Test your basic knowledge |

CISA Certified Information Systems Auditor Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Software packages that sequentially dial telephone numbers; recording any numbers that answer






2. System flowcharts are graphical representations of the sequence of operations in an information system or program. Information system flowcharts show how data from source documents flow through the computer to final distribution to users. Symbols use






3. Changing data with malicious intent before or during input into the system






4. The ability of end users to design and implement their own information system utilizing computer software products






5. Two trading partners both share one or more secrets. No one else can read their messages. A different key (or set of keys) is needed for each pair of trading partners. Same key is used for encryption and decryption. (Also see Private Key Cryptosystem






6. The method or communication mode of routing data over the communication network (also see half duplex and full duplex)






7. A high-capacity line-of-sight transmission of data signals through the atmosphere which often requires relay stations






8. Standard that defines how global directories should be structured. X.500 directories are hierarchical with different levels for each category of information; such as country; state and city.






9. An electronic form functionally equivalent to cash in order to make and receive payments in cyberbanking






10. An integrated set of computer programs designed to serve a particular function that has specific input; processing and output activities (e.g.; general ledger; manufacturing resource planning; human resource management)






11. The rules by which a network operates and controls the flow and priority of transmissions






12. To configure a computer or other network device to resist attacks






13. Risks that could impact the organization's ability to perform business or provide a service. They can be financial; regulatory or control oriented.






14. The art of designing; analyzing and attacking cryptographic schemes






15. A form of modulation in which data signals are pulsed directly on the transmission medium without frequency division and usually utilize a transceiver. In baseband the entire bandwidth of the transmission medium (e.g.; coaxial cable) is utilized for






16. An abnormal end to a computer job; termination of a task prior to its completion because of an error condition that cannot be resolved by recovery facilities while the task is executing






17. A communication protocol used to connect to servers on the World Wide Web. Its primary function is to establish a connection with a web server and transmit HTML pages to the client browser.






18. A permanent connection between hosts in a packet switched network






19. The interface between the user and the system






20. A card reader that reads cards with a magnetizable surface on which data can be stored and retrieved






21. Diligence which a person; who possesses a special skill; would exercise under a given set of circumstances






22. A network monitoring and data acquisition tool that performs filter translation; packet acquisition and packet display






23. A version of the Windows operating system that supports preemptive multitasking






24. The procedures established to purchase application software; or an upgrade; including evaluation of the supplier's financial stability; track record; resources and references from existing customers






25. A piece of information; in a digitized form; used by an encryption algorithm to convert the plaintext to the ciphertext






26. An evaluation of an application system being acquired or evaluated; which considers such matters as: appropriate controls are designed into the system; the application will process information in a complete; accurate and reliable manner; the applicat






27. An independent audit of the control structure of a service organization; such as a service bureau; with the objective of providing assurances to the users of the service organization that the internal control structure is adequate; effective and soun






28. In vulnerability analysis; gaining information by performing checks that affects the normal operation of the system; even crashing the system






29. Programs that provide assurance that the software being audited is the correct version of the software; by providing a meaningful listing of any discrepancies between the two versions of the program






30. A deficiency in the design or operation of a control procedure. Control weaknesses can potentially result in risks relevant to the area of activity not being reduced to an acceptable level (relevant risks are those that threaten achievement of the ob






31. Identified by one central processor and databases that form a distributed processing configuration






32. Any information collection mechanism utilized by an intrusion detection system






33. A data recovery strategy that allows organizations to recover data within hours after a disaster. It includes recovery of data from an offsite storage media that mirrors data via a communication link. Typically used for batch/journal updates to criti






34. A connection-based Internet protocol that supports reliable data transfer connections. Packet data is verified using checksums and retransmitted if it is missing or corrupted. The application plays no part in validating the transfer.






35. A third party that provides organizations with a variety of Internet; and Internet-related services






36. The use of software packages that aid in the development of all phases of an information system. System analysis; design programming and documentation are provided. Changes introduced in one CASE chart will update all other related charts automatical






37. Universal Description; Discovery and Integration






38. The main memory of the computer's central processing unit






39. The person responsible for implementing; monitoring and enforcing security rules established and authorized by management






40. Common path or channel between hardware devices. It can be between components internal to a computer or between external computers in a communications network.






41. The acts preventing; mitigating and recovering from disruption. The terms business resumption planning; disaster recovery planning and contingency planning also may be used in this context; they all concentrate on the recovery aspects of continuity.






42. The process of taking an unencrypted message (plaintext); applying a mathematical function to it (encryption algorithm with a key) and producing an encrypted message (ciphertext)






43. Also known as traditional development; it is a very procedure-focused development cycle with formal sign-off at the completion of each level.






44. A device that connects two similar networks together






45. An auditing concept regarding the importance of an item of information with regard to its impact or effect on the functioning of the entity being audited. An expression of the relative significance or importance of a particular matter in the context






46. An exception report is generated by a program that identifies transactions or data that appear to be incorrect. These items may be outside a predetermined range or may not conform to specified criteria.






47. The elimination of redundant data






48. This approach allows IS auditors to monitor system reliability on a continuous basis and to gather selective audit evidence through the computer.






49. The act or function of developing and maintaining applications programs in production






50. Also known as ''automated remote journaling of redo logs.'' A data recovery strategy that is similar to electronic vaulting; except that instead of transmitting several transaction batches daily; the archive logs are shipped as they are created.'