SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A device for sending and receiving computerized data over transmission lines
Parity check
Man-in-the-middle attack
Mapping
Terminal
2. A mathematical expression used to calculate budget amounts based on actual results; other budget amounts and statistics. With budget formulas; budgets using complex equations; calculations and allocations can be automatically created.
Security management
Password
Budget formula
Run-to-run totals
3. A certificate issued by one certification authority to a second certification authority so that users of the first certification authority are able to obtain the public key of the second certification authority and verify the certificates it has crea
Internet
Accountability
Intrusion
Cross-certification
4. The process of creating and managing duplicate versions of a database. Replication not only copies a database but also synchronizes a set of replicas so that changes made to one replica are reflected in all the others. The beauty of replication is th
Promiscuous mode
Database replication
Control section
Internet
5. A device that forms a barrier between a secure and an open environment. Usually; the open environment is considered hostile. The most notable hostile environment is the Internet. In other words; a firewall enforces a boundary between two or more netw
Rootkit
Firewall
Point-of-presence (POP)
Record; screen and report layouts
6. Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes
X.25 interface
Data leakage
Authorization
Appearance
7. The router at the extreme edge of the network under control; usually connected to an ISP or other service provider; also known as border router
Application proxy
HTTPS (hyper text transfer protocol secure)
Proxy server
External router
8. A device that is used to authenticate a user; typically in addition to a username and password. It is usually a credit card-sized device that displays a pseudo random number that changes every few minutes.
Operational audit
Token
Hot site
Recovery testing
9. The outward impression of being self-governing and free from conflict of interest and undue influence
Independent appearance
UDP (User Datagram Protocol)
Checkpoint restart procedures
Electronic signature
10. A piece of information; in a digitized form; used by an encryption algorithm to convert the plaintext to the ciphertext
Useful audit evidence
Verification
Encryption key
Objectivity
11. A resource whose loss will result in the loss of service or production
System exit
Inheritance (objects)
Buffer
Single point of failure
12. Attackers that penetrate systems by using user identifiers and passwords taken from legitimate users
Datagram
Masqueraders
UDP (User Datagram Protocol)
Control group
13. A hierarchical database that is distributed across the Internet that allows names to be resolved into IP addresses (and vice versa) to locate services such as web and e-mail servers
Ethernet
Appearance
DNS (domain name system)
Filtering router
14. Specifies the length of the file's record and the sequence and size of its fields. A file layout also will specify the type of data contained within each field. For example; alphanumeric; zoned decimal; packed and binary are types of data.
File layout
Automated teller machine (ATM)
Rotating standby
Asynchronous transmission
15. An entity that may be given responsibility for performing some of the administrative tasks necessary in the registration of subjects; such as confirming the subject's identity; validating that the subject is entitled to have the attributes requested
Point-of-presence (POP)
Hub
Registration authority (RA)
Budget formula
16. Generally; the assumption that an entity will behave substantially as expected. Trust may apply only for a specific function. The key role of this term in an authentication framework is to describe the relationship between an authenticating entity an
Judgment sampling
Trust
Passive assault
Distributed data processing network
17. The computer's primary working memory. Each byte of memory can be accessed randomly regardless of adjacent bytes.
Dial-back
Random access memory (RAM)
Continuous auditing approach
Logon
18. An individual who attempts to gain unauthorized access to a computer system
Addressing
Operational audit
Object code
Hacker
19. Any automated audit technique; such as generalized audit software; test data generators; computerized audit programs and specialized audit utilities
Online data processing
Computer-assisted audit technique (CAATs)
Procedure
Program evaluation and review technique (PERT)
20. Programmed checking of data validity in accordance with predetermined criteria
Central processing unit (CPU)
Validity check
Internet Engineering Task Force (IETF)
ACK (acknowledgement)
21. Connects a terminal or computer to a communications network via a telephone line. Modems turn digital pulses from the computer into frequencies within the audio range of the telephone system. When acting in the receiver capacity; a modem decodes inco
Hacker
Exposure
Field
Modem (modulator-demodulator)
22. A protocol used for transmitting data between two ends of a connection
Anomaly
PPP (point-to-point protocol)
Terminal
Data integrity
23. A testing technique that is used to test program logic within a particular program or module. The purpose of the test is to ensure that the program meets system development guidelines and does not abnormally end during processing.
Unit testing
Tape management system (TMS)
Privacy
Spanning port
24. An exchange rate; which can be used optionally to perform foreign currency conversion. The corporate exchange rate is generally a standard market rate determined by senior financial management for use throughout the organization.
ASCII (American Standard Code for Information Interchange)
Incremental testing
Corporate exchange rate
Consumer
25. A high level description of the audit work to be performed in a certain period of time (ordinarily a year). It includes the areas to be audited; the type of work planned; the high level objectives and scope of the work; and topics such as budget; res
Trap door
RADIUS
Audit plan
Worm
26. The transfer of data between separate computer processing sites/devices using telephone lines; microwave and/or satellite links
Business risk
Control group
Data communications
Capacity stress testing
27. A method of user authentication. Challenge response authentication is carried out through use of the Challenge Handshake Authentication Protocol (CHAP). When a user tries to log into the server; the server sends the user a ''challenge;'' which is a r
Console log
IDS (intrusion detection system)
Split DNS
Challenge/response token
28. A system that authentically distributes users' public keys using certificates
Dry-pipe fire extinguisher system
Public key infrastructure
Administrative controls
Partitioned file
29. Computer programs provided by a computer hardware manufacturer or software vendor and used in running the system. This technique can be used to examine processing activities; to test programs; system activities and operational procedures; to evaluate
Structured programming
Utility software
Access rights
Dry-pipe fire extinguisher system
30. An interface point between the CPU and a peripheral device
Internal control
Hierarchical database
Port
Trojan horse
31. A flag set in a packet to indicate to the sender that the previous packet sent was accepted correctly by the receiver without errors; or that the receiver is now ready to accept a transmission
Bus topology
ACK (acknowledgement)
DMZ (demilitarized zone)
Job control language (JCL)
32. A system of interconnected computers and the communications equipment used to connect them
Subject matter (Area of activity)
FTP (file transfer protocol)
Network
Masking
33. Point-of-sale systems enable capture of data at the time and place of transaction. POS terminals may include use of optical scanners for use with bar codes or magnetic card readers for use with credit cards. POS systems may be online to a central com
Teleprocessing
Decryption
Single point of failure
Point-of-sale systems (POS)
34. An abnormal end to a computer job; termination of a task prior to its completion because of an error condition that cannot be resolved by recovery facilities while the task is executing
Masking
Abend
Static analysis
Segregation/separation of duties
35. An audit designed to evaluate the various internal controls; economy and efficiency of a function or department
Screening routers
Operational audit
Permanent virtual circuit (PVC)
Concurrent access
36. The process of feeding test data into two systems; the modified system and an alternative system (possibly the original system) and comparing results
Parallel testing
Internet Inter-ORB Protocol (IIOP)
Application controls
Subject matter (Area of activity)
37. Performance measurement of service delivery including cost; timeliness and quality against agreed service levels
External router
Electronic cash
Audit accountability
legal risk
38. A proxy service that connects programs running on internal networks to services on exterior networks by creating two connections; one from the requesting client and another to the destination service
Numeric check
Application proxy
Procedure
Feasibility study
39. A phase of an SDLC methodology where the affected user groups define the requirements of the system for meeting the defined needs
Tape management system (TMS)
Public key
Requirements definition
External router
40. The risk that activities will include deliberate circumvention of controls with the intent to conceal the perpetuation of irregularities. The unauthorized use of assets or services and abetting or helping to conceal.
Finger
Residual risk
Fraud risk
Trojan horse
41. Is present when a financial asset or liability is denominated in a foreign currency or is funded by borrowings in another currency
Extensible Markup Language (XML)
System software
Token
Foreign exchange risk
42. In open systems architecture; circular routing is the logical path of a message in a communications network based on a series of gates at the physical network layer in the open systems interconnection (OSI) model.
Record; screen and report layouts
Request for proposal (RFP)
Virtual private network (VPN)
Circular routing
43. The process of electronically sending computerized information from one computer to another computer. Most often; the transfer is from a smaller computer to a larger one.
Segregation/separation of duties
Uploading
Firewall
Internal control
44. A sampling technique that estimates the amount of overstatement in an account balance
Downloading
Masqueraders
Random access memory (RAM)
Monetary unit sampling
45. A viewable screen displaying information; presented through a web browser in a single view sometimes requiring the user to scroll to review the entire page. A bank web page may display the bank's logo; provide information about bank products and serv
Web page
Internal control
Test data
Completeness check
46. An evaluation of an application system under development which considers matters such as: appropriate controls are designed into the system; the application will process information in a complete; accurate and reliable manner; the application will fu
Test generators
Biometrics
Hash total
Application development review
47. Correctness checks built into data processing systems and applied to batches of input data; particularly in the data preparation stage. There are two main forms of batch controls: 1) sequence control; which involves numbering the records in a batch c
Batch control
Uninterruptible power supply (UPS)
Digital certification
Output analyzer
48. Controlling access to a network by analyzing the contents of the incoming and outgoing packets and either letting them pass or denying them based on a list of rules. Differs from packet filtering in that it is the data in the packet that are analyzed
Intelligent terminal
Buffer
Content filtering
Packet
49. A communications channel over which data can be sent and received simultaneously
Bandwidth
Access path
Full duplex
Threat
50. The current and prospective effect on earnings and capital arising from negative public opinion. This affects the bank's ability to establish new relationships or services or continue servicing existing relationships. Reputation risk may expose the b
Reputational risk
Program evaluation and review technique (PERT)
Teleprocessing
Residual risk