SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Controlling access to a network by analyzing the attributes of the incoming and outgoing packets and either letting them pass; or denying them; based on a list of rules
Random access memory (RAM)
Utility programs
Service bureau
Packet filtering
2. The area of the system that the intrusion detection system is meant to monitor and protect
Data dictionary
Security software
Protection domain
Professional competence
3. These controls are designed to correct errors; omissions and unauthorized uses and intrusions; once they are detected.
Source code
Corrective controls
Default password
Address
4. A process involving the extraction of components from existing systems and restructuring these components to develop new systems or to enhance the efficiency of existing systems. Existing software systems thus can be modernized to prolong their funct
Reengineering
Service level agreement (SLA)
Netware
Access rights
5. A method of selecting a portion of a population; by means of mathematical calculations and probabilities; for the purpose of making scientifically and mathematically sound inferences regarding the characteristics of the entire population
RSA
Computer sequence checking
Statistical sampling
Auditability
6. The calendar can contain 'real' accounting periods and/or adjusting accounting periods. The 'real' accounting periods must not overlap; and cannot have any gaps between 'real' accounting periods. Adjusting accounting periods can overlap with other ac
Adjusting period
Brute force
Image processing
Data communications
7. The process of actually entering transactions into computerized or manual files. Such transactions might immediately update the master files or may result in memo posting; in which the transactions are accumulated over a period of time; then applied
Error risk
Black box testing
Posting
NAT (Network Address Translation)
8. Using telecommunications facilities for handling and processing of computerized information
Pervasive IS controls
Decryption
Electronic signature
Teleprocessing
9. Processes certified as supporting a security goal
Trusted processes
Compiler
L2F (Layer 2 forwarding)
Business impact analysis (BIA)
10. A private network that is configured within a public network. For years; common carriers have built VPNs that appear as private national or international networks to the customer; but physically share backbone trunks with other customers. VPNs enjoy
Optical scanner
Data custodian
Virtual private network (VPN)
Gateway
11. A set of metrics designed to measure the extent to which performance objectives are being achieved on an on-going basis. They can include service level agreements; critical success factors; customer satisfaction ratings; internal or external benchmar
Demodulation
Downloading
Performance indicators
Biometrics
12. The interface between the user and the system
Trust
Fiber optic cable
Shell
Database replication
13. Those controls that seek to maintain confidentiality; integrity and availability of information
Pervasive IS controls
Circular routing
Data security
Default deny policy
14. The current and prospective effect on earnings and capital arising from negative public opinion. This affects the bank's ability to establish new relationships or services or continue servicing existing relationships. Reputation risk may expose the b
LDAP (Lightweight Directory Access Protocol)
Reputational risk
Shell
Third-party review
15. A high level description of the audit work to be performed in a certain period of time (ordinarily a year). It includes the areas to be audited; the type of work planned; the high level objectives and scope of the work; and topics such as budget; res
Audit plan
Transaction
Logon
Proxy server
16. Criteria Of Control; published by the Canadian Institute of Chartered Accountants in 1995
Smart card
Internet Engineering Task Force (IETF)
Rapid application development
COCO
17. The procedures established to purchase application software; or an upgrade; including evaluation of the supplier's financial stability; track record; resources and references from existing customers
UNIX
Dry-pipe fire extinguisher system
Systems acquisition process
Completeness check
18. Patterns indicating misuse of a system
Audit plan
Sniffing
Simple fail-over
Signatures
19. The use of software packages that aid in the development of all phases of an information system. System analysis; design programming and documentation are provided. Changes introduced in one CASE chart will update all other related charts automatical
Computer-aided software engineering (CASE)
Repudiation
Arithmetic-logic unit (ALU)
SYN (synchronize)
20. The logical language a computer understands
Machine language
Compliance testing
Dry-pipe fire extinguisher system
Transaction
21. The individual responsible for the safeguard and maintenance of all program and data files
Generalized audit software
Alpha
Electronic funds transfer (EFT)
Librarian
22. Techniques and procedures used to verify; validate and edit data; to ensure that only correct data are entered into the computer
Real-time analysis
Fraud risk
Offline files
Input controls
23. A special terminal used by computer operations personnel to control computer and systems operations functions. These terminals typically provide a high level of computer access and should be properly secured.
Operator console
Technical infrastructure security
Electronic data interchange (EDI)
Spoofing
24. Testing an application with large quantities of data to evaluate its performance during peak periods. It also is called volume testing.
Capacity stress testing
Application security
Detailed IS ontrols
Internal control
25. A permanent connection between hosts in a packet switched network
Permanent virtual circuit (PVC)
Downloading
Data security
Public key
26. A type of password (i.e.; a secret number assigned to an individual) that; in conjunction with some means of identifying the individual; serves to verify the authenticity of the individual. PINs have been adopted by financial institutions as the prim
Personal identification number (PIN)
Bus
Baseband
Control section
27. Tests of specified amount fields against stipulated high or low limits of acceptability. When both high and low values are used; the test may be called a range check.
Log
Payment system
Data integrity
Limit check
28. A test that has been designed to evaluate the performance of a system. In a benchmark test; a system is subjected to a known workload and the performance of the system against this workload is measured. Typically; the purpose is to compare the measur
Benchmark
Source code
Production software
Statistical sampling
29. A protocol used for transmitting data between two ends of a connection
PPP (point-to-point protocol)
Record; screen and report layouts
Electronic funds transfer (EFT)
Black box testing
30. A methodology that enables organisations to develop strategically important systems faster; while reducing development costs and maintaining quality by using a series of proven application development techniques; within a well-defined methodology.
Rapid application development
Batch control
Coverage
Partitioned file
31. Defined by ISACA as the processes by which organisations conduct business electronically with their customers; suppliers and other external business partners; using the Internet as an enabling technology. It therefore encompasses both business-to-bus
Data flow
L2TP (Layer 2 tunneling protocol)
e-commerce
Fscal year
32. Behavior adequate to meet the situations occurring during audit work (interviews; meetings; reporting; etc.). The IS auditor should be aware that appearance of independence depends upon the perceptions of others and can be influenced by improper acti
Record; screen and report layouts
Discovery sampling
System testing
Appearance of independence
33. The person responsible for maintaining a LAN and assisting end users
Discovery sampling
Multiplexing
Repository
Network administrator
34. Special system software features and utilities that allow the user to perform complex system maintenance. Use of these exits often permits the user to operate outside of the security access control system.
Rapid application development
Business-to-consumer e-commerce (B2C)
System exit
Availability
35. A stored collection of related data needed by organizations and individuals to meet their information processing and retrieval requirements
Internal control
Database
DoS (denial-of-service) attack
Uninterruptible power supply (UPS)
36. A structure of relationships and processes to direct and control the enterprise in order to achieve the enterprise's goals by adding value while balancing risk versus return over IT and its processes
Compiler
Decision support systems (DSS)
Request for proposal (RFP)
IT governance
37. A method of computer fraud involving a computer code that instructs the computer to remove small amounts of money from an authorized computer transaction by rounding down to the nearest whole value denomination and rerouting the rounded off amount to
Rounding down
Worm
Spanning port
Protocol converter
38. A router configured to permit or deny traffic based on a set of permission rules installed by the administrator
Discovery sampling
Screening routers
Man-in-the-middle attack
Shell
39. Point-of-sale systems enable capture of data at the time and place of transaction. POS terminals may include use of optical scanners for use with bar codes or magnetic card readers for use with credit cards. POS systems may be online to a central com
Batch control
Application development review
Point-of-sale systems (POS)
Whitebox testing
40. A version of the Windows operating system that supports preemptive multitasking
Foreign exchange risk
Input controls
Windows NT
Logoff
41. Faking the sending address of a transmission in order to gain illegal entry into a secure system
Log
UDDI
Repudiation
Spoofing
42. The most important types of operational risk involve breakdowns in internal controls and corporate governance. Such breakdowns can lead to financial losses through error; fraud or failure to perform in a timely manner or cause the interests of the ba
Enterprise resource planning
Operational risk
Protection domain
Echo checks
43. Refers to a sprinkler system that does not have water in the pipes during idle usage; unlike a fully charged fire extinguisher system that has water in the pipes at all times. The dry-pipe system is activated at the time of the fire alarm; and water
Dial-back
Dry-pipe fire extinguisher system
Scheduling
Inherent risk
44. A journal entry entered at a computer terminal. Manual journal entries can include regular; statistical; inter-company and foreign currency entries
Mapping
Taps
Manual journal entry
Challenge/response token
45. An extension to PPP to facilitate the creation of VPNs. L2TP merges the best features of PPTP (from Microsoft) and L2F (from Cisco).
Spanning port
Token
L2TP (Layer 2 tunneling protocol)
Security administrator
46. General controls which are designed to manage and monitor the IS environment and which; therefore; affect all IS-related activities
Data Encryption Standard (DES)
Production software
Project team
Pervasive IS controls
47. A group of computers connected by a communications network; where the client is the requesting machine and the server is the supplying machine. Software is specialized at both ends. Processing may take place on either the client or the server but it
Recovery testing
Plaintext
Computer-assisted audit technique (CAATs)
Client-server
48. A response; in which the system (automatically or in concert with the user) blocks or otherwise affects the progress of a detected attack. The response takes one of three forms--amending the environment; collecting more information or striking back a
Wiretapping
Active response
Control risk
Business-to-consumer e-commerce (B2C)
49. A server that acts on behalf of a user. Typical proxies accept a connection from a user; make a decision as to whether or not the user or client IP address is permitted to use the proxy; perhaps perform additional authentication; and complete a conne
Proxy server
Random access memory (RAM)
Bus topology
Computer-aided software engineering (CASE)
50. Specifies the format of packets and the addressing scheme
Inheritance (objects)
IP (Internet protocol)
Registration authority (RA)
Operational control