Test your basic knowledge |

CISA Certified Information Systems Auditor Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A program for the examination of data; using logical or conditional tests to determine or to identify similarities or differences






2. The rules by which a network operates and controls the flow and priority of transmissions






3. An authentication protocol; often used by remote-access servers






4. A certificate identifying a public key to its subscriber; corresponding to a private key held by that subscriber. It is a unique code that typically is used to allow the authenticity and integrity of communicated data to be verified.






5. Integral part of an application system that is designed to identify and report specific transactions or other information based on pre-determined criteria. Identification of reportable items occurs as part of real-time processing. Reporting may be re






6. A consortium with more than 700 affiliates from the software industry. Its purpose is to provide a common framework for developing applications using object-oriented programming techniques. For example; OMG is known principally for promulgating the C






7. A fail-over process; in which all nodes run the same resource group (there can be no IP or MAC addresses in a concurrent resource group) and access the external storage concurrently






8. A protocol for packet-switching networks






9. Processing is achieved by entering information into the computer via a video display terminal. The computer immediately accepts or rejects the information; as it is entered.






10. An evaluation of an application system under development which considers matters such as: appropriate controls are designed into the system; the application will process information in a complete; accurate and reliable manner; the application will fu






11. A phase of an SDLC methodology where the affected user groups define the requirements of the system for meeting the defined needs






12. An algorithm that maps or translates one set of bits into another (generally smaller) so that a message yields the same result every time the algorithm is executed using the same message as input. It is computationally infeasible for a message to be






13. A device that forwards packets between LAN devices or segments. LANs that use switches are called switched LANs.






14. Intentional violations of established management policy or regulatory requirements. Deliberate misstatements or omissions of information concerning the area under audit or the organization as a whole; gross negligence or unintentional illegal acts.






15. Parallel simulation involves the IS auditor writing a program to replicate those application processes that are critical to an audit opinion and using this program to reprocess application system data. The results produced are compared with the resul






16. A communication network that serves several users within a specified geographic area. It is made up of servers; workstations; a network operating system and a communications link. Personal computer LANs function as distributed processing systems in w






17. A protocol developed by the object management group (OMG) to implement Common Object Request Broker Architecture (CORBA) solutions over the World Wide Web. CORBA enables modules of network-based programs to communicate with one another. These modules






18. Techniques and procedures used to verify; validate and edit data; to ensure that only correct data are entered into the computer






19. Verifies that the control number follows sequentially and any control numbers out of sequence are rejected or noted on an exception report for further research






20. Audit evidence is reliable if; in the IS auditor's opinion; it is valid; factual; objective and supportable.






21. Is the risk to earnings or capital arising from changes in the value of portfolios of financial instruments. Price risk arises from market making; dealing and position taking in interest rate; foreign exchange; equity and commodities markets. Banks m






22. Block-at-a-time data transmission






23. First; it denotes the planning and management of resources in an enterprise. Second; it denotes a software system that can be used to manage whole business processes; integrating purchasing; inventory; personnel; customer service; shipping; financial






24. A system of interconnected computers and the communications equipment used to connect them






25. Verifies that the control number follows sequentially and any control numbers out of sequence are rejected or noted on an exception report for further research (can be alpha or numeric and usually utilizes a key field)






26. A computer file storage format in which one record follows another. Records can be accessed sequentially only. It is required with magnetic tape.






27. A protocol used for transmitting data between two ends of a connection






28. Refers to the security aspects supported by the ERP; primarily with regard to the roles or responsibilities and audit trails within the applications






29. Also known as traditional development; it is a very procedure-focused development cycle with formal sign-off at the completion of each level.






30. The rate of transmission for telecommunication data. It is expressed in bits per second (bps).






31. An electronic form functionally equivalent to cash in order to make and receive payments in cyberbanking






32. 1) The set of management statements that documents an organization's philosophy of protecting its computing and information assets 2) The set of security rules enforced by the system's security features






33. Program narratives provide a detailed explanation of program flowcharts; including control points and any external input.






34. The probability that the IS auditor has reached an incorrect conclusion because an audit sample; rather than the whole population; was tested. While sampling risk can be reduced to an acceptably low level by using an appropriate sample size and selec






35. Freedom from unauthorized intrusion






36. An XML-formatted language used to describe a web service's capabilities as collections of communication endpoints capable of exchanging messages. WSDL is the language that UDDI uses. (Also see Universal Description; Discovery and Integration (UDDI))






37. An exception report is generated by a program that identifies transactions or data that appear to be incorrect. These items may be outside a predetermined range or may not conform to specified criteria.






38. Relates to the technical and physical features of the computer






39. Auxiliary computer hardware equipment used for input; output and data storage. Examples include disk drives and printers.






40. The act of transferring computerized information from one computer to another computer






41. The area of the system that the intrusion detection system is meant to monitor and protect






42. Test data are processed in production systems. The data usually represent a set of fictitious entities such as departments; customers and products. Output reports are verified to confirm the correctness of the processing.






43. The entire set of data from which a sample is selected and about which the IS auditor wishes to draw conclusions






44. A private network that is configured within a public network. For years; common carriers have built VPNs that appear as private national or international networks to the customer; but physically share backbone trunks with other customers. VPNs enjoy






45. Those controls that seek to maintain confidentiality; integrity and availability of information






46. A packet (encapsulated with a frame containing information); which is transmitted in a packet-switching network from source to destination






47. A series of tests designed to ensure that the modified program interacts correctly with other system components. These test procedures typically are performed by the system maintenance staff in their development library.






48. A journal entry entered at a computer terminal. Manual journal entries can include regular; statistical; inter-company and foreign currency entries






49. The computer's primary working memory. Each byte of memory can be accessed randomly regardless of adjacent bytes.






50. A computer facility that provides data processing services to clients on a continual basis