SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The standards and benchmarks used to measure and present the subject matter and against which the IS auditor evaluates the subject matter. Criteria should be: Objective—free from bias Measurable—provide for consistent measurement Complete—include all
Filtering router
Criteria
Backup
Object Management Group (OMG)
2. A method of user authentication. Challenge response authentication is carried out through use of the Challenge Handshake Authentication Protocol (CHAP). When a user tries to log into the server; the server sends the user a ''challenge;'' which is a r
Data analysis
Credit risk
Challenge/response token
Exposure
3. A testing technique that is used to test program logic within a particular program or module. The purpose of the test is to ensure that the program meets system development guidelines and does not abnormally end during processing.
Unit testing
Data custodian
COCO
Hardware
4. The computer room and support areas
Passive assault
Sequence check
Information processing facility (IPF)
Real-time analysis
5. The process of electronically inputting source documents by taking an image of the document; thereby eliminating the need for key entry
Image processing
Audit plan
Standing data
Database specifications
6. A financial system that establishes the means for transferring money between suppliers and users of funds; ordinarily by exchanging debits or credits between banks or financial institutions.
PPP (point-to-point protocol)
Control risk self-assessment
Payment system
Rootkit
7. Refers to the controls that support the process of transformation of the organisation's legacy information systems into the ERP applications. This would largely cover all aspects of systems implementation and configuration; such as change management
implementation life cycle review
Nonrepudiable trnasactions
Audit charter
Diskless workstations
8. A piece of information; in a digitized form; used to recover the plaintext from the corresponding ciphertext by decryption
Frame relay
legal risk
Application acquisition review
Decryption key
9. Using telecommunications facilities for handling and processing of computerized information
Teleprocessing
Masqueraders
System flowcharts
Confidentiality
10. A form of modulation in which data signals are pulsed directly on the transmission medium without frequency division and usually utilize a transceiver. In baseband the entire bandwidth of the transmission medium (e.g.; coaxial cable) is utilized for
Application maintenance review
Baseband
Degauss
Uploading
11. An audit designed to evaluate the various internal controls; economy and efficiency of a function or department
Operational audit
Reengineering
Concurrent access
Audit charter
12. 1)A computer dedicated to servicing requests for resources from other computers on a network. Servers typically run network operating systems. 2)A computer that provides services to another computer (the client).
Source lines of code (SLOC)
IDS (intrusion detection system)
Downtime report
Computer server
13. 1) Two or more networks connected by a router 2) The world's largest network using TCP/IP protocols to link government; university and commercial institutions
Electronic cash
Audit responsibility
Inherent risk
Internet
14. A file format in which records are organized and can be accessed; according to a preestablished key that is part of the record
Compliance testing
Indexed sequential file
Passive assault
Manual journal entry
15. A group of budgets linked together at different levels such that the budgeting authority of a lower-level budget is controlled by an upper-level budget.
Control weakness
Budget hierarchy
Preventive controls
Security testing
16. An evaluation of an application system under development which considers matters such as: appropriate controls are designed into the system; the application will process information in a complete; accurate and reliable manner; the application will fu
Application development review
Detailed IS ontrols
Datagram
Bridge
17. A test to check the system's ability to recover after a software or hardware failure
ISP (Internet service provider)
Relevant audit evidence
Recovery testing
Application development review
18. A version of the Windows operating system that supports preemptive multitasking
Biometrics
Windows NT
Telnet
Initial program load (IPL)
19. A high level description of the audit work to be performed in a certain period of time (ordinarily a year). It includes the areas to be audited; the type of work planned; the high level objectives and scope of the work; and topics such as budget; res
Asynchronous transmission
Private key cryptosystems
Audit plan
Masking
20. A sub-network of the Internet through which information is exchanged by text; graphics; audio and video.
world wide web (WWW)
Technical infrastructure security
Relevant audit evidence
Business process reengineering (BPR)
21. Comparing the system's performance to other equivalent systems using well defined benchmarks
Capacity stress testing
Integrity
Performance testing
Fourth generation language (4GL)
22. A security technique that verifies an individual's identity by analyzing a unique physical attribute; such as a handprint
Biometrics
Local loop
Rapid application development
Challenge/response token
23. Measure of interconnectivity among software program modules' structure. Coupling depends on the interface complexity between modules. This can be defined as the point at which entry or reference is made to a module; and what data passes across the in
Waterfall development
Combined Code on Corporate Governance
Interest rate risk
Coupling
24. 1) The set of management statements that documents an organization's philosophy of protecting its computing and information assets 2) The set of security rules enforced by the system's security features
Security policy
Misuse detection
Systems acquisition process
Non-intrusive monitoring
25. Organizations that have no official physical site presence and are made up of diverse geographically dispersed or mobile employees.
virtual organizations
Bypass label processing (BLP)
Cluster controller
Redo logs
26. Wiring devices that may be inserted into communication links for use with analysis probes; LAN analyzers and intrusion detection security systems
System testing
Point-of-sale systems (POS)
Taps
Budget
27. Deliberately testing only the value-added functionality of a software component
TCP (transmission control protocol)
Incremental testing
Duplex routing
Image processing
28. Any sample that is selected subjectively or in such a manner that the sample selection process is not random or the sampling results are not evaluated mathematically
Reliable audit evidence
DDoS (distributed denial-of-service) attack
Judgment sampling
Components (as in component-based development)
29. These controls deal with the everyday operation of a company or organization to ensure all objectives are achieved.
Feasibility study
Database
Datagram
Operational control
30. Correctness checks built into data processing systems and applied to batches of input data; particularly in the data preparation stage. There are two main forms of batch controls: 1) sequence control; which involves numbering the records in a batch c
Fail-safe
Centralized data processing
Batch control
Source lines of code (SLOC)
31. A fail-over process; in which all nodes run the same resource group (there can be no IP or MAC addresses in a concurrent resource group) and access the external storage concurrently
Concurrent access
Independent attitude
Decision support systems (DSS)
Internal control structure
32. The calendar can contain 'real' accounting periods and/or adjusting accounting periods. The 'real' accounting periods must not overlap; and cannot have any gaps between 'real' accounting periods. Adjusting accounting periods can overlap with other ac
Batch processing
Continuity
Indexed sequential access method (ISAM)
Adjusting period
33. The outward impression of being self-governing and free from conflict of interest and undue influence
Telecommunications
Utility software
Independent appearance
vulnerability
34. Interface between data terminal equipment and data communications equipment employing serial binary data interchange
Librarian
RS-232 interface
Reasonableness check
Value-added network (VAN)
35. Polymorphism refers to database structures that send the same command to different child objects that can produce different results depending on their family hierarchical tree structure.
BSP (business service provider)
Node
Electronic signature
Polymorphism (objects)
36. A software engineering technique whereby an existing application system code can be redesigned and coded using computer-aided software engineering (CASE) technology
Reverse engineering
Synchronous transmission
Numeric check
Redundancy check
37. A method of computer fraud involving a computer code that instructs the computer to remove small amounts of money from an authorized computer transaction by rounding down to the nearest whole value denomination and rerouting the rounded off amount to
Sampling risk
Internal control
Intrusive monitoring
Rounding down
38. The standard e-mail protocol on the Internet
Transaction
SMTP (Simple Mail Transport Protocol)
Monitoring policy
Detection risk
39. An automated function that can be operating system or application based in which electronic data being transmitted between storage areas are spooled or stored until the receiving device or storage area is prepared and able to receive the information.
Content filtering
Numeric check
Detection risk
Spool (simultaneous peripheral operations online)
40. A system of computers connected together by a communications network. Each computer processes its data and the network supports the system as a whole. Such a network enhances communication among the linked computers and allows access to shared files.
Distributed data processing network
File server
Local loop
Request for proposal (RFP)
41. A system development technique that enables users and developers to reach agreement on system requirements. Prototyping uses programmed simulation techniques to represent a model of the final system to the user for advisement and critique. The emphas
Prototyping
browser
Application security
Verification
42. (remote authentication dial-in user service)
Initial program load (IPL)
RADIUS
Audit responsibility
Exposure
43. The art of designing; analyzing and attacking cryptographic schemes
Monitor
Test generators
Cryptography
Wide area network (WAN)
44. A certificate identifying a public key to its subscriber; corresponding to a private key held by that subscriber. It is a unique code that typically is used to allow the authenticity and integrity of communicated data to be verified.
Compensating control
Digital certificate
Bypass label processing (BLP)
Detection risk
45. Purposefully hidden malicious or damaging code within an authorized computer program. Unlike viruses; they do not replicate themselves; but they can be just as destructive to a single computer.
Field
Finger
Computer-aided software engineering (CASE)
Trojan horse
46. The denial by one of the parties to a transaction or participation in all or part of that transaction or of the content of communications related to that transaction.
Feasibility study
HTTP (hyper text transfer protocol)
Repudiation
Compensating control
47. A special terminal used by computer operations personnel to control computer and systems operations functions. These terminals typically provide a high level of computer access and should be properly secured.
Technical infrastructure security
Operator console
Shell
Continuity
48. In an asymmetric cryptographic scheme; the key that may be widely published to enable the operation of the scheme
Public key
Parallel simulation
Fourth generation language (4GL)
Interest rate risk
49. A phase of an SDLC methodology where the affected user groups define the requirements of the system for meeting the defined needs
Access path
Security policy
TCP/IP protocol (Transmission Control Protocol/Internet Protocol)
Requirements definition
50. Control Objectives for Information and related Technology; the international set of IT control objectives published by ISACF;® 2000; 1998; 1996
Indexed sequential access method (ISAM)
Internet Engineering Task Force (IETF)
COBIT
Cluster controller