SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A disk access method that stores data sequentially; while also maintaining an index of key fields to all the records in the file for direct access capability
Indexed sequential access method (ISAM)
Unit testing
Initial program load (IPL)
Surge suppressor
2. An assault on a service from a single source that floods it with so many requests that it becomes overwhelmed and is either stopped completely or operates at a significantly reduced rate
DoS (denial-of-service) attack
Salami technique
Structured programming
IEEE (Institute of Electrical and Electronics Engineers)--Pronounced I-triple-E
3. The password used to gain access when a system is first installed on a computer or network device. There is a large list published on the Internet and maintained at several locations. Failure to change these after the installation leaves the system v
Intrusion
Default password
Relevant audit evidence
Risk
4. A storage facility located away from the building housing the primary information processing facility (IPF); used for storage of computer media such as offline backup data and storage files
Offsite storage
Binary code
Audit sampling
Database
5. A set of communications protocols that encompasses media access; packet transport; session communications; file transfer; electronic mail; terminal emulation; remote file access and network management. TCP/IP provides the basis for the Internet.
Independence
Security software
TCP/IP protocol (Transmission Control Protocol/Internet Protocol)
Wide area network (WAN)
6. The individual responsible for the safeguard and maintenance of all program and data files
Split data systems
Test programs
Librarian
Residual risk
7. An approach used to plan; design; develop; test and implement an application system or a major modification to an application system. Typical phases include the feasibility study; requirements study; requirements definition; detailed design; programm
Systems development life cycle (SDLC)
Active response
Half duplex
Noise
8. The technique used for selecting records in a file; one at a time; for processing; retrieval or storage. The access method is related to; but distinct from; the file organization that determines how the records are stored.
Audit accountability
Access method
Reasonableness check
Decentralization
9. The Committee on the Financial Aspects of Corporate Governance; set up in May 1991 by the UK Financial Reporting Council; the London Stock Exchange and the UK accountancy profession; was chaired by Sir Adrian Cadbury and produced a report on the subj
Computationally greedy
Cadbury
Spanning port
Internet
10. Systems for which detailed specifications of their components composition are published in a nonproprietary environment; thereby enabling competing organizations to use these standard components to build competitive systems. The advantages of using o
Open systems
Gateway
Parity check
Database management system (DBMS)
11. A deficiency in the design or operation of a control procedure. Control weaknesses can potentially result in risks relevant to the area of activity not being reduced to an acceptable level (relevant risks are those that threaten achievement of the ob
Materiality
Credentialed analysis
Control weakness
Security management
12. A display terminal without processing capability. Dumb terminals are dependent upon the main computer for processing. All entered data are accepted without further editing or validation.
Registration authority (RA)
Field
Dumb terminal
Biometrics
13. System narratives provide an overview explanation of system flowcharts; with explanation of key control points and system interfaces.
System narratives
Access path
Piggy backing
RADIUS
14. Using telecommunications facilities for handling and processing of computerized information
Journal entry
Antivirus software
Teleprocessing
Dial-back
15. The code used to designate the location of a specific piece of data within computer storage
Single point of failure
Plaintext
Spool (simultaneous peripheral operations online)
Address
16. An approach to system development where the basic unit of attention is an object; which represents an encapsulation of both data (an object's attributes) and functionality (an object's methods). Objects usually are created using a general template ca
Audit charter
Normalization
Uploading
Object orientation
17. Auxiliary computer hardware equipment used for input; output and data storage. Examples include disk drives and printers.
Integrity
Object code
Peripherals
Abend
18. An algorithm that maps or translates one set of bits into another (generally smaller) so that a message yields the same result every time the algorithm is executed using the same message as input. It is computationally infeasible for a message to be
Object Management Group (OMG)
Verification
Hash function
browser
19. A type of LAN ring topology in which a frame containing a specific format; called the token; is passed from one station to the next around the ring. When a station receives the token; it is allowed to transmit. The station can send as many frames as
Optical scanner
Token ring topology
Noise
Integrated test facilities (ITF)
20. A structure of relationships and processes to direct and control the enterprise in order to achieve the enterprise's goals by adding value while balancing risk versus return over IT and its processes
Firmware
TCP (transmission control protocol)
Structured Query Language (SQL)
IT governance
21. A device that is used to authenticate a user; typically in addition to a username and password. It is usually a credit card-sized device that displays a pseudo random number that changes every few minutes.
Proxy server
Token
Permanent virtual circuit (PVC)
Protocol converter
22. A protocol originally developed by Netscape Communications to provide a high level of security for its browser software. It has become accepted widely as a means of securing Internet message exchanges. It ensures confidentiality of the data in transm
Spool (simultaneous peripheral operations online)
Request for proposal (RFP)
Scure socket layer (SSL)
Shell
23. The highest level of management in the organization; responsible for direction and control of the organization as a whole (such as director; general manager; partner; chief officer and executive manager).
Screening routers
Test programs
Top-level management
Offsite storage
24. Software that is being used and executed to support normal and authorized organizational operations. Such software is to be distinguished from test software; which is being developed or modified; but has not yet been authorized for use by management.
Sniff
Cold site
HTTP (hyper text transfer protocol)
Production software
25. A protocol used to transfer files over a TCP/IP network (Internet; UNIX; etc.)
Business-to-consumer e-commerce (B2C)
Wide area network (WAN)
FTP (file transfer protocol)
Capacity stress testing
26. Devices that perform the functions of both bridges and routers; are called brouters. Naturally; they operate at both the data link and the network layers. A brouter connects same data link type LAN segments as well as different data link ones; which
Dial-in access controls
Brouters
Arithmetic-logic unit (ALU)
Multiplexing
27. These controls are designed to prevent or restrict an error; omission or unauthorized intrusion.
Run instructions
Preventive controls
Editing
Continuous auditing approach
28. Filters out electrical surges and spikes
Surge suppressor
Format checking
Offline files
Computer-assisted audit technique (CAATs)
29. A software suite designed to aid an intruder in gaining unauthorized administrative access to a computer system
TACACS+ (terminal access controller access control system plus)
Address space
Rootkit
Assembler
30. A system of storing messages in a private recording medium where the called party can later retrieve the messages
Centralized data processing
Voice mail
Star topology
Data security
31. Any situation or event that has the potential to harm a system
Wide area network (WAN)
Latency
Threat
Encryption
32. Tests of specified amount fields against stipulated high or low limits of acceptability. When both high and low values are used; the test may be called a range check.
Untrustworthy host
Logical access controls
liquidity risk
Limit check
33. Specifies the format of packets and the addressing scheme
Open systems
Worm
Encryption
IP (Internet protocol)
34. A networking device that can send (route) data packets from one local area network (LAN) or wide area network (WAN) to another; based on addressing at the network layer (Layer 3) in the OSI model. Networks connected by routers can use different or si
Integrated test facilities (ITF)
Protocol converter
Router
Logon
35. A group of budgets linked together at different levels such that the budgeting authority of a lower-level budget is controlled by an upper-level budget.
Circuit-switched network
Internet Engineering Task Force (IETF)
Budget hierarchy
False negative
36. A method of selecting a portion of a population; by means of mathematical calculations and probabilities; for the purpose of making scientifically and mathematically sound inferences regarding the characteristics of the entire population
Service bureau
liquidity risk
Statistical sampling
Concurrent access
37. Editing ensures that data conform to predetermined criteria and enable early identification of potential errors.
Editing
Spoofing
Application proxy
Journal entry
38. Patterns indicating misuse of a system
Service provider
Due professional care
Signatures
Half duplex
39. The standards and benchmarks used to measure and present the subject matter and against which the IS auditor evaluates the subject matter. Criteria should be: Objective—free from bias Measurable—provide for consistent measurement Complete—include all
Criteria
Discovery sampling
Trusted processes
L2TP (Layer 2 tunneling protocol)
40. A fully operational offsite data processing facility equipped with both hardware and system software to be used in the event of a disaster
Hot site
Reverse engineering
Application maintenance review
Downloading
41. A database structured in a tree/root or parent/child relationship. Each parent can have many children; but each child may have only one parent.
Input controls
Source documents
Hierarchical database
Run instructions
42. Interface between data terminal equipment and data communications equipment employing serial binary data interchange
War dialler
Virus
Object orientation
RS-232 interface
43. Typically in large organisations where the quantum of data processed by the ERPs are extremely voluminous; analysis of patterns and trends prove to be extremely useful in ascertaining the efficiency and effectiveness of operations. Most ERPs provide
Piggy backing
Data analysis
Synchronous transmission
Librarian
44. A high-capacity disk storage device or a computer that stores data centrally for network users and manages access to that data. File servers can be dedicated so that no process other than network management can be executed while the network is availa
Full duplex
Audit expert systems
File server
Handprint scanner
45. Parallel simulation involves the IS auditor writing a program to replicate those application processes that are critical to an audit opinion and using this program to reprocess application system data. The results produced are compared with the resul
Encryption
Exposure
Application maintenance review
Parallel simulation
46. A broad and wide-ranging concept of corporate governance; covering associated organizations such as global strategic alliance partners. (Source: Control Objectives for Enterprise Governance Discussion Document; published by the Information Systems Au
Operating system
Link editor (linkage editor)
Logical access controls
Enterprise governance
47. An independent audit of the control structure of a service organization; such as a service bureau; with the objective of providing assurances to the users of the service organization that the internal control structure is adequate; effective and soun
Third-party review
Extensible Markup Language (XML)
Anomaly
Program evaluation and review technique (PERT)
48. A method of computer fraud involving a computer code that instructs the computer to remove small amounts of money from an authorized computer transaction by rounding down to the nearest whole value denomination and rerouting the rounded off amount to
Data custodian
Concurrent access
Requirements definition
Rounding down
49. Small computers used to connect and coordinate communication links between distributed or remote devices and the main computer; thus freeing the main computer from this overhead function
Firmware
Optical character recognition
Public key
Communications controller
50. Used to electronically scan and input written information from a source document
Security administrator
Encapsulation (objects)
Data leakage
Optical character recognition
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests