Test your basic knowledge |

CISA Certified Information Systems Auditor Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. These controls exist to detect and report when errors; omissions and unauthorized uses or entries occur.






2. The act of capturing network packets; including those not necessarily destined for the computer running the sniffing software






3. A device for sending and receiving computerized data over transmission lines






4. The logical language a computer understands






5. Transactions that cannot be denied after the fact






6. The quality or state of not being named or identified






7. A special terminal used by computer operations personnel to control computer and systems operations functions. These terminals typically provide a high level of computer access and should be properly secured.






8. Door and entry locks that are activated by such biometric features as voice; eye retina; fingerprint or signature






9. An independent audit of the control structure of a service organization; such as a service bureau; with the objective of providing assurances to the users of the service organization that the internal control structure is adequate; effective and soun






10. Individuals and departments responsible for the storage and safeguarding of computerized information. This typically is within the IS organization.






11. 1)A computer dedicated to servicing requests for resources from other computers on a network. Servers typically run network operating systems. 2)A computer that provides services to another computer (the client).






12. The dynamic; integrated processes; effected by the governing body; management and all other staff; that are designed to provide reasonable assurance regarding the achievement of the following general objectives: Effectiveness; efficiency and economy






13. A protocol used to transmit data securely between two end points to create a VPN






14. A report on Internal Control--An Integrated Framework sponsored by the Committee of Sponsoring Organizations of the Treadway Commission in 1992. It provides guidance and a comprehensive framework of internal control for all organizations.'






15. A cipher technique whereby different cryptographic keys are used to encrypt and decrypt a message (see public key cryptosystems)






16. Detection on the basis of whether the system activity matches that defined as bad






17. A form of modulation in which data signals are pulsed directly on the transmission medium without frequency division and usually utilize a transceiver. In baseband the entire bandwidth of the transmission medium (e.g.; coaxial cable) is utilized for






18. A protocol used for transmitting data between two ends of a connection






19. A method of computer fraud involving a computer code that instructs the computer to slice off small amounts of money from an authorized computer transaction and reroute this amount to the perpetrator's account






20. Connects a terminal or computer to a communications network via a telephone line. Modems turn digital pulses from the computer into frequencies within the audio range of the telephone system. When acting in the receiver capacity; a modem decodes inco






21. A communications channel that can handle only one signal at a time. The two stations must alternate their transmissions.






22. Detects transmission errors by appending calculated bits onto the end of each segment of data






23. A process to authenticate (or certify) a party's digital signature; carried out by trusted third parties.






24. Processes certified as supporting a security goal






25. Weaknesses in systems that can be exploited in ways that violate security policy






26. Diligence which a person; who possesses a special skill; would exercise under a given set of circumstances






27. The method used to identify the location of a participant in a network. Ideally; addressing specifies where the participant is located rather than who they are (name) or how to get there (routing).






28. The initialization procedure that causes an operating system to be loaded into storage at the beginning of a workday or after a system malfunction






29. Commonly it is the network segment between the Internet and a private network. It allows access to services from the Internet and the internal private network; while denying access from the Internet directly to the private network.






30. The process of taking an unencrypted message (plaintext); applying a mathematical function to it (encryption algorithm with a key) and producing an encrypted message (ciphertext)






31. A report that identifies the elapsed time when a computer is not operating correctly because of machine failure






32. Performance measurement of service delivery including cost; timeliness and quality against agreed service levels






33. A general hardware control; which helps to detect data errors when data are read from memory or communicated from one computer to another. A 1-bit digit (either 0 or 1) is added to a data item to indicate whether the sum of that data item's bit is od






34. Is an electronic pathway that may be displayed in the form of highlighted text; graphics or a button that connects one web page with another web page address.






35. A complex set of software programs that control the organization; storage and retrieval of data in a database. It also controls the security and integrity of the database.






36. The standard e-mail protocol on the Internet






37. Processing is achieved by entering information into the computer via a video display terminal. The computer immediately accepts or rejects the information; as it is entered.






38. A broad and wide-ranging concept of corporate governance; covering associated organizations such as global strategic alliance partners. (Source: Control Objectives for Enterprise Governance Discussion Document; published by the Information Systems Au






39. Controls that prevent unauthorized access from remote users that attempt to access a secured environment. These controls range from dial-back controls to remote user authentication.






40. A flag set in a packet to indicate to the sender that the previous packet sent was accepted correctly by the receiver without errors; or that the receiver is now ready to accept a transmission






41. A set of protocols that allow systems to communicate information about the state of services on other systems. It is used; for example; in determining whether systems are up; maximum packet sizes on links; whether a destination host/network/port is a






42. An entity that may be given responsibility for performing some of the administrative tasks necessary in the registration of subjects; such as confirming the subject's identity; validating that the subject is entitled to have the attributes requested






43. Tests of detailed activities and transactions; or analytical review tests; designed to obtain audit evidence on the completeness; accuracy or existence of those activities or transactions during the audit period






44. The process of transmitting messages in convenient pieces that can be reassembled at the destination






45. The art of designing; analyzing and attacking cryptographic schemes






46. 1) Two or more networks connected by a router 2) The world's largest network using TCP/IP protocols to link government; university and commercial institutions






47. An ASP that also provides outsourcing of business processes such as payment processing; sales order processing and application development






48. A standardized body of data created for testing purposes. Users normally establish the data. Base cases validate production application systems and test the ongoing accurate operation of the system.






49. A consortium with more than 700 affiliates from the software industry. Its purpose is to provide a common framework for developing applications using object-oriented programming techniques. For example; OMG is known principally for promulgating the C






50. A 24-hour; stand-alone mini-bank; located outside branch bank offices or in public places like shopping malls. Through ATMs; clients can make deposits; withdrawals; account inquiries and transfers. Typically; the ATM network is comprised of two spher