SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A device for sending and receiving computerized data over transmission lines
Handprint scanner
Penetration testing
Terminal
Service provider
2. A technique used to recover the original plaintext from the ciphertext such that it is intelligible to the reader. The decryption is a reverse process of the encryption.
Logs/Log file
Decryption
Useful audit evidence
Modulation
3. An input device that reads characters and images that are printed or painted on a paper form into the computer.
Hash function
Optical scanner
Recovery point objective (RPO)—
L2F (Layer 2 forwarding)
4. A data dictionary is a database that contains the name; type; range of values; source and authorization for access for each data element in a database. It also indicates which application programs use that data so that when a data structure is contem
Data dictionary
Encryption
Operational audit
Procedure
5. The specific information subject to the IS auditor's report and related procedures which can include things such as the design or operation of internal controls and compliance with privacy practices or standards or specified laws and regulations.
Middleware
Function point analysis
Subject matter (Area of activity)
Project team
6. The traditional Internet service protocol widely used for many years on UNIX-based operating systems and supported by the Internet Engineering Task Force (IETF) that allows a program on one computer to execute a program on another (e.g.; server). The
Full duplex
Remote procedure calls (RPCs)
Reputational risk
Appearance of independence
7. The susceptibility of an audit area to error which could be material; individually or in combination with other errors; assuming that there are no related internal controls
Rounding down
Hash total
Interface testing
Inherent risk
8. The information an auditor gathers in the course of performing an IS audit. Evidence is relevant if it pertains to the audit objectives and has a logical relationship to the findings and conclusions it is used to support.
Anomaly
Field
Evidence
ISP (Internet service provider)
9. A protocol used to transmit data securely between two end points to create a VPN
File server
Dry-pipe fire extinguisher system
PPTP (point-to-point tunneling protocol)
Redo logs
10. The risk that the IS auditor's substantive procedures will not detect an error which could be material; individually or in combination with other errors
Smart card
Detection risk
FTP (file transfer protocol)
Cross-certification
11. These are the requirements for establishing a database application. They include field definitions; field requirements and reporting requirements for the individual information in the database.
Database specifications
Brouters
Technical infrastructure security
Password cracker
12. The router at the extreme edge of the network under control; usually connected to an ISP or other service provider; also known as border router
Application acquisition review
Bar code
Abend
External router
13. A phase of an SDLC methodology where the affected user groups define the requirements of the system for meeting the defined needs
Uploading
Requirements definition
Content filtering
Router
14. A discussion document which sets out an ''Enterprise Governance Model'' focusing strongly on both the enterprise business goals and the information technology enablers which facilitate good enterprise governance; published by the Information Systems
Optical character recognition
Corporate exchange rate
Electronic vaulting
Control Objectives for Enterprise Governance
15. The process of converting an analog telecommunications signal into a digital computer signal
Artificial intelligence
Demodulation
Error risk
Recovery testing
16. A mathematical expression used to calculate budget amounts based on actual results; other budget amounts and statistics. With budget formulas; budgets using complex equations; calculations and allocations can be automatically created.
COSO
Budget formula
Security management
Monetary unit sampling
17. Parallel simulation involves the IS auditor writing a program to replicate those application processes that are critical to an audit opinion and using this program to reprocess application system data. The results produced are compared with the resul
Redundancy check
Parallel simulation
Data diddling
War dialler
18. Provides short-term backup power from batteries for a computer system when the electrical power fails or drops to an unacceptable voltage level
Random access memory (RAM)
Uninterruptible power supply (UPS)
IDS (intrusion detection system)
Control risk
19. The area of the system that the intrusion detection system is meant to monitor and protect
Encryption
Posting
Protection domain
Central office (CO)
20. A telecommunications carrier's facilities in a local area in which service is provided where local service is switched to long distance
Fourth generation language (4GL)
Central office (CO)
Credit risk
Population
21. Refer to the transactions and data relating to each computer-based application system and are therefore specific to each such application. The objectives of application controls; which may be manual; or programmed; are to ensure the completeness and
Application controls
Warm-site
Port
Symmetric key encryption
22. Emergency processing agreements between two or more organizations with similar equipment or applications. Typically; participants promise to provide processing time to each other when an emergency arises.
System testing
Edit controls
Reciprocal agreement
Hierarchical database
23. A computer program or set of programs that perform the processing of records for a specific function
Nonrepudiable trnasactions
Sniff
Application
Standing data
24. Memory reserved to temporarily hold data. Buffers are used to offset differences between the operating speeds of different devices; such as a printer and a computer. In a program; buffers are reserved areas of RAM that hold data while they are being
Buffer
Degauss
Procedure
Internet Inter-ORB Protocol (IIOP)
25. A financial system that establishes the means for transferring money between suppliers and users of funds; ordinarily by exchanging debits or credits between banks or financial institutions.
Payment system
Address
Non-intrusive monitoring
Spanning port
26. A group of items that is waiting to be serviced or processed
Card swipes
Integrated test facilities (ITF)
Queue
Bar code
27. Devices that perform the functions of both bridges and routers; are called brouters. Naturally; they operate at both the data link and the network layers. A brouter connects same data link type LAN segments as well as different data link ones; which
Dial-back
UDP (User Datagram Protocol)
Brouters
Top-level management
28. A high level description of the audit work to be performed in a certain period of time (ordinarily a year). It includes the areas to be audited; the type of work planned; the high level objectives and scope of the work; and topics such as budget; res
Nonrepudiable trnasactions
Business-to-consumer e-commerce (B2C)
Independence
Audit plan
29. A level of comfort short of a guarantee but considered adequate given the costs of the control and the likely benefits achieved
Comparison program
Reasonable assurance
Token ring topology
Project sponsor
30. Any information collection mechanism utilized by an intrusion detection system
Console log
Harden
Monitor
Risk
31. A manual or automated log of all updates to data files and databases
Corrective controls
Checkpoint restart procedures
Transaction log
Appearance of independence
32. The objectives of management that are used as the framework for developing and implementing controls (control procedures).
Distributed data processing network
Machine language
Control objective
Components (as in component-based development)
33. A data transmission service requiring the establishment of a circuit-switched connection before data can be transferred from source data terminal equipment (DTE) to a sink DTE. A circuit-switched data transmission service uses a connection network.
Circuit-switched network
Verification
Registration authority (RA)
Taps
34. A deficiency in the design or operation of a control procedure. Control weaknesses can potentially result in risks relevant to the area of activity not being reduced to an acceptable level (relevant risks are those that threaten achievement of the ob
Audit
Access path
Control weakness
Static analysis
35. Refers to a sprinkler system that does not have water in the pipes during idle usage; unlike a fully charged fire extinguisher system that has water in the pipes at all times. The dry-pipe system is activated at the time of the fire alarm; and water
Application development review
Internet
Trust
Dry-pipe fire extinguisher system
36. 1) The set of management statements that documents an organization's philosophy of protecting its computing and information assets 2) The set of security rules enforced by the system's security features
Security policy
Quick ship
Statistical sampling
Client-server
37. A third party that provides organizations with a variety of Internet; and Internet-related services
ISP (Internet service provider)
Computer-aided software engineering (CASE)
Telecommunications
Computationally greedy
38. The forms used to record data that have been captured. A source document may be a piece of paper; a turnaround document or an image displayed for online data input.
Analog
Public key
Network hop
Source documents
39. First; it denotes the planning and management of resources in an enterprise. Second; it denotes a software system that can be used to manage whole business processes; integrating purchasing; inventory; personnel; customer service; shipping; financial
Enterprise resource planning
Input controls
Reverse engineering
Continuity
40. A document which defines the IS audit function's responsibility; authority and accountability
Audit charter
Source code compare programs
Antivirus software
Assembler
41. Analysis that is performed in real time or in continuous form
Bar case
Dynamic analysis
Database
Ring topology
42. A process to authenticate (or certify) a party's digital signature; carried out by trusted third parties.
Digital certification
Application controls
System exit
Unit testing
43. The portion of a security policy that states the general process that will be performed to accomplish a security goal
Population
Service provider
Optical scanner
Procedure
44. Universal Description; Discovery and Integration
RS-232 interface
Windows NT
Bandwidth
UDDI
45. Expert systems are the most prevalent type of computer systems that arise from the research of artificial intelligence. An expert system has a built in hierarchy of rules; which are acquired from human experts in the appropriate field. Once input is
Comprehensive audit
Expert systems
Node
Partitioned file
46. A certificate issued by one certification authority to a second certification authority so that users of the first certification authority are able to obtain the public key of the second certification authority and verify the certificates it has crea
Cross-certification
e-commerce
Executable code
Proxy server
47. Programmed checking of data validity in accordance with predetermined criteria
Signatures
Internal control structure
IDS (intrusion detection system)
Validity check
48. An assault on a service from a single source that floods it with so many requests that it becomes overwhelmed and is either stopped completely or operates at a significantly reduced rate
DoS (denial-of-service) attack
Local loop
liquidity risk
Content filtering
49. Measure of interconnectivity among software program modules' structure. Coupling depends on the interface complexity between modules. This can be defined as the point at which entry or reference is made to a module; and what data passes across the in
Token ring topology
Tuple
Coupling
Numeric check
50. Tests of detailed activities and transactions; or analytical review tests; designed to obtain audit evidence on the completeness; accuracy or existence of those activities or transactions during the audit period
Electronic funds transfer (EFT)
Operating system audit trails
Uninterruptible power supply (UPS)
Substantive testing
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests