Test your basic knowledge |

CISA Certified Information Systems Auditor Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A system's level of resilience to seamlessly react from hardware and/or software failure






2. Describes the design properties of a computer system that allow it to resist active attempts to attack or bypass it






3. Used to enable remote access to a server computer. Commands typed are run on the remote server.






4. A statement of the position within the organization; including lines of reporting and the rights of access






5. An electronic form functionally equivalent to cash in order to make and receive payments in cyberbanking






6. Refers to the security of the infrastructure that supports the ERP networking and telecommunications; operating systems and databases.






7. The logical language a computer understands






8. The specific goal(s) of an audit. These often center on substantiating the existence of internal controls to minimize business risk.






9. Point-of-sale systems enable capture of data at the time and place of transaction. POS terminals may include use of optical scanners for use with bar codes or magnetic card readers for use with credit cards. POS systems may be online to a central com






10. The act of copying raw data from one place to another with little or no formatting for readability. Usually; dump refers to copying data from main memory to a display screen or a printer. Dumps are useful for diagnosing bugs. After a program fails; o






11. Character-at-a-time transmission






12. Files; equipment; data and procedures available for use in the event of a failure or loss; if the originals are destroyed or out of service






13. An attack strategy in which the attacker successively hacks into a series of connected systems; obscuring his/her identify from the victim of the attack






14. Generally; the assumption that an entity will behave substantially as expected. Trust may apply only for a specific function. The key role of this term in an authentication framework is to describe the relationship between an authenticating entity an






15. The dynamic; integrated processes; effected by the governing body; management and all other staff; that are designed to provide reasonable assurance regarding the achievement of the following general objectives: Effectiveness; efficiency and economy






16. The process of generating; recording and reviewing a chronological record of system events to ascertain their accuracy






17. The rules by which a network operates and controls the flow and priority of transmissions






18. A project management technique used in the planning and control of system projects






19. Programmed checking of data validity in accordance with predetermined criteria






20. A policy whereby access is denied unless it is specifically allowed. The inverse of default allow.






21. Compares data to predefined reasonability limits or occurrence rates established for the data.






22. A type of password (i.e.; a secret number assigned to an individual) that; in conjunction with some means of identifying the individual; serves to verify the authenticity of the individual. PINs have been adopted by financial institutions as the prim






23. ATM is a high-bandwidth low-delay switching and multiplexing technology. It is a data link layer protocol. This means that it is a protocol-independent transport mechanism. ATM allows integration of real-time voice and video as well as data. ATM allo






24. An auditing concept regarding the importance of an item of information with regard to its impact or effect on the functioning of the entity being audited. An expression of the relative significance or importance of a particular matter in the context






25. The flow of data from the input (in Internet banking; ordinarily user input at his/her desktop) to output (in Internet banking; ordinarily data in a bank's central database). Data flow includes travelling through the communication lines; routers; swi






26. The transmission of job control language (JCL) and batches of transactions from a remote terminal location






27. The current and prospective effect on earnings and capital arising from negative public opinion. This affects the bank's ability to establish new relationships or services or continue servicing existing relationships. Reputation risk may expose the b






28. Consists of one or more web pages that may originate at one or more web server computers. A person can view the pages of a website in any order; as he or she would a magazine.






29. A common connection point for devices in a network; hubs commonly are used to connect segments of a LAN. A hub contains multiple ports. When a packet arrives at one port; it is copied to the other ports so that all segments of the LAN can see all pac






30. Programs that are used to process live or actual data that were received as input into the production environment.






31. Connects a terminal or computer to a communications network via a telephone line. Modems turn digital pulses from the computer into frequencies within the audio range of the telephone system. When acting in the receiver capacity; a modem decodes inco






32. Auxiliary computer hardware equipment used for input; output and data storage. Examples include disk drives and printers.






33. A live test of the effectiveness of security defenses through mimicking the actions of real-life attackers






34. A visible trail of evidence enabling one to trace information contained in statements or reports back to the original input source






35. Expert systems are the most prevalent type of computer systems that arise from the research of artificial intelligence. An expert system has a built in hierarchy of rules; which are acquired from human experts in the appropriate field. Once input is






36. A computer network connecting different remote locations that may range from short distances; such as a floor or building; to extremely long transmissions that encompass a large region or several countries






37. A trusted third party that serves authentication infrastructures or organizations and registers entities and issues them certificates






38. Error control deviations (compliance testing) or misstatements (substantive testing)






39. In vulnerability analysis; gaining information by performing checks that affects the normal operation of the system; even crashing the system






40. The person responsible for maintaining a LAN and assisting end users






41. An evaluation of any part of an implementation project (e.g.; project management; test plans; user acceptance testing procedures)






42. A manual or automated log of all updates to data files and databases






43. To the basic border firewall; add a host that resides on an untrusted network where the firewall cannot protect it. That host is minimally configured and carefully managed to be as secure as possible. The firewall is configured to require incoming an






44. The probability that the IS auditor has reached an incorrect conclusion because an audit sample; rather than the whole population; was tested. While sampling risk can be reduced to an acceptably low level by using an appropriate sample size and selec






45. Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes






46. System flowcharts are graphical representations of the sequence of operations in an information system or program. Information system flowcharts show how data from source documents flow through the computer to final distribution to users. Symbols use






47. A type of LAN architecture that utilizes a central controller to which all nodes are directly connected. All transmissions from one station to another pass through the central controller; which is responsible for managing and controlling all communic






48. Individuals and departments responsible for the storage and safeguarding of computerized information. This typically is within the IS organization.






49. A basic control that prevents or detects errors and irregularities by assigning responsibility for initiating transactions; recording transactions and custody of assets to separate individuals. Commonly used in large IT organizations so that no singl






50. A phase of an SDLC methodology that researches the feasibility and adequacy of resources for the development or acquisition of a system solution to a user need