Test your basic knowledge |

CISA Certified Information Systems Auditor Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A computerized technique of blocking out the display of sensitive information; such as passwords; on a computer terminal or report






2. 1) The process of establishing and maintaining security in a computer or network system. The stages of this process include prevention of security problems; detection of intrusions; investigation of intrusions and resolution.2) In network management;






3. A third party that provides organizations with a variety of Internet; and Internet-related services






4. The act of verifying the identity of a system entity (e.g.; a user; a system; a network node) and the entity's eligibility to access computerized information. Designed to protect against fraudulent logon activity. Authentication can also refer to the






5. An attack using packets with the spoofed source Internet packet (IP) addresses. This technique exploits applications that use authentication based on IP addresses. This technique also may enable an unauthorized user to gain root access on the target






6. A structure of relationships and processes to direct and control the enterprise in order to achieve the enterprise's goals by adding value while balancing risk versus return over IT and its processes






7. A database structured in a tree/root or parent/child relationship. Each parent can have many children; but each child may have only one parent.






8. A system of computers connected together by a communications network. Each computer processes its data and the network supports the system as a whole. Such a network enhances communication among the linked computers and allows access to shared files.






9. The physical layout of how computers are linked together. Examples include ring; star and bus.






10. A language; which enables electronic documents that present information that can be connected together by links instead of being presented sequentially; as is the case with normal text.






11. A form of modulation in which data signals are pulsed directly on the transmission medium without frequency division and usually utilize a transceiver. In baseband the entire bandwidth of the transmission medium (e.g.; coaxial cable) is utilized for






12. Polymorphism refers to database structures that send the same command to different child objects that can produce different results depending on their family hierarchical tree structure.






13. A language used to control run routines in connection with performing tasks on a computer






14. Analysis of information that occurs on a noncontinuous basis; also known as interval-based analysis






15. Individuals and departments responsible for the storage and safeguarding of computerized information. This typically is within the IS organization.






16. An individual or department responsible for the security and information classification of the shared data stored on a database system. This responsibility includes the design; definition and maintenance of the database.






17. The use of alphabetic characters or an alphabetic character string






18. An organized assembly of resources and procedures required to collect; process and distribute data for use in decision making






19. Techniques and procedures used to verify; validate and edit data; to ensure that only correct data are entered into the computer






20. The potential loss to an area due to the occurrence of an adverse event






21. Software used to administer logical security. It usually includes authentication of users; access granting according to predefined rules; monitoring and reporting functions.






22. A project management technique used in the planning and control of system projects






23. An interface point between the CPU and a peripheral device






24. Systems that employ sufficient hardware and software assurance measures to allow their use for processing of a range of sensitive or classified information






25. The ability to exercise judgement; express opinions and present recommendations with impartiality






26. Comparing the system's performance to other equivalent systems using well defined benchmarks






27. An implementation of DNS intended to secure responses provided by the server such that different responses are given to internal vs. external users






28. The transmission of job control language (JCL) and batches of transactions from a remote terminal location






29. Any intentional violation of the security policy of a system






30. These controls are designed to correct errors; omissions and unauthorized uses and intrusions; once they are detected.






31. English-like; user friendly; nonprocedural computer languages used to program and/or read and process computer files






32. A multiuser; multitasking operating system that is used widely as the master control program in workstations and especially servers






33. A piece of information; a digitized form of signature; that provides sender authenticity; message integrity and nonrepudiation. A digital signature is generated using the sender's private key or applying a one-way hash function.






34. Source lines of code are often used in deriving single-point software-size estimations.






35. Unusual or statistically rare






36. Expert or decision support systems that can be used to assist IS auditors in the decision-making process by automating the knowledge of experts in the field. This technique includes automated risk analysis; systems software and control objectives sof






37. (remote authentication dial-in user service)






38. The logical route an end user takes to access computerized information. Typically; it includes a route through the operating system; telecommunications software; selected application software and the access control system.






39. A computer network connecting different remote locations that may range from short distances; such as a floor or building; to extremely long transmissions that encompass a large region or several countries






40. Performance measurement of service delivery including cost; timeliness and quality against agreed service levels






41. A certificate issued by one certification authority to a second certification authority so that users of the first certification authority are able to obtain the public key of the second certification authority and verify the certificates it has crea






42. The communication lines that provide connectivity between the telecommunications carrier's central office and the subscriber's facilities






43. The possibility of an act or event occurring that would have an adverse effect on the organization and its information systems






44. The current and prospective risk to earnings and capital arising from fraud; error and the inability to deliver products or services; maintain a competitive position and manage information. Security risk is evident in each product and service offered






45. The initialization procedure that causes an operating system to be loaded into storage at the beginning of a workday or after a system malfunction






46. A protocol developed by the object management group (OMG) to implement Common Object Request Broker Architecture (CORBA) solutions over the World Wide Web. CORBA enables modules of network-based programs to communicate with one another. These modules






47. Detects transmission errors by appending calculated bits onto the end of each segment of data






48. Also known as traditional development; it is a very procedure-focused development cycle with formal sign-off at the completion of each level.






49. The transfer of data between separate computer processing sites/devices using telephone lines; microwave and/or satellite links






50. An individual data element in a computer record. Examples include employee name; customer address; account number; product unit price and product quantity in stock.