SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A group of items that is waiting to be serviced or processed
Default password
File
Queue
Access control
2. Simulated transactions that can be used to test processing logic; computations and controls actually programmed in computer applications. Individual programs or an entire system can be tested. This technique includes Integrated Test Facilities (ITFs)
Test data
Password
Application software tracing and mapping
Certificate authority (CA)
3. A programmed edit or routine that detects transposition and transcription errors by calculating and checking the check digit
Blackbox testing
Corrective controls
Check digit verification (self-checking digit)
System software
4. A program that translates programming language (source code) into machine executable instructions (object code)
Compiler
Trojan horse
DMZ (demilitarized zone)
Datagram
5. Comparing the system's performance to other equivalent systems using well defined benchmarks
Parallel testing
Performance testing
Memory dump
Trusted processes
6. The possibility of an act or event occurring that would have an adverse effect on the organization and its information systems
Application development review
Object orientation
Risk
Binary code
7. A project management technique used in the planning and control of system projects
Systems acquisition process
Program evaluation and review technique (PERT)
Data leakage
DoS (denial-of-service) attack
8. Consists of one or more web pages that may originate at one or more web server computers. A person can view the pages of a website in any order; as he or she would a magazine.
TCP/IP protocol (Transmission Control Protocol/Internet Protocol)
Web site
Completeness check
Computer server
9. The risk that activities will include deliberate circumvention of controls with the intent to conceal the perpetuation of irregularities. The unauthorized use of assets or services and abetting or helping to conceal.
Fraud risk
Computer-assisted audit technique (CAATs)
Service level agreement (SLA)
Subject matter (Area of activity)
10. 1) The process of establishing and maintaining security in a computer or network system. The stages of this process include prevention of security problems; detection of intrusions; investigation of intrusions and resolution.2) In network management;
Security management
Initial program load (IPL)
Objectivity
Vulnerability analysis
11. A private key cryptosystem published by the National Bureau of Standards (NBS); the predecessor of the US National Institute of Standards and Technology (NIST). DES has been used commonly for data encryption in the forms of software and hardware impl
Combined Code on Corporate Governance
Password
Masking
Data Encryption Standard (DES)
12. An international standard that defines information confidentiality; integrity and availability controls
Object orientation
ISO17799
Reciprocal agreement
Evidence
13. Tests of detailed activities and transactions; or analytical review tests; designed to obtain audit evidence on the completeness; accuracy or existence of those activities or transactions during the audit period
Executable code
Blackbox testing
Substantive testing
Anomaly
14. A computer file storage format in which one record follows another. Records can be accessed sequentially only. It is required with magnetic tape.
Auditability
Sequential file
HTTPS (hyper text transfer protocol secure)
Rounding down
15. A destructive computer program that spreads from computer to computer using a range of methods; including infecting floppy disks and other programs. Viruses typically attach themselves to a program and modify it so that the virus code runs when the p
Virus
Audit program
Simple Object Access Protocol (SOAP)
Application proxy
16. An attack capturing sensitive pieces of information; such as passwords; passing through the network
Sniffing
DDoS (distributed denial-of-service) attack
Service level agreement (SLA)
Initial program load (IPL)
17. An audit designed to determine the accuracy of financial records; as well as evaluate the internal controls of a function or department
Comprehensive audit
Technical infrastructure security
legal risk
Fault tolerance
18. 1) Two or more networks connected by a router 2) The world's largest network using TCP/IP protocols to link government; university and commercial institutions
Firmware
Budget
Electronic data interchange (EDI)
Internet
19. A device that forwards packets between LAN devices or segments. LANs that use switches are called switched LANs.
Procedure
Taps
Switch
Logs/Log file
20. A method of computer fraud involving a computer code that instructs the computer to remove small amounts of money from an authorized computer transaction by rounding down to the nearest whole value denomination and rerouting the rounded off amount to
Audit risk
Rounding down
Centralized data processing
Message switching
21. Commonly it is the network segment between the Internet and a private network. It allows access to services from the Internet and the internal private network; while denying access from the Internet directly to the private network.
Repository
DMZ (demilitarized zone)
Web page
Address space
22. Diligence which a person would exercise under a given set of circumstances
Due care
Security/transaction risk
Applet
Subject matter (Area of activity)
23. A program for the examination of data; using logical or conditional tests to determine or to identify similarities or differences
Router
Full duplex
Production programs
Comparison program
24. System narratives provide an overview explanation of system flowcharts; with explanation of key control points and system interfaces.
System narratives
Data dictionary
Coupling
Mutual takeover
25. Files maintained by a system; primarily a database management system; for the purposed of reapplying changes following an error or outage recovery
Redo logs
Security policy
Anomaly detection
Data owner
26. A telecommunications carrier's facilities in a local area in which service is provided where local service is switched to long distance
Object code
Central office (CO)
Recovery point objective (RPO)—
Console log
27. The method used to identify the location of a participant in a network. Ideally; addressing specifies where the participant is located rather than who they are (name) or how to get there (routing).
UNIX
Enterprise resource planning
Warm-site
Addressing
28. A process involving the extraction of components from existing systems and restructuring these components to develop new systems or to enhance the efficiency of existing systems. Existing software systems thus can be modernized to prolong their funct
Noise
Personal identification number (PIN)
FIN (final)
Reengineering
29. Used in data encryption; it uses an encryption key; as a public key; to encrypt the plaintext to the ciphertext. It uses the different decryption key; as a secret key; to decrypt the ciphertext to the corresponding plaintext. In contrast to a private
Output analyzer
Judgment sampling
Credit risk
Public key cryptosystem
30. Encapsulation is the technique used by layered protocols in which a lower layer protocol accepts a message from a higher layer protocol and places it in the data portion of a frame in the lower layer.
Encapsulation (objects)
Parallel testing
Engagement letter
Attitude
31. An interactive online system capability that immediately updates computer files when transactions are initiated through a terminal
DMZ (demilitarized zone)
Control objective
Real-time processing
Attribute sampling
32. An auditing concept regarding the importance of an item of information with regard to its impact or effect on the functioning of the entity being audited. An expression of the relative significance or importance of a particular matter in the context
Materiality
Degauss
Run-to-run totals
Noise
33. Deliberately testing only the value-added functionality of a software component
Application maintenance review
Simple Object Access Protocol (SOAP)
Incremental testing
Performance testing
34. A testing approach that uses knowledge of a program/module's underlying implementation and code intervals to verify its expected behavior.
Data diddling
Whitebox testing
Pervasive IS controls
Security/transaction risk
35. A row or record consisting of a set of attribute value pairs (column or field) in a relational data structure
Assembler
Tuple
World Wide Web Consortium (W3C)
Feasibility study
36. The central database that stores and organizes data
Optical character recognition
Repository
Fraud risk
Residual risk
37. The electronic transmission of transactions (information) between two organizations. EDI promotes a more efficient paperless environment. EDI transmissions can replace the use of standard documents; including invoices or purchase orders.
Online data processing
Electronic data interchange (EDI)
Magnetic ink character recognition (MICR)
ISP (Internet service provider)
38. A journal entry entered at a computer terminal. Manual journal entries can include regular; statistical; inter-company and foreign currency entries
Manual journal entry
Promiscuous mode
Backup
Value-added network (VAN)
39. Those controls that seek to maintain confidentiality; integrity and availability of information
Security perimeter
Run instructions
Data security
Parallel testing
40. A 24-hour; stand-alone mini-bank; located outside branch bank offices or in public places like shopping malls. Through ATMs; clients can make deposits; withdrawals; account inquiries and transfers. Typically; the ATM network is comprised of two spher
Automated teller machine (ATM)
Sequential file
Point-of-presence (POP)
virtual organizations
41. A numbering system that uses a base of 16 and uses 16 digits: 0; 1; 2; 3; 4; 5; 6; 7; 8; 9; A; B; C; D; E and F. Programmers use hexadecimal numbers as a convenient way of representing binary numbers.
Magnetic ink character recognition (MICR)
Hexadecimal
SYN (synchronize)
Data structure
42. Modern expression for organizational development stemming from IS/IT impacts. The ultimate goal of BPR is to yield a better performing structure; more responsive to the customer base and market conditions; while yielding material cost savings. To ree
Hash total
ISP (Internet service provider)
Business process reengineering (BPR)
Dial-in access controls
43. Used to electronically scan and input written information from a source document
Optical character recognition
Simple fail-over
Port
Data-oriented systems development
44. The extent to which a system unit--subroutine; program; module; component; subsystem--performs a single dedicated function. Generally; the more cohesive are units; the easier it is to maintain and enhance a system; since it is easier to determine whe
Cohesion
Message switching
Decryption
Network administrator
45. The physical layout of how computers are linked together. Examples include ring; star and bus.
Hacker
Topology
Hypertext
Electronic cash
46. Information generated by an encryption algorithm to protect the plaintext. The ciphertext is unintelligible to the unauthorized reader.
Privacy
Ciphertext
Internet banking
Librarian
47. The code used to designate the location of a specific piece of data within computer storage
Address
Objectivity
Application layer
Source documents
48. Expert or decision support systems that can be used to assist IS auditors in the decision-making process by automating the knowledge of experts in the field. This technique includes automated risk analysis; systems software and control objectives sof
Scheduling
Audit expert systems
Feasibility study
Format checking
49. The act of verifying the identity of a system entity (e.g.; a user; a system; a network node) and the entity's eligibility to access computerized information. Designed to protect against fraudulent logon activity. Authentication can also refer to the
Limit check
X.25
Authentication
Latency
50. A set of metrics designed to measure the extent to which performance objectives are being achieved on an on-going basis. They can include service level agreements; critical success factors; customer satisfaction ratings; internal or external benchmar
Control section
Service bureau
Performance indicators
Network administrator
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests