SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Specifies the format of packets and the addressing scheme
Monitoring policy
IP (Internet protocol)
Journal entry
UDDI
2. Allows the network interface to capture all network traffic irrespective of the hardware device to which the packet is addressed
Promiscuous mode
Vulnerability analysis
Incremental testing
Public key cryptosystem
3. A certificate issued by one certification authority to a second certification authority so that users of the first certification authority are able to obtain the public key of the second certification authority and verify the certificates it has crea
Cross-certification
Business process reengineering (BPR)
Masking
Fraud risk
4. Techniques and procedures used to verify; validate and edit data; to ensure that only correct data are entered into the computer
Static analysis
Synchronous transmission
Application layer
Input controls
5. A vacuum tube that displays data by means of an electron beam striking the screen; which is coated with suitable phosphor material or a device similar to a television screen upon which data can be displayed
Base case
Private key cryptosystems
Cathode ray tube (CRT)
Engagement letter
6. A software engineering technique whereby an existing application system code can be redesigned and coded using computer-aided software engineering (CASE) technology
Reverse engineering
Ring topology
BSP (business service provider)
Intrusive monitoring
7. A general hardware control; which helps to detect data errors when data are read from memory or communicated from one computer to another. A 1-bit digit (either 0 or 1) is added to a data item to indicate whether the sum of that data item's bit is od
Security management
Security administrator
Parity check
Active response
8. Special system software features and utilities that allow the user to perform complex system maintenance. Use of these exits often permits the user to operate outside of the security access control system.
System exit
Security software
Internal control structure
Worm
9. Intentional violations of established management policy or regulatory requirements. Deliberate misstatements or omissions of information concerning the area under audit or the organization as a whole; gross negligence or unintentional illegal acts.
Optical character recognition
Irregularities
TACACS+ (terminal access controller access control system plus)
Anomaly
10. The code used to designate the location of a specific piece of data within computer storage
Electronic data interchange (EDI)
Topology
Address
Audit evidence
11. Refers to the security aspects supported by the ERP; primarily with regard to the roles or responsibilities and audit trails within the applications
Sniff
Coupling
Electronic funds transfer (EFT)
Application security
12. The physical layout of how computers are linked together. Examples include ring; star and bus.
Reasonableness check
Latency
Assembler
Topology
13. The current and prospective effect on earnings or capital arising from adverse business decisions; improper implementation of decisions or lack of responsiveness to industry changes.
Strategic risk
DNS (domain name system)
RFC (request for comments)
Data dictionary
14. An approach used to plan; design; develop; test and implement an application system or a major modification to an application system. Typical phases include the feasibility study; requirements study; requirements definition; detailed design; programm
Tuple
Baseband
Systems development life cycle (SDLC)
Encryption
15. A testing technique used to retest earlier program abends or logical errors that occurred during the initial testing phase
Benchmark
Regression testing
Information engineering
Cold site
16. Audit evidence is relevant if it pertains to the audit objectives and has a logical relationship to the findings and conclusions it is used to support.
Windows NT
Privacy
Bypass label processing (BLP)
Relevant audit evidence
17. A method of computer fraud involving a computer code that instructs the computer to slice off small amounts of money from an authorized computer transaction and reroute this amount to the perpetrator's account
Salami technique
Penetration testing
ISO17799
Sniffing
18. The technique used for selecting records in a file; one at a time; for processing; retrieval or storage. The access method is related to; but distinct from; the file organization that determines how the records are stored.
Electronic vaulting
Access method
Third-party review
Substantive testing
19. In an asymmetric cryptographic scheme; the key that may be widely published to enable the operation of the scheme
Audit authority
Data diddling
Decryption key
Public key
20. Confidentiality concerns the protection of sensitive information from unauthorized disclosure
Standing data
Database specifications
Image processing
Confidentiality
21. Checks that data are entered correctly
Protocol stack
Integrated test facilities (ITF)
Verification
L2TP (Layer 2 tunneling protocol)
22. A program designed to detect computer viruses
Data communications
Application programming interface (API)
Vaccine
Sequential file
23. The most important types of operational risk involve breakdowns in internal controls and corporate governance. Such breakdowns can lead to financial losses through error; fraud or failure to perform in a timely manner or cause the interests of the ba
Attribute sampling
Operational risk
End-user computing
Artificial intelligence
24. Specifies the length of the file's record and the sequence and size of its fields. A file layout also will specify the type of data contained within each field. For example; alphanumeric; zoned decimal; packed and binary are types of data.
TACACS+ (terminal access controller access control system plus)
Parallel simulation
Performance testing
File layout
25. A certificate identifying a public key to its subscriber; corresponding to a private key held by that subscriber. It is a unique code that typically is used to allow the authenticity and integrity of communicated data to be verified.
RADIUS
Digital certificate
Degauss
Third-party review
26. Checks the accuracy of the results produced by a test run. There are three types of checks that an output analyzer can perform. First; if a standard set of test data and test results exists for a program; the output of a test run after program mainte
Output analyzer
Pervasive IS controls
Analog
System narratives
27. Considered for acquisition the person responsible for high-level decisions; such as changes to the scope and/or budget of the project; and whether or not to implement
Data-oriented systems development
Project sponsor
Parity check
Image processing
28. Is the risk to earnings or capital arising from a bank's inability to meet its obligations when they come due; without incurring unacceptable losses. Internet banking may increase deposit volatility from customers who maintain accounts solely on the
liquidity risk
Filtering router
Operational risk
Mutual takeover
29. A fully operational offsite data processing facility equipped with both hardware and system software to be used in the event of a disaster
Hot site
Regression testing
Parallel testing
Audit authority
30. A public key cryptosystem developed by R. Rivest; A. Shamir and L. Adleman. The RSA has two different keys; the public encryption key and the secret decryption key. The strength of the RSA depends on the difficulty of the prime number factorization.
RSA
Card swipes
TCP/IP protocol (Transmission Control Protocol/Internet Protocol)
Buffer
31. Common path or channel between hardware devices. It can be between components internal to a computer or between external computers in a communications network.
TACACS+ (terminal access controller access control system plus)
Bus
Backup
Outsourcing
32. Files created specifically to record various actions occurring on the system to be monitored; such as failed login attempts; full disk drives and e-mail delivery failures
Untrustworthy host
Logs/Log file
Application security
Internet packet (IP) spoofing
33. Changing data with malicious intent before or during input into the system
SMTP (Simple Mail Transport Protocol)
Data diddling
Pervasive IS controls
Internet packet (IP) spoofing
34. The risk that the IS auditor's substantive procedures will not detect an error which could be material; individually or in combination with other errors
Detection risk
Systems development life cycle (SDLC)
Point-of-sale systems (POS)
Control perimeter
35. Files; equipment; data and procedures available for use in the event of a failure or loss; if the originals are destroyed or out of service
Segregation/separation of duties
ICMP (internet control message protocol)
Proxy server
Backup
36. An individual who attempts to gain unauthorized access to a computer system
Independent appearance
Token
Hacker
Web Services Description Language (WSDL)
37. A program written in a portable; platform independent computer language; such as Java. It is usually embedded in an HTML page and then executed by a browser. Applets can only perform a restricted set of operations; thus preventing; or at least minimi
Decentralization
Applet
Ethernet
Criteria
38. A telecommunications traffic controlling methodology in which a complete message is sent to a concentration point and stored until the communications path is established
Evidence
Full duplex
Default deny policy
Message switching
39. An independent audit of the control structure of a service organization; such as a service bureau; with the objective of providing assurances to the users of the service organization that the internal control structure is adequate; effective and soun
ISO17799
Binary code
FIN (final)
Third-party review
40. Audit evidence is reliable if; in the IS auditor's opinion; it is valid; factual; objective and supportable.
Application system
Reliable audit evidence
Repository
COCO
41. The systems development phase in which systems specifications and conceptual designs are developed; based on end-user needs and requirements
Systems analysis
Program evaluation and review technique (PERT)
Network
Nonrepudiation
42. The boundary that defines the area of security concern and security policy coverage
Business risk
Operational control
Cluster controller
Security perimeter
43. Two trading partners both share one or more secrets. No one else can read their messages. A different key (or set of keys) is needed for each pair of trading partners. Same key is used for encryption and decryption. (Also see Private Key Cryptosystem
Audit objective
Symmetric key encryption
Leased lines
Validity check
44. Source lines of code are often used in deriving single-point software-size estimations.
Non-intrusive monitoring
Systems analysis
Source lines of code (SLOC)
Availability
45. A live test of the effectiveness of security defenses through mimicking the actions of real-life attackers
Judgment sampling
Reasonable assurance
Scheduling
Penetration testing
46. The ability to map a given activity or event back to the responsible party
Numeric check
Intrusive monitoring
Accountability
Corrective controls
47. A set of protocols for accessing information directories. It is based on the X.500 standard; but is significantly simpler.
Discovery sampling
Offline files
Electronic funds transfer (EFT)
LDAP (Lightweight Directory Access Protocol)
48. Block-at-a-time data transmission
Synchronous transmission
Packet
Full duplex
Strategic risk
49. A low-level computer programming language which uses symbolic code and produces machine instructions
Prototyping
Assembly language
Utility software
Independent appearance
50. The traditional Internet service protocol widely used for many years on UNIX-based operating systems and supported by the Internet Engineering Task Force (IETF) that allows a program on one computer to execute a program on another (e.g.; server). The
Comparison program
Quick ship
Enterprise resource planning
Remote procedure calls (RPCs)