad and wide-ranging concept of corporate governance; covering associated organizations such as global strategic alliance partners. (Source: Control Objectives for Enterprise Governance Discussion Document; published by the Information Systems Au
Compiler
Noise
Enterprise governance
Challenge/response token
24. Is the risk to earnings or capital arising from violations of; or nonconformance with; laws; rules; regulations; prescribed practices or ethical standards. Banks are subject to various forms of legal risk. This can include the risk that assets will t
Discovery sampling
Indexed sequential access method (ISAM)
Leased lines
legal risk
25. A standardized body of data created for testing purposes. Users normally establish the data. Base case validates production application systems and tests the ongoing accurate operation of the system.
Fail-safe
Executable code
Project sponsor
Bar case
26. The structure through which the objectives of an organization are set; and the means of attaining those objectives; and determines monitoring performance guidelines. Good corporate governance should provide proper incentives for board and management
price risk
Corporate governance
DDoS (distributed denial-of-service) attack
Audit risk
27. A protocol developed by the object management group (OMG) to implement Common Object Request Broker Architecture (CORBA) solutions over the World Wide Web. CORBA enables modules of network-based programs to communicate with one another. These modules
Internet Inter-ORB Protocol (IIOP)
Voice mail
Residual risk
Simple Object Access Protocol (SOAP)
28. A system of storing messages in a private recording medium where the called party can later retrieve the messages
Decryption key
Digital signature
Alpha
Voice mail
29. The communication lines that provide connectivity between the telecommunications carrier's central office and the subscriber's facilities
Irregularities
Token ring topology
Queue
Local loop
30. A flag set in the initial setup packets to indicate that the communicating parties are synchronizing the sequence numbers used for the data transmission
Magnetic card reader
Parallel testing
Bandwidth
SYN (synchronize)
31. Encapsulation is the technique used by layered protocols in which a lower layer protocol accepts a message from a higher layer protocol and places it in the data portion of a frame in the lower layer.
Integrated test facilities (ITF)
Encapsulation (objects)
Substantive testing
Symmetric key encryption
32. A system development methodology that is organised around ''objects'' rather than ''actions;' and 'data ' rather than 'logic.' Object-oriented analysis is an assessment of a physical system to determine which objects in the real world need to be repr
Budget hierarchy
Operational audit
Remote procedure calls (RPCs)
Object-oriented system development
33. A platform-independent XML-based formatted protocol enabling applications to communicate with each other over the Internet. Use of this protocol may provide a significant security risk to web application operations; since use of SOAP piggybacks onto
Continuity
Reliable audit evidence
Geographic disk mirroring
Simple Object Access Protocol (SOAP)
34. Disconnecting from the computer
Logoff
Masking
Intrusion
Data owner
35. A protocol and program that allows the remote identification of users logged into a system
Virtual private network (VPN)
Magnetic ink character recognition (MICR)
Consumer
Finger
36. A phase of an SDLC methodology where the affected user groups define the requirements of the system for meeting the defined needs
Strategic risk
Budget formula
Idle standby
Requirements definition
37. Source lines of code are often used in deriving single-point software-size estimations.
Adjusting period
Application development review
Source lines of code (SLOC)
FIN (final)
38. The accuracy and completeness of information as well as to its validity in accordance with business values and expectations
Integrity
War dialler
Bypass label processing (BLP)
Multiplexor
39. A test that has been designed to evaluate the performance of a system. In a benchmark test; a system is subjected to a known workload and the performance of the system against this workload is measured. Typically; the purpose is to compare the measur
Non-intrusive monitoring
Benchmark
Filtering router
Operational audit
40. The number of distinct locations that may be referred to with the machine address. For most binary machines; it is equal to 2n; where n is the number of bits in the machine address.
Address space
Internet Engineering Task Force (IETF)
Control risk self-assessment
legal risk
41. A type of password (i.e.; a secret number assigned to an individual) that; in conjunction with some means of identifying the individual; serves to verify the authenticity of the individual. PINs have been adopted by financial institutions as the prim
Network administrator
Uninterruptible power supply (UPS)
Personal identification number (PIN)
Accountability
42. The process of electronically sending computerized information from one computer to another computer. Most often; the transfer is from a smaller computer to a larger one.
Bar case
Uploading
ISP (Internet service provider)
Active response
43. Organizations that have no official physical site presence and are made up of diverse geographically dispersed or mobile employees.
Service bureau
virtual organizations
Checkpoint restart procedures
Operating system audit trails
44. The processing of a group of transactions at the same time. Transactions are collected and processed against the master files at a specified time.
Batch processing
Bridge
HTTP (hyper text transfer protocol)
Automated teller machine (ATM)
45. The process of monitoring the events occurring in a computer system or network; detecting signs of security problems
Intranet
Source documents
Operational control
Intrusion detection
46. The extent to which a system unit--subroutine; program; module; component; subsystem--performs a single dedicated function. Generally; the more cohesive are units; the easier it is to maintain and enhance a system; since it is easier to determine whe
Budget hierarchy
Editing
Network hop
Cohesion
47. 1) Following an authorized person into a restricted access area; 2) electronically attaching to an authorized telecommunications link to intercept and possibly alter transmissions.
Piggy backing
Availability
Audit responsibility
Embedded audit module
48. The total of any numeric data field on a document or computer file. This total is checked against a control total of the same field to facilitate accuracy of processing.
Hash total
Interface testing
Service level agreement (SLA)
Bypass label processing (BLP)
49. A private network that uses the infrastructure and standards of the Internet and World Wide Web; but is isolated from the public Internet by firewall barriers.
Dial-in access controls
Virus
Man-in-the-middle attack
Intranet
50. Unusual or statistically rare
Anomaly
Detailed IS ontrols
Teleprocessing
Spoofing
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests