Test your basic knowledge |

CISA Certified Information Systems Auditor Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An individual using a terminal; PC or an application can access a network to send an unstructured message to another individual or group of people.






2. A protocol used to transmit data securely between two end points to create a VPN






3. The communication lines that provide connectivity between the telecommunications carrier's central office and the subscriber's facilities






4. An eight-digit/seven-bit code representing 128 characters; used in most small computers






5. A networking device that can send (route) data packets from one local area network (LAN) or wide area network (WAN) to another; based on addressing at the network layer (Layer 3) in the OSI model. Networks connected by routers can use different or si






6. A project management technique used in the planning and control of system projects






7. The machine language code that is generally referred to as the object or load module






8. Relates to the technical and physical features of the computer






9. A discussion document which sets out an ''Enterprise Governance Model'' focusing strongly on both the enterprise business goals and the information technology enablers which facilitate good enterprise governance; published by the Information Systems






10. The transfer of data between separate computer processing sites/devices using telephone lines; microwave and/or satellite links






11. (remote authentication dial-in user service)






12. The quality or state of not being named or identified






13. Diligence which a person; who possesses a special skill; would exercise under a given set of circumstances






14. The interface between the user and the system






15. Integral part of an application system that is designed to identify and report specific transactions or other information based on pre-determined criteria. Identification of reportable items occurs as part of real-time processing. Reporting may be re






16. Specifies the length of the file's record and the sequence and size of its fields. A file layout also will specify the type of data contained within each field. For example; alphanumeric; zoned decimal; packed and binary are types of data.






17. A high level description of the audit work to be performed in a certain period of time (ordinarily a year). It includes the areas to be audited; the type of work planned; the high level objectives and scope of the work; and topics such as budget; res






18. A phase of an SDLC methodology that researches the feasibility and adequacy of resources for the development or acquisition of a system solution to a user need






19. A high-capacity line-of-sight transmission of data signals through the atmosphere which often requires relay stations






20. A form of modulation in which data signals are pulsed directly on the transmission medium without frequency division and usually utilize a transceiver. In baseband the entire bandwidth of the transmission medium (e.g.; coaxial cable) is utilized for






21. A testing approach which focuses on the functionality of the application or product and does not require knowledge of the code intervals.






22. Files; equipment; data and procedures available for use in the event of a failure or loss; if the originals are destroyed or out of service






23. The central database that stores and organizes data






24. The range between the highest and lowest transmittable frequencies. It equates to the transmission capacity of an electronic line and is expressed in bytes per second or Hertz (cycles per second).






25. Records of system events generated by a specialized operating system mechanism






26. The initialization procedure that causes an operating system to be loaded into storage at the beginning of a workday or after a system malfunction






27. A set of protocols for accessing information directories. It is based on the X.500 standard; but is significantly simpler.






28. A layer within the International Organization for Standardization (ISO)/Open Systems Interconnection (OSI) model. It is used in information transfers between users through application programs and other devices. In this layer various protocols are ne






29. Availability relates to information being available when required by the business process now and in the future. It also concerns the safeguarding of necessary resources and associated capabilities.






30. Modern expression for organizational development stemming from IS/IT impacts. The ultimate goal of BPR is to yield a better performing structure; more responsive to the customer base and market conditions; while yielding material cost savings. To ree






31. Cooperating packages of executable software that make their services available through defined interfaces. Components used in developing systems may be commercial off-the-shelf software (COTS) or may be purposely built. However; the goal of component






32. A system software tool that logs; monitors and directs computer tape usage






33. An interface point between the CPU and a peripheral device






34. A device that forwards packets between LAN devices or segments. LANs that use switches are called switched LANs.






35. The art of designing; analyzing and attacking cryptographic schemes






36. The primary language used by both application programmers and end users in accessing relational databases






37. Promulgated through the World Wide Web Consortium; XML is a web-based application development technique that allows designers to create their own customized tags; thus; enabling the definition; transmission; validation and interpretation of data betw






38. A workstation or PC on a network that does not have its own disk. Instead; it stores files on a network file server.






39. An organized assembly of resources and procedures required to collect; process and distribute data for use in decision making






40. A private network that is configured within a public network. For years; common carriers have built VPNs that appear as private national or international networks to the customer; but physically share backbone trunks with other customers. VPNs enjoy






41. Memory reserved to temporarily hold data. Buffers are used to offset differences between the operating speeds of different devices; such as a printer and a computer. In a program; buffers are reserved areas of RAM that hold data while they are being






42. Way of thinking; behaving; feeling; etc.






43. Specialized system software used to perform particular computerized functions and routines that are frequently required during normal processing. Examples include sorting; backing up and erasing data.






44. The processing of a group of transactions at the same time. Transactions are collected and processed against the master files at a specified time.






45. Refers to a sprinkler system that does not have water in the pipes during idle usage; unlike a fully charged fire extinguisher system that has water in the pipes at all times. The dry-pipe system is activated at the time of the fire alarm; and water






46. A computer network connecting different remote locations that may range from short distances; such as a floor or building; to extremely long transmissions that encompass a large region or several countries






47. A network monitoring and data acquisition tool that performs filter translation; packet acquisition and packet display






48. An abnormal end to a computer job; termination of a task prior to its completion because of an error condition that cannot be resolved by recovery facilities while the task is executing






49. A standardized body of data created for testing purposes. Users normally establish the data. Base case validates production application systems and tests the ongoing accurate operation of the system.






50. Provides short-term backup power from batteries for a computer system when the electrical power fails or drops to an unacceptable voltage level