SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Information generated by an encryption algorithm to protect the plaintext. The ciphertext is unintelligible to the unauthorized reader.
browser
Ciphertext
Middleware
Completeness check
2. A series of tests designed to ensure that the modified program interacts correctly with other system components. These test procedures typically are performed by the system maintenance staff in their development library.
System testing
Format checking
Auditability
Cohesion
3. A policy whereby access is denied unless it is specifically allowed. The inverse of default allow.
Business process reengineering (BPR)
ISO17799
Default deny policy
Auditability
4. A test that has been designed to evaluate the performance of a system. In a benchmark test; a system is subjected to a known workload and the performance of the system against this workload is measured. Typically; the purpose is to compare the measur
Benchmark
Segregation/separation of duties
Controls (Control procedures)
Normalization
5. A public end-to-end digital telecommunications network with signaling; switching and transport capabilities supporting a wide range of service accessed by standardized interfaces with integrated customer control. The standard allows transmission of d
Variable sampling
world wide web (WWW)
ASCII (American Standard Code for Information Interchange)
Integrated services digital network (ISDN)
6. An eight-digit/seven-bit code representing 128 characters; used in most small computers
Hexadecimal
price risk
ASCII (American Standard Code for Information Interchange)
Uninterruptible power supply (UPS)
7. A document distributed to software vendors requesting them to submit a proposal to develop or provide a software product
Request for proposal (RFP)
Bypass label processing (BLP)
Irregularities
Bus
8. The process of electronically inputting source documents by taking an image of the document; thereby eliminating the need for key entry
Adjusting period
Image processing
Reengineering
Security management
9. The communication lines that provide connectivity between the telecommunications carrier's central office and the subscriber's facilities
Local loop
Logoff
Idle standby
virtual organizations
10. A device that connects two similar networks together
Passive assault
Decryption
Bridge
Offsite storage
11. The level of trust with which a system object is imbued
Privilege
L2F (Layer 2 forwarding)
Link editor (linkage editor)
Alpha
12. Analysis of the security state of a system or its compromise on the basis of information collected at intervals
Vulnerability analysis
Synchronous transmission
Control risk self-assessment
Data communications
13. Is the risk to earnings or capital arising from violations of; or nonconformance with; laws; rules; regulations; prescribed practices or ethical standards. Banks are subject to various forms of legal risk. This can include the risk that assets will t
legal risk
COCO
Run-to-run totals
System exit
14. A data recovery strategy that takes a set of physically disparate disks and synchronously mirrors them over high performance communication lines. Any write to a disk on one side will result in a write on the other. The local write will not return unt
Application program
Geographic disk mirroring
Access control
Integrated test facilities (ITF)
15. To the basic border firewall; add a host that resides on an untrusted network where the firewall cannot protect it. That host is minimally configured and carefully managed to be as secure as possible. The firewall is configured to require incoming an
Audit
Untrustworthy host
Application implementation review
Encryption
16. To apply a variable; alternating current (AC) field for the purpose of demagnetizing magnetic recording media. The process involves increasing the AC field gradually from zero to some maximum value and back to zero; which leaves a very low residue of
Data leakage
Degauss
Spoofing
Monitor
17. A popular local area network operating system developed by the Novell Corp.
Netware
Reasonable assurance
Appearance of independence
COBIT
18. A security technique that verifies an individual's identity by analyzing a unique physical attribute; such as a handprint
Data owner
X.25
Biometrics
Dry-pipe fire extinguisher system
19. The consolidation in 1998 of the ''Cadbury;'' ''Greenbury'' and ''Hampel'' Reports. Named after the Committee Chairs; these reports were sponsored by the UK Financial Reporting Council; the London Stock Exchange; the Confederation of British Industry
Twisted pairs
Combined Code on Corporate Governance
Internet Inter-ORB Protocol (IIOP)
Latency
20. A biometric device that is used to authenticate a user through palm scans
Vulnerabilities
Performance indicators
Handprint scanner
Challenge/response token
21. Systems that employ sufficient hardware and software assurance measures to allow their use for processing of a range of sensitive or classified information
Registration authority (RA)
Control section
Trusted systems
Decision support systems (DSS)
22. A communication line permanently assigned to connect two points; as opposed to a dial-up line that is only available and open when a connection is made by dialing the target machine or network. Also known as a dedicated line.
Leased lines
Preventive controls
Comprehensive audit
Service level agreement (SLA)
23. A software engineering technique whereby an existing application system code can be redesigned and coded using computer-aided software engineering (CASE) technology
Security software
Reverse engineering
Privacy
Non-intrusive monitoring
24. A resource whose loss will result in the loss of service or production
Audit expert systems
Default password
Single point of failure
Logs/Log file
25. A fail-over process; which is basically a two-way idle standby: two servers are configured so that both can take over the other node's resource group. Both must have enough CPU power to run both applications with sufficient speed; or performance loss
Audit risk
Card swipes
Comprehensive audit
Mutual takeover
26. The level to which transactions can be traced and audited through a system
Address
Polymorphism (objects)
Degauss
Auditability
27. A device that is used to authenticate a user; typically in addition to a username and password. It is usually a credit card-sized device that displays a pseudo random number that changes every few minutes.
Object orientation
Protocol converter
Reliable audit evidence
Token
28. The transfer of data between separate computer processing sites/devices using telephone lines; microwave and/or satellite links
Private key cryptosystems
Active response
Anomaly
Data communications
29. The entire set of data from which a sample is selected and about which the IS auditor wishes to draw conclusions
Data owner
Intrusive monitoring
Population
Log
30. The number of distinct locations that may be referred to with the machine address. For most binary machines; it is equal to 2n; where n is the number of bits in the machine address.
Privacy
Address space
Service provider
Static analysis
31. A program for the examination of data; using logical or conditional tests to determine or to identify similarities or differences
Value-added network (VAN)
Passive response
Logon
Comparison program
32. A set of protocols for accessing information directories. It is based on the X.500 standard; but is significantly simpler.
ASCII (American Standard Code for Information Interchange)
Continuity
Administrative controls
LDAP (Lightweight Directory Access Protocol)
33. Correctness checks built into data processing systems and applied to batches of input data; particularly in the data preparation stage. There are two main forms of batch controls: 1) sequence control; which involves numbering the records in a batch c
Batch control
IPSec (Internet protocol security)
Consumer
Administrative controls
34. An exception report is generated by a program that identifies transactions or data that appear to be incorrect. These items may be outside a predetermined range or may not conform to specified criteria.
Logical access controls
Mutual takeover
Exception reports
Service user
35. A recovery solution provided by recovery and/or hardware vendors and includes a pre-established contract to deliver hardware resources within a specified number amount of hours after a disaster occurs. This solution usually provides organizations wit
Direct reporting engagement
Systems development life cycle (SDLC)
Quick ship
Logs/Log file
36. A procedure designed to ensure that no fields are missing from a record
Indexed sequential file
Exposure
Application proxy
Completeness check
37. The rate of transmission for telecommunication data. It is expressed in bits per second (bps).
Logoff
Baud rate
Database replication
Attitude
38. Identified by one central processor and databases that form a distributed processing configuration
Sufficient audit evidence
Binary code
E-mail/interpersonal messaging
Centralized data processing
39. In vulnerability analysis; gaining information by performing checks that affects the normal operation of the system; even crashing the system
Password cracker
Intrusive monitoring
Security/transaction risk
Project team
40. The amount of time allowed for the recovery of a business function or resource after a disaster occurs
Recovery time objective (RTO)
Data-oriented systems development
Control section
Nonrepudiation
41. Defined minimum performance measures at or above which the service delivered is considered acceptable
Authentication
Packet switching
Black box testing
Service level agreement (SLA)
42. A process involving the extraction of components from existing systems and restructuring these components to develop new systems or to enhance the efficiency of existing systems. Existing software systems thus can be modernized to prolong their funct
X.25 interface
Segregation/separation of duties
Initial program load (IPL)
Reengineering
43. A piece of information; in a digitized form; used by an encryption algorithm to convert the plaintext to the ciphertext
Echo checks
Verification
Encryption key
Feasibility study
44. A flag set in a packet to indicate to the sender that the previous packet sent was accepted correctly by the receiver without errors; or that the receiver is now ready to accept a transmission
External router
ACK (acknowledgement)
legal risk
implementation life cycle review
45. Polymorphism refers to database structures that send the same command to different child objects that can produce different results depending on their family hierarchical tree structure.
Distributed data processing network
Coaxial cable
Authorization
Polymorphism (objects)
46. A process to authenticate (or certify) a party's digital signature; carried out by trusted third parties.
Demodulation
Bus topology
Middleware
Digital certification
47. An individual data element in a computer record. Examples include employee name; customer address; account number; product unit price and product quantity in stock.
Internet
Field
world wide web (WWW)
Project sponsor
48. A port configured on a network switch to receive copies of traffic from one or more other ports on the switch
Spanning port
COSO
Control perimeter
price risk
49. A system of computers connected together by a communications network. Each computer processes its data and the network supports the system as a whole. Such a network enhances communication among the linked computers and allows access to shared files.
Magnetic ink character recognition (MICR)
Distributed data processing network
Tuple
Criteria
50. A consortium with more than 700 affiliates from the software industry. Its purpose is to provide a common framework for developing applications using object-oriented programming techniques. For example; OMG is known principally for promulgating the C
Encryption
Application security
COSO
Object Management Group (OMG)