SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Emergency processing agreements between two or more organizations with similar equipment or applications. Typically; participants promise to provide processing time to each other when an emergency arises.
Reciprocal agreement
RFC (request for comments)
Expert systems
Biometric locks
2. An organized assembly of resources and procedures required to collect; process and distribute data for use in decision making
Private key
Management information system (MIS)
Systems acquisition process
Outsourcing
3. Used to electronically input; read and interpret information directly from a source document; requires the source document to have specially-coded magnetic ink typeset
Noise
Brouters
Population
Magnetic ink character recognition (MICR)
4. The purpose is to provide usable data rather than a function. The focus of the development is to provide ad hoc reporting for users by developing a suitable accessible database of information.
Data-oriented systems development
Audit evidence
Password cracker
Web Services Description Language (WSDL)
5. Patterns indicating misuse of a system
Database replication
Intelligent terminal
Signatures
Source documents
6. The specific information subject to the IS auditor's report and related procedures which can include things such as the design or operation of internal controls and compliance with privacy practices or standards or specified laws and regulations.
Cleartext
Subject matter (Area of activity)
Access control
Filtering router
7. A collection of computer programs used in the design; processing and control of all applications. The programs and processing routines that control the computer hardware; including the operating system and utility programs. Refers to the operating sy
Log
Vulnerabilities
Data owner
System software
8. A communications terminal control hardware unit that controls a number of computer terminals. All messages are buffered by the controller and then transmitted to the receiver.
Nonrepudiable trnasactions
Access method
Cluster controller
Offline files
9. Relates to the technical and physical features of the computer
Proxy server
Protocol
Appearance of independence
Hardware
10. Controls over the acquisition; implementation; delivery and support of IS systems and services. They are made up of application controls plus those general controls not included in pervasive controls.
Controls (Control procedures)
Gateway
Fraud risk
Detailed IS ontrols
11. Computer file storage media not physically connected to the computer; typically tapes or tape cartridges used for backup purposes
Record; screen and report layouts
Electronic signature
World Wide Web Consortium (W3C)
Offline files
12. A computer facility that provides data processing services to clients on a continual basis
Database administrator (DBA)
Threat
Electronic vaulting
Service bureau
13. A terminal with built-in processing capability. It has no disk or tape storage but has memory. The terminal interacts with the user by editing and validating data as they are entered prior to final processing.
File
Intelligent terminal
Challenge/response token
Security management
14. Tests of control designed to obtain audit evidence on both the effectiveness of the controls and their operation during the audit period
Cleartext
Authorization
Table look-ups
Compliance testing
15. The risk of errors occurring in the area being audited
Error risk
ACK (acknowledgement)
Prototyping
Passive response
16. Typically in large organisations where the quantum of data processed by the ERPs are extremely voluminous; analysis of patterns and trends prove to be extremely useful in ascertaining the efficiency and effectiveness of operations. Most ERPs provide
Waterfall development
Data analysis
Decision support systems (DSS)
Logs/Log file
17. Computer programs provided by a computer hardware manufacturer or software vendor and used in running the system. This technique can be used to examine processing activities; to test programs; system activities and operational procedures; to evaluate
Baseband
Nonrepudiation
Utility software
Assembler
18. The act of copying raw data from one place to another with little or no formatting for readability. Usually; dump refers to copying data from main memory to a display screen or a printer. Dumps are useful for diagnosing bugs. After a program fails; o
Parallel testing
Memory dump
Data custodian
Top-level management
19. An exchange rate; which can be used optionally to perform foreign currency conversion. The corporate exchange rate is generally a standard market rate determined by senior financial management for use throughout the organization.
Misuse detection
Exception reports
Corporate exchange rate
Private key
20. The process of feeding test data into two systems; the modified system and an alternative system (possibly the original system) and comparing results
Reciprocal agreement
Business process reengineering (BPR)
Tape management system (TMS)
Parallel testing
21. Promulgated through the World Wide Web Consortium; XML is a web-based application development technique that allows designers to create their own customized tags; thus; enabling the definition; transmission; validation and interpretation of data betw
Fault tolerance
False positive
Production programs
Extensible Markup Language (XML)
22. A type of service providing an authentication and accounting system often used for dial-up and remote access security
Data owner
RADIUS (remote authentication dial-in user service)
System testing
Information engineering
23. The assurance that a party cannot later deny originating data; that it is the provision of proof of the integrity and origin of the data which can be verified by a third party. Nonrepudiation may be provided by a digital signature.
Nonrepudiation
Reverse engineering
Criteria
e-commerce
24. The traditional Internet service protocol widely used for many years on UNIX-based operating systems and supported by the Internet Engineering Task Force (IETF) that allows a program on one computer to execute a program on another (e.g.; server). The
Trust
Worm
Remote procedure calls (RPCs)
Virus
25. An audit designed to evaluate the various internal controls; economy and efficiency of a function or department
Misuse detection
Decision support systems (DSS)
Batch processing
Operational audit
26. Programs that are tested and evaluated before approval into the production environment. Test programs; through a series of change control moves; migrate from the test environment to the production environment and become production programs.
Logon
Mutual takeover
Test programs
Operating system audit trails
27. Devices that perform the functions of both bridges and routers; are called brouters. Naturally; they operate at both the data link and the network layers. A brouter connects same data link type LAN segments as well as different data link ones; which
System flowcharts
Trojan horse
Generalized audit software
Brouters
28. Block-at-a-time data transmission
Substantive testing
End-user computing
Control weakness
Synchronous transmission
29. Polymorphism refers to database structures that send the same command to different child objects that can produce different results depending on their family hierarchical tree structure.
Reverse engineering
Budget hierarchy
DMZ (demilitarized zone)
Polymorphism (objects)
30. It is composed of an insulated wire that runs through the middle of each cable; a second wire that surrounds the insulation of the inner wire like a sheath; and the outer insulation which wraps the second wire. Coaxial cable has a greater transmissio
Risk
Trust
Anonymous File Transfer Protocol (FTP)
Coaxial cable
31. The act of capturing network packets; including those not necessarily destined for the computer running the sniffing software
Test programs
Telecommunications
Sniff
Single point of failure
32. Also called permissions or privileges; these are the rights granted to users by the administrator or supervisor. Access rights determine the actions users can perform (e.g.; read; write; execute; create and delete) on files in shared volumes or file
Access rights
Worm
Error
Vulnerabilities
33. Those policies and procedures implemented to achieve a related control objective
Controls (Control procedures)
Security/transaction risk
Information engineering
System narratives
34. The roles; scope and objectives documented in the service level agreement between management and audit
Audit responsibility
Application proxy
Trusted processes
Security management
35. A device that forms a barrier between a secure and an open environment. Usually; the open environment is considered hostile. The most notable hostile environment is the Internet. In other words; a firewall enforces a boundary between two or more netw
Firewall
Application security
Risk
Checkpoint restart procedures
36. The boundary defining the scope of control authority for an entity. For example; if a system is within the control perimeter; the right and ability exists to control it in response to an attack.
Sniff
Control perimeter
Brouters
Ciphertext
37. (remote authentication dial-in user service)
Port
Business risk
Machine language
RADIUS
38. The extent to which a system unit--subroutine; program; module; component; subsystem--performs a single dedicated function. Generally; the more cohesive are units; the easier it is to maintain and enhance a system; since it is easier to determine whe
Application system
Budget organization
Subject matter (Area of activity)
Cohesion
39. A set of metrics designed to measure the extent to which performance objectives are being achieved on an on-going basis. They can include service level agreements; critical success factors; customer satisfaction ratings; internal or external benchmar
RS-232 interface
Honey pot
Inherent risk
Performance indicators
40. Program narratives provide a detailed explanation of program flowcharts; including control points and any external input.
Performance indicators
Program narratives
Public key
Bar code
41. A system of computers connected together by a communications network. Each computer processes its data and the network supports the system as a whole. Such a network enhances communication among the linked computers and allows access to shared files.
Abend
Client-server
Distributed data processing network
Project sponsor
42. The property that data meet with a priority expectation of quality and that the data can be relied upon
Hardware
Batch control
Batch processing
Data integrity
43. Applications that detect; prevent and possibly remove all known viruses from files located in a microcomputer hard drive
Antivirus software
Project team
COSO
Structured Query Language (SQL)
44. Diligence which a person would exercise under a given set of circumstances
Computer-assisted audit technique (CAATs)
Due care
Netware
Data-oriented systems development
45. A broad and wide-ranging concept of corporate governance; covering associated organizations such as global strategic alliance partners. (Source: Control Objectives for Enterprise Governance Discussion Document; published by the Information Systems Au
Enterprise governance
Blackbox testing
Content filtering
Segregation/separation of duties
46. Systems for which detailed specifications of their components composition are published in a nonproprietary environment; thereby enabling competing organizations to use these standard components to build competitive systems. The advantages of using o
Point-of-presence (POP)
Open systems
Internal penetrators
Sniffing
47. A formal agreement with a third party to perform an IS function for an organization
Embedded audit module
PPP (point-to-point protocol)
Program flowcharts
Outsourcing
48. The current and prospective risk to earnings and capital arising from fraud; error and the inability to deliver products or services; maintain a competitive position and manage information. Security risk is evident in each product and service offered
Privacy
Asynchronous transmission
Integrated services digital network (ISDN)
Security/transaction risk
49. A measurement of the point prior to an outage to which data are to be restored
Recovery point objective (RPO)—
Source lines of code (SLOC)
Dumb terminal
X.25 interface
50. An attack strategy in which the attacker successively hacks into a series of connected systems; obscuring his/her identify from the victim of the attack
Internet banking
Network hop
Mapping
Password cracker