Test your basic knowledge |

CISA Certified Information Systems Auditor Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An algorithm that maps or translates one set of bits into another (generally smaller) so that a message yields the same result every time the algorithm is executed using the same message as input. It is computationally infeasible for a message to be






2. A multiuser; multitasking operating system that is used widely as the master control program in workstations and especially servers






3. Members of the operations area that are responsible for the collection; logging and submission of input for the various user groups






4. Expert systems are the most prevalent type of computer systems that arise from the research of artificial intelligence. An expert system has a built in hierarchy of rules; which are acquired from human experts in the appropriate field. Once input is






5. An IS backup facility that has the necessary electrical and physical components of a computer facility; but does not have the computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user






6. A series of tests designed to ensure that the modified program interacts correctly with other system components. These test procedures typically are performed by the system maintenance staff in their development library.






7. An international consortium founded in 1994 of affiliates from public and private organizations involved with the Internet and the web. The W3C's primary mission is to promulgate open standards to further enhance the economic growth of Internet web s






8. A stored collection of related data needed by organizations and individuals to meet their information processing and retrieval requirements






9. Commonly it is the network segment between the Internet and a private network. It allows access to services from the Internet and the internal private network; while denying access from the Internet directly to the private network.






10. A testing technique used to retest earlier program abends or logical errors that occurred during the initial testing phase






11. Controlling access to a network by analyzing the contents of the incoming and outgoing packets and either letting them pass or denying them based on a list of rules. Differs from packet filtering in that it is the data in the packet that are analyzed






12. Comparing the system's performance to other equivalent systems using well defined benchmarks






13. Deliberately testing only the value-added functionality of a software component






14. The portion of a security policy that states the general process that will be performed to accomplish a security goal






15. Those policies and procedures implemented to achieve a related control objective






16. Specialized security checker that tests user's passwords; searching for passwords that are easy to guess by repeatedly trying words from specially crafted dictionaries. Failing that; many password crackers can brute force all possible combinations in






17. Defined minimum performance measures at or above which the service delivered is considered acceptable






18. The possibility of an act or event occurring that would have an adverse effect on the organization and its information systems






19. Encapsulation is the technique used by layered protocols in which a lower layer protocol accepts a message from a higher layer protocol and places it in the data portion of a frame in the lower layer.






20. The area of the central processing unit (CPU) that executes software; allocates internal memory and transfers operations between the arithmetic-logic; internal storage and output sections of the computer






21. An extension to PPP to facilitate the creation of VPNs. L2TP merges the best features of PPTP (from Microsoft) and L2F (from Cisco).






22. Specialized tools that can be used to analyze the flow of data; through the processing logic of the application software; and document the logic; paths; control conditions and processing sequences. Both the command language or job control statements






23. A disk access method that stores data sequentially; while also maintaining an index of key fields to all the records in the file for direct access capability






24. A system software tool that logs; monitors and directs computer tape usage






25. The boundary defining the scope of control authority for an entity. For example; if a system is within the control perimeter; the right and ability exists to control it in response to an attack.






26. Inheritance refers to database structures that have a strict hierarchy (no multiple inheritance). Inheritance can initiate other objects irrespective of the class hierarchy; thus there is no strict hierarchy of objects.






27. A broad and wide-ranging concept of corporate governance; covering associated organizations such as global strategic alliance partners. (Source: Control Objectives for Enterprise Governance Discussion Document; published by the Information Systems Au






28. An interactive online system capability that immediately updates computer files when transactions are initiated through a terminal






29. An authentication protocol; often used by remote-access servers






30. In a passive assault; intruders attempt to learn some characteristic of the data being transmitted. They may be able to read the contents of the data so the privacy of the data is violated. Alternatively; although the content of the data itself may r






31. Estimated cost and revenue amounts for a given range of periods and set of books. There can be multiple budget versions for the same set of books.






32. These controls are designed to prevent or restrict an error; omission or unauthorized intrusion.






33. An interface point between the CPU and a peripheral device






34. 1) Following an authorized person into a restricted access area; 2) electronically attaching to an authorized telecommunications link to intercept and possibly alter transmissions.






35. A router that is configured to control network access by comparing the attributes of the incoming or outgoing packets to a set of rules






36. Used to ensure that input data agree with predetermined criteria stored in a table






37. A testing technique that is used to test program logic within a particular program or module. The purpose of the test is to ensure that the program meets system development guidelines and does not abnormally end during processing.






38. A security technique that verifies an individual's identity by analyzing a unique physical attribute; such as a handprint






39. An interactive system that provides the user with easy access to decision models and data; to support semistructured decision-making tasks






40. An entity (department; cost center; division or other group) responsible for entering and maintaining budget data.






41. The standard e-mail protocol on the Internet






42. The act of giving the idea or impression of being or doing something






43. In broadband; multiple channels are formed by dividing the transmission medium into discrete frequency segments. It generally requires the use of a modem.






44. The central database that stores and organizes data






45. A process to authenticate (or certify) a party's digital signature; carried out by trusted third parties.






46. A process used to identify and evaluate risks and their potential effects






47. Typically in large organisations where the quantum of data processed by the ERPs are extremely voluminous; analysis of patterns and trends prove to be extremely useful in ascertaining the efficiency and effectiveness of operations. Most ERPs provide






48. Character-at-a-time transmission






49. A destructive computer program that spreads from computer to computer using a range of methods; including infecting floppy disks and other programs. Viruses typically attach themselves to a program and modify it so that the virus code runs when the p






50. Wiring devices that may be inserted into communication links for use with analysis probes; LAN analyzers and intrusion detection security systems