Test your basic knowledge |

CISA Certified Information Systems Auditor Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A process used to identify and evaluate risks and their potential effects






2. Processing is achieved by entering information into the computer via a video display terminal. The computer immediately accepts or rejects the information; as it is entered.






3. Is the risk to earnings or capital arising from changes in the value of portfolios of financial instruments. Price risk arises from market making; dealing and position taking in interest rate; foreign exchange; equity and commodities markets. Banks m






4. Asoftware testing technique whereby the internal workings of the item being tested are not known by the tester. For example - in a black box test on a software design the tester only knows the inputs and what the expected outcomes should be and not h






5. A system's level of resilience to seamlessly react from hardware and/or software failure






6. A system software tool that logs; monitors and directs computer tape usage






7. A fully operational offsite data processing facility equipped with both hardware and system software to be used in the event of a disaster






8. It is composed of an insulated wire that runs through the middle of each cable; a second wire that surrounds the insulation of the inner wire like a sheath; and the outer insulation which wraps the second wire. Coaxial cable has a greater transmissio






9. A set of protocols developed by the IETF to support the secure exchange of packets






10. Analysis of the security state of a system or its compromise on the basis of information collected at intervals






11. Weaknesses in systems that can be exploited in ways that violate security policy






12. The total of any numeric data field on a document or computer file. This total is checked against a control total of the same field to facilitate accuracy of processing.






13. A protocol for packet-switching networks






14. Machine-readable instructions produced from a compiler or assembler program that has accepted and translated the source code






15. An interface point between the CPU and a peripheral device






16. A report on Internal Control--An Integrated Framework sponsored by the Committee of Sponsoring Organizations of the Treadway Commission in 1992. It provides guidance and a comprehensive framework of internal control for all organizations.'






17. A 24-hour; stand-alone mini-bank; located outside branch bank offices or in public places like shopping malls. Through ATMs; clients can make deposits; withdrawals; account inquiries and transfers. Typically; the ATM network is comprised of two spher






18. An interactive system that provides the user with easy access to decision models and data; to support semistructured decision-making tasks






19. A program that translates programming language (source code) into machine executable instructions (object code)






20. Range checks ensure that data fall within a predetermined range (also see limit checks).






21. A computer program that enables the user to retrieve information that has been made publicly available on the Internet; also; that permits multimedia (graphics) applications on the World Wide Web






22. Self-governance and freedom from conflict of interest and undue influence. The IS auditor should be free to make his/her own decisions; not influenced by the organization being audited and its people (managers and employers).






23. A web-based version of the traditional phone book's yellow and white pages enabling businesses to be publicly listed in promoting greater e-commerce activities.






24. The elimination of redundant data






25. A card reader that reads cards with a magnetizable surface on which data can be stored and retrieved






26. The ability of end users to design and implement their own information system utilizing computer software products






27. Applications that detect; prevent and possibly remove all known viruses from files located in a microcomputer hard drive






28. Character-at-a-time transmission






29. In open systems architecture; circular routing is the logical path of a message in a communications network based on a series of gates at the physical network layer in the open systems interconnection (OSI) model.






30. The objectives of management that are used as the framework for developing and implementing controls (control procedures).






31. Performance measurement of service delivery including cost; timeliness and quality against agreed service levels






32. A system of interconnected computers and the communications equipment used to connect them






33. Individuals; normally managers or directors; who have responsibility for the integrity; accurate reporting and use of computerized data






34. An approach used to plan; design; develop; test and implement an application system or a major modification to an application system. Typical phases include the feasibility study; requirements study; requirements definition; detailed design; programm






35. A warm-site is similar to a hot-site; however; it is not fully equipped with all necessary hardware needed for recovery.






36. An interface between data terminal equipment (DTE) and data circuit-terminating equipment (DCE) for terminals operating in the packet mode on some public data networks






37. A computer file storage format in which one record follows another. Records can be accessed sequentially only. It is required with magnetic tape.






38. A device that forms a barrier between a secure and an open environment. Usually; the open environment is considered hostile. The most notable hostile environment is the Internet. In other words; a firewall enforces a boundary between two or more netw






39. A computer program or series of programs designed to perform certain automated functions. These functions include reading computer files; selecting data; manipulating data; sorting data; summarizing data; performing calculations; selecting samples an






40. A piece of information; in a digitized form; used by an encryption algorithm to convert the plaintext to the ciphertext






41. Computer file storage media not physically connected to the computer; typically tapes or tape cartridges used for backup purposes






42. System flowcharts are graphical representations of the sequence of operations in an information system or program. Information system flowcharts show how data from source documents flow through the computer to final distribution to users. Symbols use






43. An evaluation of an application system being acquired or evaluated; which considers such matters as: appropriate controls are designed into the system; the application will process information in a complete; accurate and reliable manner; the applicat






44. A mathematical key (kept secret by the holder) used to create digital signatures and; depending upon the algorithm; to decrypt messages or files encrypted (for confidentiality) with the corresponding public key






45. Recovery strategy that involves two active sites; each capable of taking over the other's workload in the event of a disaster. Each site will have enough idle processing power to restore data from the other site and to accommodate the excess workload






46. These controls exist to detect and report when errors; omissions and unauthorized uses or entries occur.






47. Expert systems are the most prevalent type of computer systems that arise from the research of artificial intelligence. An expert system has a built in hierarchy of rules; which are acquired from human experts in the appropriate field. Once input is






48. 1) The process of establishing and maintaining security in a computer or network system. The stages of this process include prevention of security problems; detection of intrusions; investigation of intrusions and resolution.2) In network management;






49. The area of the central processing unit (CPU) that executes software; allocates internal memory and transfers operations between the arithmetic-logic; internal storage and output sections of the computer






50. Control Objectives for Information and related Technology; the international set of IT control objectives published by ISACF;® 2000; 1998; 1996