Test your basic knowledge |

CISA Certified Information Systems Auditor Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An individual using a terminal; PC or an application can access a network to send an unstructured message to another individual or group of people.






2. A code whose representation is limited to 0 and 1






3. An evaluation of an application system being acquired or evaluated; which considers such matters as: appropriate controls are designed into the system; the application will process information in a complete; accurate and reliable manner; the applicat






4. A type of LAN architecture that utilizes a central controller to which all nodes are directly connected. All transmissions from one station to another pass through the central controller; which is responsible for managing and controlling all communic






5. Checks the accuracy of the results produced by a test run. There are three types of checks that an output analyzer can perform. First; if a standard set of test data and test results exists for a program; the output of a test run after program mainte






6. The current and prospective effect on earnings and capital arising from negative public opinion. This affects the bank's ability to establish new relationships or services or continue servicing existing relationships. Reputation risk may expose the b






7. Data-oriented development techniques that work on the premise that data are at the center of information processing and that certain data relationships are significant to a business and must be represented in the data structure of its systems






8. Is the risk to earnings or capital arising from changes in the value of portfolios of financial instruments. Price risk arises from market making; dealing and position taking in interest rate; foreign exchange; equity and commodities markets. Banks m






9. Organizations that have no official physical site presence and are made up of diverse geographically dispersed or mobile employees.






10. The logical language a computer understands






11. A program designed to detect computer viruses






12. Diligence which a person; who possesses a special skill; would exercise under a given set of circumstances






13. An audit designed to determine the accuracy of financial records and information






14. Analysis of information that occurs on a noncontinuous basis; also known as interval-based analysis






15. Analysis of the security state of a system or its compromise on the basis of information collected at intervals






16. The organization providing the outsourced service






17. An evaluation of any part of an implementation project (e.g.; project management; test plans; user acceptance testing procedures)






18. Weaknesses in systems that can be exploited in ways that violate security policy






19. Used to ensure that input data agree with predetermined criteria stored in a table






20. The process of electronically sending computerized information from one computer to another computer. Most often; the transfer is from a smaller computer to a larger one.






21. Applications that detect; prevent and possibly remove all known viruses from files located in a microcomputer hard drive






22. Detection on the basis of whether the system activity matches that defined as bad






23. Criteria Of Control; published by the Canadian Institute of Chartered Accountants in 1995






24. A structure of relationships and processes to direct and control the enterprise in order to achieve the enterprise's goals by adding value while balancing risk versus return over IT and its processes






25. 1) Following an authorized person into a restricted access area; 2) electronically attaching to an authorized telecommunications link to intercept and possibly alter transmissions.






26. An Internet standard that allows a network to use one set of IP addresses for internal traffic and a second set of addresses for external traffic. The server; providing the NAT service; changes the source address of outgoing packets from the internal






27. Used in data encryption; it uses an encryption key; as a public key; to encrypt the plaintext to the ciphertext. It uses the different decryption key; as a secret key; to decrypt the ciphertext to the corresponding plaintext. In contrast to a private






28. A type of LAN ring topology in which a frame containing a specific format; called the token; is passed from one station to the next around the ring. When a station receives the token; it is allowed to transmit. The station can send as many frames as






29. Formal document which defines the IS auditor's responsibility; authority and accountability for a specific assignment






30. The policies; procedures; organizational structure and electronic access controls designed to restrict access to computer software and data files






31. General controls which are designed to manage and monitor the IS environment and which; therefore; affect all IS-related activities






32. Digital information; such as cleartext; that is intelligible to the reader






33. Refer to the transactions and data relating to each computer-based application system and are therefore specific to each such application. The objectives of application controls; which may be manual; or programmed; are to ensure the completeness and






34. A level of comfort short of a guarantee but considered adequate given the costs of the control and the likely benefits achieved






35. A communications channel that can handle only one signal at a time. The two stations must alternate their transmissions.






36. Files maintained by a system; primarily a database management system; for the purposed of reapplying changes following an error or outage recovery






37. Program narratives provide a detailed explanation of program flowcharts; including control points and any external input.






38. Controlling access to a network by analyzing the contents of the incoming and outgoing packets and either letting them pass or denying them based on a list of rules. Differs from packet filtering in that it is the data in the packet that are analyzed






39. The main memory of the computer's central processing unit






40. The organization using the outsourced service






41. A system of computers connected together by a communications network. Each computer processes its data and the network supports the system as a whole. Such a network enhances communication among the linked computers and allows access to shared files.






42. A special terminal used by computer operations personnel to control computer and systems operations functions. These terminals typically provide a high level of computer access and should be properly secured.






43. A communication line permanently assigned to connect two points; as opposed to a dial-up line that is only available and open when a connection is made by dialing the target machine or network. Also known as a dedicated line.






44. An ASP that also provides outsourcing of business processes such as payment processing; sales order processing and application development






45. Electronic communications by special devices over distances or around devices that preclude direct interpersonal exchange






46. Editing ensures that data conform to predetermined criteria and enable early identification of potential errors.






47. An attack strategy in which the attacker successively hacks into a series of connected systems; obscuring his/her identify from the victim of the attack






48. A telecommunications carrier's facilities in a local area in which service is provided where local service is switched to long distance






49. Faking the sending address of a transmission in order to gain illegal entry into a secure system






50. Any sample that is selected subjectively or in such a manner that the sample selection process is not random or the sampling results are not evaluated mathematically