Test your basic knowledge |

CISA Certified Information Systems Auditor Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A system software tool that logs; monitors and directs computer tape usage






2. The use of software packages that aid in the development of all phases of an information system. System analysis; design programming and documentation are provided. Changes introduced in one CASE chart will update all other related charts automatical






3. Inheritance refers to database structures that have a strict hierarchy (no multiple inheritance). Inheritance can initiate other objects irrespective of the class hierarchy; thus there is no strict hierarchy of objects.






4. A group of budgets linked together at different levels such that the budgeting authority of a lower-level budget is controlled by an upper-level budget.






5. Programmed checking of data validity in accordance with predetermined criteria






6. Used to electronically input; read and interpret information directly from a source document; requires the source document to have specially-coded magnetic ink typeset






7. Controlling access to a network by analyzing the contents of the incoming and outgoing packets and either letting them pass or denying them based on a list of rules. Differs from packet filtering in that it is the data in the packet that are analyzed






8. A testing technique that is used to evaluate output from one application; while the information is sent as input to another application






9. Any intentional violation of the security policy of a system






10. A biometric device that is used to authenticate a user through palm scans






11. Relates to the technical and physical features of the computer






12. Systems that employ sufficient hardware and software assurance measures to allow their use for processing of a range of sensitive or classified information






13. A structure of relationships and processes to direct and control the enterprise in order to achieve the enterprise's goals by adding value while balancing risk versus return over IT and its processes






14. Program flowcharts show the sequence of instructions in a single program or subroutine. The symbols used should be the internationally accepted standard. Program flowcharts should be updated when necessary.






15. The procedures established to purchase application software; or an upgrade; including evaluation of the supplier's financial stability; track record; resources and references from existing customers






16. A program designed to detect computer viruses






17. The standard e-mail protocol on the Internet






18. Interface between data terminal equipment and data communications equipment employing serial binary data interchange






19. Data-oriented development techniques that work on the premise that data are at the center of information processing and that certain data relationships are significant to a business and must be represented in the data structure of its systems






20. An approach to system development where the basic unit of attention is an object; which represents an encapsulation of both data (an object's attributes) and functionality (an object's methods). Objects usually are created using a general template ca






21. A testing approach which focuses on the functionality of the application or product and does not require knowledge of the code intervals.






22. A testing technique used to retest earlier program abends or logical errors that occurred during the initial testing phase






23. An individual or department responsible for the security and information classification of the shared data stored on a database system. This responsibility includes the design; definition and maintenance of the database.






24. The area of the central processing unit (CPU) that executes software; allocates internal memory and transfers operations between the arithmetic-logic; internal storage and output sections of the computer






25. The flow of data from the input (in Internet banking; ordinarily user input at his/her desktop) to output (in Internet banking; ordinarily data in a bank's central database). Data flow includes travelling through the communication lines; routers; swi






26. Software that is being used and executed to support normal and authorized organizational operations. Such software is to be distinguished from test software; which is being developed or modified; but has not yet been authorized for use by management.






27. In intrusion detection; an error that occurs when an attack is misdiagnosed as a normal activity






28. Processes certified as supporting a security goal






29. The person responsible for maintaining a LAN and assisting end users






30. The policies; procedures; organizational structure and electronic access controls designed to restrict access to computer software and data files






31. A software suite designed to aid an intruder in gaining unauthorized administrative access to a computer system






32. Diagramming data that are to be exchanged electronically; including how it is to be used and what business management systems need it. It is a preliminary step for developing an applications link. (Also see application tracing and mapping.)






33. Wiring devices that may be inserted into communication links for use with analysis probes; LAN analyzers and intrusion detection security systems






34. An evaluation of any part of an implementation project (e.g.; project management; test plans; user acceptance testing procedures)






35. To apply a variable; alternating current (AC) field for the purpose of demagnetizing magnetic recording media. The process involves increasing the AC field gradually from zero to some maximum value and back to zero; which leaves a very low residue of






36. A type of service providing an authentication and accounting system often used for dial-up and remote access security






37. Data unit that is routed from source to destination in a packet-switched network. A packet contains both routing information and data. Transmission control protocol/Internet protocol (TCP/IP) is such a packet-switched network.






38. A transmission signal that varies continuously in amplitude and time and is generated in wave formation. Analog signals are used in telecommunications.






39. The area of the central processing unit that performs mathematical and analytical operations






40. The process of distributing computer processing to different locations within an organization






41. These controls exist to detect and report when errors; omissions and unauthorized uses or entries occur.






42. The process that limits and controls access to resources of a computer system; a logical or physical control designed to protect against unauthorized entry or use. Access control can be defined by the system (mandatory access control; or MAC) or defi






43. Refers to a sprinkler system that does not have water in the pipes during idle usage; unlike a fully charged fire extinguisher system that has water in the pipes at all times. The dry-pipe system is activated at the time of the fire alarm; and water






44. An independent audit of the control structure of a service organization; such as a service bureau; with the objective of providing assurances to the users of the service organization that the internal control structure is adequate; effective and soun






45. A flag set in a packet to indicate that this packet is the final data packet of the transmission






46. A type of LAN architecture that utilizes a central controller to which all nodes are directly connected. All transmissions from one station to another pass through the central controller; which is responsible for managing and controlling all communic






47. The primary language used by both application programmers and end users in accessing relational databases






48. A printed machine-readable code that consists of parallel bars of varied width and spacing






49. A computer file storage format in which one record follows another. Records can be accessed sequentially only. It is required with magnetic tape.






50. A packet-switched wide-area-network technology that provides faster performance than older packet-switched WAN technologies such as X.25 networks; because it was designed for today's reliable circuits and performs less rigorous error detection. Frame