SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Wiring devices that may be inserted into communication links for use with analysis probes; LAN analyzers and intrusion detection security systems
Extensible Markup Language (XML)
Accountability
Embedded audit module
Taps
2. A recovery solution provided by recovery and/or hardware vendors and includes a pre-established contract to deliver hardware resources within a specified number amount of hours after a disaster occurs. This solution usually provides organizations wit
Quick ship
Judgment sampling
Cohesion
Penetration testing
3. A response option in intrusion detection in which the system simply reports and records the problem detected; relying on the user to take subsequent action
Backup
Independent attitude
Table look-ups
Passive response
4. A telecommunications carrier's facilities in a local area in which service is provided where local service is switched to long distance
Real-time analysis
Edit controls
Scure socket layer (SSL)
Central office (CO)
5. A file format in which records are organized and can be accessed; according to a preestablished key that is part of the record
RADIUS
Indexed sequential file
Harden
Reverse engineering
6. A warm-site is similar to a hot-site; however; it is not fully equipped with all necessary hardware needed for recovery.
Warm-site
Program narratives
Base case
Operating system
7. A condition in which each of an organization's regional locations maintains its own financial and operational data while sharing processing with an organizationwide; centralized database. This permits easy sharing of data while maintaining a certain
Production software
Control risk
Initial program load (IPL)
Split data systems
8. Software used to create data to be used in the testing of computer programs
Hub
Test generators
Packet
Terminal
9. A protocol used to transfer files over a TCP/IP network (Internet; UNIX; etc.)
Preventive controls
Indexed sequential file
Production software
FTP (file transfer protocol)
10. A document which defines the IS audit function's responsibility; authority and accountability
Passive response
Audit charter
Cleartext
Production programs
11. A connection-based Internet protocol that supports reliable data transfer connections. Packet data is verified using checksums and retransmitted if it is missing or corrupted. The application plays no part in validating the transfer.
TCP (transmission control protocol)
Image processing
Repudiation
Client-server
12. The person responsible for implementing; monitoring and enforcing security rules established and authorized by management
Security administrator
Application software tracing and mapping
Compiler
Data security
13. An automated function that can be operating system or application based in which electronic data being transmitted between storage areas are spooled or stored until the receiving device or storage area is prepared and able to receive the information.
Incremental testing
Project team
Sequence check
Spool (simultaneous peripheral operations online)
14. An interface between data terminal equipment (DTE) and data circuit-terminating equipment (DCE) for terminals operating in the packet mode on some public data networks
Split data systems
Salami technique
X.25 interface
Permanent virtual circuit (PVC)
15. The machine language code that is generally referred to as the object or load module
ACK (acknowledgement)
Executable code
Procedure
Anonymous File Transfer Protocol (FTP)
16. A protocol and program that allows the remote identification of users logged into a system
Taps
DMZ (demilitarized zone)
Finger
Passive response
17. Software that is being used and executed to support normal and authorized organizational operations. Such software is to be distinguished from test software; which is being developed or modified; but has not yet been authorized for use by management.
HTTPS (hyper text transfer protocol secure)
Concurrent access
Production software
Port
18. A packet (encapsulated with a frame containing information); which is transmitted in a packet-switching network from source to destination
Cold site
Datagram
Wiretapping
COBIT
19. The process of actually entering transactions into computerized or manual files. Such transactions might immediately update the master files or may result in memo posting; in which the transactions are accumulated over a period of time; then applied
Network hop
Authorization
Detailed IS ontrols
Posting
20. An extension to PPP to facilitate the creation of VPNs. L2TP merges the best features of PPTP (from Microsoft) and L2F (from Cisco).
Nonrepudiation
Adjusting period
L2TP (Layer 2 tunneling protocol)
Test data
21. Diligence which a person would exercise under a given set of circumstances
Due care
Edit controls
Penetration testing
Active recovery site (mirrored)
22. A complex set of software programs that control the organization; storage and retrieval of data in a database. It also controls the security and integrity of the database.
Database management system (DBMS)
Proxy server
Cross-certification
Independent attitude
23. A standardized body of data created for testing purposes. Users normally establish the data. Base case validates production application systems and tests the ongoing accurate operation of the system.
Bar case
Business-to-consumer e-commerce (B2C)
Optical character recognition
Log
24. An international consortium founded in 1994 of affiliates from public and private organizations involved with the Internet and the web. The W3C's primary mission is to promulgate open standards to further enhance the economic growth of Internet web s
World Wide Web Consortium (W3C)
Central office (CO)
SYN (synchronize)
Data analysis
25. A workstation or PC on a network that does not have its own disk. Instead; it stores files on a network file server.
Network
Hyperlink
browser
Diskless workstations
26. A form of modulation in which data signals are pulsed directly on the transmission medium without frequency division and usually utilize a transceiver. In baseband the entire bandwidth of the transmission medium (e.g.; coaxial cable) is utilized for
Baseband
Fraud risk
Echo checks
Salami technique
27. The roles; scope and objectives documented in the service level agreement between management and audit
Program evaluation and review technique (PERT)
Preventive controls
Tuple
Audit responsibility
28. An intrusion detection system (IDS) inspects network activity to identify suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system
Application proxy
Logoff
IDS (intrusion detection system)
Central office (CO)
29. The flow of data from the input (in Internet banking; ordinarily user input at his/her desktop) to output (in Internet banking; ordinarily data in a bank's central database). Data flow includes travelling through the communication lines; routers; swi
Data flow
Concurrent access
Downloading
Application programming
30. An algorithm that maps or translates one set of bits into another (generally smaller) so that a message yields the same result every time the algorithm is executed using the same message as input. It is computationally infeasible for a message to be
Administrative controls
Hierarchical database
Hash function
Windows NT
31. The probability that the IS auditor has reached an incorrect conclusion because an audit sample; rather than the whole population; was tested. While sampling risk can be reduced to an acceptably low level by using an appropriate sample size and selec
Sampling risk
e-commerce
Downloading
HTTP (hyper text transfer protocol)
32. The art of designing; analyzing and attacking cryptographic schemes
Exposure
Internal penetrators
Inheritance (objects)
Cryptography
33. A manual or automated log of all updates to data files and databases
Alpha
Passive assault
Preventive controls
Transaction log
34. These controls exist to detect and report when errors; omissions and unauthorized uses or entries occur.
RFC (request for comments)
Detective controls
Data security
Authorization
35. A platform-independent XML-based formatted protocol enabling applications to communicate with each other over the Internet. Use of this protocol may provide a significant security risk to web application operations; since use of SOAP piggybacks onto
Simple Object Access Protocol (SOAP)
Decryption
Logs/Log file
Authentication
36. Correctness checks built into data processing systems and applied to batches of input data; particularly in the data preparation stage. There are two main forms of batch controls: 1) sequence control; which involves numbering the records in a batch c
Data Encryption Standard (DES)
Public key infrastructure
IPSec (Internet protocol security)
Batch control
37. The dynamic; integrated processes; effected by the governing body; management and all other staff; that are designed to provide reasonable assurance regarding the achievement of the following general objectives: Effectiveness; efficiency and economy
Internal control structure
Token
Performance indicators
Test data
38. The organization using the outsourced service
Service user
Terminal
Evidence
File
39. The act of copying raw data from one place to another with little or no formatting for readability. Usually; dump refers to copying data from main memory to a display screen or a printer. Dumps are useful for diagnosing bugs. After a program fails; o
Memory dump
Binary code
Address
Intrusion
40. A broad and wide-ranging concept of corporate governance; covering associated organizations such as global strategic alliance partners. (Source: Control Objectives for Enterprise Governance Discussion Document; published by the Information Systems Au
Anonymity
Application security
Vulnerability analysis
Enterprise governance
41. In an asymmetric cryptographic scheme; the key that may be widely published to enable the operation of the scheme
Production software
Public key
Scure socket layer (SSL)
System testing
42. Source code is the language in which a program is written. Source code is translated into object code by assemblers and compilers. In some cases; source code may be converted automatically into another language by a conversion program. Source code is
Sampling risk
Degauss
Authentication
Source code
43. A computer program that enables the user to retrieve information that has been made publicly available on the Internet; also; that permits multimedia (graphics) applications on the World Wide Web
Message switching
browser
Bar case
Controls (Control procedures)
44. Typically in large organisations where the quantum of data processed by the ERPs are extremely voluminous; analysis of patterns and trends prove to be extremely useful in ascertaining the efficiency and effectiveness of operations. Most ERPs provide
Data analysis
Passive assault
Population
Budget formula
45. The password used to gain access when a system is first installed on a computer or network device. There is a large list published on the Internet and maintained at several locations. Failure to change these after the installation leaves the system v
ACK (acknowledgement)
Audit accountability
Default password
Batch processing
46. A device that is used to authenticate a user; typically in addition to a username and password. It is usually a credit card-sized device that displays a pseudo random number that changes every few minutes.
Application programming
Numeric check
Token
Cold site
47. Used in data encryption; it uses a secret key to encrypt the plaintext to the ciphertext. It also uses the same key to decrypt the ciphertext to the corresponding plaintext. In this case; the key is symmetric such that the encryption key is equivalen
Private key cryptosystems
Access path
Data structure
Concurrent access
48. Data-oriented development techniques that work on the premise that data are at the center of information processing and that certain data relationships are significant to a business and must be represented in the data structure of its systems
Operator console
System flowcharts
Application programming
Information engineering
49. The possibility of an act or event occurring that would have an adverse effect on the organization and its information systems
World Wide Web Consortium (W3C)
Risk
Application controls
Independent attitude
50. Character-at-a-time transmission
Utility programs
Asynchronous transmission
Tcpdump
Compensating control
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests