Test your basic knowledge |

CISA Certified Information Systems Auditor Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A system of interconnected computers and the communications equipment used to connect them






2. Programs that are used to process live or actual data that were received as input into the production environment.






3. Patterns indicating misuse of a system






4. Those controls that seek to maintain confidentiality; integrity and availability of information






5. An extension to PPP to facilitate the creation of VPNs. L2TP merges the best features of PPTP (from Microsoft) and L2F (from Cisco).






6. The policies; procedures; organizational structure and electronic access controls designed to restrict access to computer software and data files






7. A computer program or set of programs that perform the processing of records for a specific function






8. Provides short-term backup power from batteries for a computer system when the electrical power fails or drops to an unacceptable voltage level






9. A protocol for accessing a secure web server; whereby all data transferred is encrypted






10. The code used to designate the location of a specific piece of data within computer storage






11. A set of routines; protocols and tools referred to as ''building blocks'' used in business application software development. A good API makes it easier to develop a program by providing all the building blocks related to functional characteristics of






12. The Committee on the Financial Aspects of Corporate Governance; set up in May 1991 by the UK Financial Reporting Council; the London Stock Exchange and the UK accountancy profession; was chaired by Sir Adrian Cadbury and produced a report on the subj






13. Refers to the processes by which organisations conduct business electronically with their customers and or public at large using the Internet as the enabling technology.






14. Transactions that cannot be denied after the fact






15. An assault on a service from a single source that floods it with so many requests that it becomes overwhelmed and is either stopped completely or operates at a significantly reduced rate






16. A utility program that combines several separately compiled modules into one; resolving internal references between them






17. An ASP that also provides outsourcing of business processes such as payment processing; sales order processing and application development






18. The computer's primary working memory. Each byte of memory can be accessed randomly regardless of adjacent bytes.






19. Programs that are tested and evaluated before approval into the production environment. Test programs; through a series of change control moves; migrate from the test environment to the production environment and become production programs.






20. A data dictionary is a database that contains the name; type; range of values; source and authorization for access for each data element in a database. It also indicates which application programs use that data so that when a data structure is contem






21. An independent audit of the control structure of a service organization; such as a service bureau; with the objective of providing assurances to the users of the service organization that the internal control structure is adequate; effective and soun






22. The roles; scope and objectives documented in the service level agreement between management and audit






23. A process used to identify and evaluate risks and their potential effects






24. Controls over the business processes that are supported by the ERP






25. A transmission signal that varies continuously in amplitude and time and is generated in wave formation. Analog signals are used in telecommunications.






26. Filters out electrical surges and spikes






27. The purpose is to provide usable data rather than a function. The focus of the development is to provide ad hoc reporting for users by developing a suitable accessible database of information.






28. A file format in which records are organized and can be accessed; according to a preestablished key that is part of the record






29. Software used to create data to be used in the testing of computer programs






30. Interface between data terminal equipment and data communications equipment employing serial binary data interchange






31. The use of alphabetic characters or an alphabetic character string






32. Any information collection mechanism utilized by an intrusion detection system






33. Generally; the assumption that an entity will behave substantially as expected. Trust may apply only for a specific function. The key role of this term in an authentication framework is to describe the relationship between an authenticating entity an






34. Unusual or statistically rare






35. Simulated transactions that can be used to test processing logic; computations and controls actually programmed in computer applications. Individual programs or an entire system can be tested. This technique includes Integrated Test Facilities (ITFs)






36. The area of the central processing unit (CPU) that executes software; allocates internal memory and transfers operations between the arithmetic-logic; internal storage and output sections of the computer






37. A sampling technique used to estimate the average or total value of a population based on a sample; a statistical model used to project a quantitative characteristic; such as a dollar amount






38. Any situation or event that has the potential to harm a system






39. Is the risk to earnings or capital arising from changes in the value of portfolios of financial instruments. Price risk arises from market making; dealing and position taking in interest rate; foreign exchange; equity and commodities markets. Banks m






40. A certificate issued by one certification authority to a second certification authority so that users of the first certification authority are able to obtain the public key of the second certification authority and verify the certificates it has crea






41. A mathematical expression used to calculate budget amounts based on actual results; other budget amounts and statistics. With budget formulas; budgets using complex equations; calculations and allocations can be automatically created.






42. Source code is the language in which a program is written. Source code is translated into object code by assemblers and compilers. In some cases; source code may be converted automatically into another language by a conversion program. Source code is






43. The transmission of more than one signal across a physical channel






44. Is the risk to earnings or capital arising from a bank's inability to meet its obligations when they come due; without incurring unacceptable losses. Internet banking may increase deposit volatility from customers who maintain accounts solely on the






45. A form of attribute sampling that is used to determine a specified probability of finding at least one example of an occurrence (attribute) in a population






46. A type of service providing an authentication and accounting system often used for dial-up and remote access security






47. Group of people responsible for a project; whose terms of reference may include the development; acquisition; implementation or maintenance of an application system. The team members may include line management; operational line staff; external contr






48. The total of any numeric data field on a document or computer file. This total is checked against a control total of the same field to facilitate accuracy of processing.






49. A document that confirms the client's and the IS auditor's acceptance of a review assignment






50. A computer file storage format in which one record follows another. Records can be accessed sequentially only. It is required with magnetic tape.