Test your basic knowledge |

CISA Certified Information Systems Auditor Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A document that has been approved by the IETF becomes an RFC and is assigned a unique number once published. If it gains enough interest; it may evolve into an Internet standard.






2. An attack strategy in which the attacker intercepts the communications stream between two parts of the victim system and then replaces the traffic between the two components with the intruder's own; eventually assuming control of the communication






3. The process of taking an unencrypted message (plaintext); applying a mathematical function to it (encryption algorithm with a key) and producing an encrypted message (ciphertext)






4. A proxy service that connects programs running on internal networks to services on exterior networks by creating two connections; one from the requesting client and another to the destination service






5. Used to electronically scan and input written information from a source document






6. Used to enable remote access to a server computer. Commands typed are run on the remote server.






7. An electronic form functionally equivalent to cash in order to make and receive payments in cyberbanking






8. Also called permissions or privileges; these are the rights granted to users by the administrator or supervisor. Access rights determine the actions users can perform (e.g.; read; write; execute; create and delete) on files in shared volumes or file






9. The process of determining what types of activities are permitted. Ordinarily; authorisation is in the context of authentication: once you have authenticated a user; he/she may be authorised to perform different types of access or activity






10. Disconnecting from the computer






11. An automated detail report of computer system activity






12. Also known as ''automated remote journaling of redo logs.'' A data recovery strategy that is similar to electronic vaulting; except that instead of transmitting several transaction batches daily; the archive logs are shipped as they are created.'






13. Is present when a financial asset or liability is denominated in a foreign currency or is funded by borrowings in another currency






14. A type of local area network (LAN) architecture in which each station is directly attached to a common communication channel. Signals transmitted over the channel take the form of messages. As each message passes along the channel; each station recei






15. The possibility of an act or event occurring that would have an adverse effect on the organization and its information systems






16. Special system software features and utilities that allow the user to perform complex system maintenance. Use of these exits often permits the user to operate outside of the security access control system.






17. The consolidation in 1998 of the ''Cadbury;'' ''Greenbury'' and ''Hampel'' Reports. Named after the Committee Chairs; these reports were sponsored by the UK Financial Reporting Council; the London Stock Exchange; the Confederation of British Industry






18. A communications terminal control hardware unit that controls a number of computer terminals. All messages are buffered by the controller and then transmitted to the receiver.






19. A discussion document which sets out an ''Enterprise Governance Model'' focusing strongly on both the enterprise business goals and the information technology enablers which facilitate good enterprise governance; published by the Information Systems






20. A low-level computer programming language which uses symbolic code and produces machine instructions






21. Files; equipment; data and procedures available for use in the event of a failure or loss; if the originals are destroyed or out of service






22. Any yearly accounting period without regard to its relationship to a calendar year.






23. A high-capacity disk storage device or a computer that stores data centrally for network users and manages access to that data. File servers can be dedicated so that no process other than network management can be executed while the network is availa






24. Systems for which detailed specifications of their components composition are published in a nonproprietary environment; thereby enabling competing organizations to use these standard components to build competitive systems. The advantages of using o






25. The practice of eavesdropping on information being transmitted over telecommunications links






26. An exchange rate; which can be used optionally to perform foreign currency conversion. The corporate exchange rate is generally a standard market rate determined by senior financial management for use throughout the organization.






27. A device for sending and receiving computerized data over transmission lines






28. Processes certified as supporting a security goal






29. A third party that delivers and manages applications and computer services; including security services to multiple users via the Internet or a private network






30. Is the risk to earnings or capital arising from violations of; or nonconformance with; laws; rules; regulations; prescribed practices or ethical standards. Banks are subject to various forms of legal risk. This can include the risk that assets will t






31. Programs that are used to process live or actual data that were received as input into the production environment.






32. A type of service providing an authentication and accounting system often used for dial-up and remote access security






33. Source lines of code are often used in deriving single-point software-size estimations.






34. A computer program or set of programs that perform the processing of records for a specific function






35. The systems development phase in which systems specifications and conceptual designs are developed; based on end-user needs and requirements






36. An input device that reads characters and images that are printed or painted on a paper form into the computer.






37. The rules by which a network operates and controls the flow and priority of transmissions






38. A communication network that serves several users within a specified geographic area. It is made up of servers; workstations; a network operating system and a communications link. Personal computer LANs function as distributed processing systems in w






39. A utility program that combines several separately compiled modules into one; resolving internal references between them






40. In open systems architecture; circular routing is the logical path of a message in a communications network based on a series of gates at the physical network layer in the open systems interconnection (OSI) model.






41. Audit evidence is relevant if it pertains to the audit objectives and has a logical relationship to the findings and conclusions it is used to support.






42. The proportion of known attacks detected by an intrusion detection system






43. Used in data encryption; it uses a secret key to encrypt the plaintext to the ciphertext. It also uses the same key to decrypt the ciphertext to the corresponding plaintext. In this case; the key is symmetric such that the encryption key is equivalen






44. Machine-readable instructions produced from a compiler or assembler program that has accepted and translated the source code






45. The central database that stores and organizes data






46. An empowering method/process by which management and staff of all levels collectively identify and evaluate IS related risks and controls under the guidance of a facilitator who could be an IS auditor. The IS auditor can utilise CRSA for gathering re






47. A protocol for accessing a secure web server; whereby all data transferred is encrypted






48. A procedure designed to ensure that no fields are missing from a record






49. An auditing concept regarding the importance of an item of information with regard to its impact or effect on the functioning of the entity being audited. An expression of the relative significance or importance of a particular matter in the context






50. The elimination of redundant data