SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. It is composed of an insulated wire that runs through the middle of each cable; a second wire that surrounds the insulation of the inner wire like a sheath; and the outer insulation which wraps the second wire. Coaxial cable has a greater transmissio
Coaxial cable
Production programs
Structured Query Language (SQL)
Modem (modulator-demodulator)
2. An independent audit of the control structure of a service organization; such as a service bureau; with the objective of providing assurances to the users of the service organization that the internal control structure is adequate; effective and soun
War dialler
Third-party review
Budget hierarchy
Appearance
3. The risk to earnings or capital arising from an obligor's failure to meet the terms of any contract with the bank or otherwise to perform as agreed. Internet banking provides the opportunity for banks to expand their geographic range. Customers can r
Credit risk
price risk
Detailed IS ontrols
Capacity stress testing
4. Parallel simulation involves the IS auditor writing a program to replicate those application processes that are critical to an audit opinion and using this program to reprocess application system data. The results produced are compared with the resul
Parallel simulation
UDDI
Router
TCP (transmission control protocol)
5. A storage facility located away from the building housing the primary information processing facility (IPF); used for storage of computer media such as offline backup data and storage files
Test data
Offsite storage
Logon
Teleprocessing
6. Is the risk to earnings or capital arising from changes in the value of portfolios of financial instruments. Price risk arises from market making; dealing and position taking in interest rate; foreign exchange; equity and commodities markets. Banks m
price risk
X.500
Local loop
Source code
7. A file of semipermanent information that is used frequently for processing data or for more than one purpose
Broadband
Intrusion
Master file
Hierarchical database
8. A financial system that establishes the means for transferring money between suppliers and users of funds; ordinarily by exchanging debits or credits between banks or financial institutions.
Whitebox testing
Criteria
Payment system
Port
9. An implementation of DNS intended to secure responses provided by the server such that different responses are given to internal vs. external users
Business-to-consumer e-commerce (B2C)
Split DNS
Fraud risk
price risk
10. A program that translates programming language (source code) into machine executable instructions (object code)
Check digit
Remote job entry (RJE)
Signatures
Compiler
11. The password used to gain access when a system is first installed on a computer or network device. There is a large list published on the Internet and maintained at several locations. Failure to change these after the installation leaves the system v
Exception reports
Hypertext
Default password
Hub
12. The forms used to record data that have been captured. A source document may be a piece of paper; a turnaround document or an image displayed for online data input.
Database management system (DBMS)
Signatures
Hacker
Source documents
13. The area of the system that the intrusion detection system is meant to monitor and protect
Protection domain
Security software
Anonymity
Abend
14. A version of the Windows operating system that supports preemptive multitasking
Windows NT
Untrustworthy host
Performance indicators
Worm
15. A row or record consisting of a set of attribute value pairs (column or field) in a relational data structure
Decryption
Extensible Markup Language (XML)
Tuple
Operational risk
16. A form of modulation in which data signals are pulsed directly on the transmission medium without frequency division and usually utilize a transceiver. In baseband the entire bandwidth of the transmission medium (e.g.; coaxial cable) is utilized for
Baseband
Sequential file
Handprint scanner
Input controls
17. A private network that is configured within a public network. For years; common carriers have built VPNs that appear as private national or international networks to the customer; but physically share backbone trunks with other customers. VPNs enjoy
Scure socket layer (SSL)
Trusted processes
Virtual private network (VPN)
Penetration testing
18. The process of creating and managing duplicate versions of a database. Replication not only copies a database but also synchronizes a set of replicas so that changes made to one replica are reflected in all the others. The beauty of replication is th
Service user
Offline files
Database replication
ACK (acknowledgement)
19. A level of comfort short of a guarantee but considered adequate given the costs of the control and the likely benefits achieved
Broadband
Reasonable assurance
Penetration testing
Audit accountability
20. Members of the operations area that are responsible for the collection; logging and submission of input for the various user groups
SMTP (Simple Mail Transport Protocol)
Record; screen and report layouts
Control group
Magnetic card reader
21. Door and entry locks that are activated by such biometric features as voice; eye retina; fingerprint or signature
Biometric locks
Professional competence
Corrective controls
Operational audit
22. The main memory of the computer's central processing unit
Web page
Internal storage
Proxy server
Computer-assisted audit technique (CAATs)
23. A sampling technique that estimates the amount of overstatement in an account balance
Password cracker
Monetary unit sampling
Editing
Trusted processes
24. A trusted third party that serves authentication infrastructures or organizations and registers entities and issues them certificates
Certificate authority (CA)
Program flowcharts
System exit
Local loop
25. Error control deviations (compliance testing) or misstatements (substantive testing)
IPSec (Internet protocol security)
Error
Penetration testing
TCP/IP protocol (Transmission Control Protocol/Internet Protocol)
26. An integrated set of computer programs designed to serve a particular function that has specific input; processing and output activities (e.g.; general ledger; manufacturing resource planning; human resource management)
Tape management system (TMS)
Benchmark
Bridge
Application system
27. A hierarchical database that is distributed across the Internet that allows names to be resolved into IP addresses (and vice versa) to locate services such as web and e-mail servers
Trusted systems
Offsite storage
DNS (domain name system)
Audit risk
28. The central database that stores and organizes data
TACACS+ (terminal access controller access control system plus)
TCP/IP protocol (Transmission Control Protocol/Internet Protocol)
Information engineering
Repository
29. A mathematical expression used to calculate budget amounts based on actual results; other budget amounts and statistics. With budget formulas; budgets using complex equations; calculations and allocations can be automatically created.
Field
Optical scanner
Message switching
Budget formula
30. Editing ensures that data conform to predetermined criteria and enable early identification of potential errors.
Editing
E-mail/interpersonal messaging
Residual risk
Fail-safe
31. A phase of an SDLC methodology that researches the feasibility and adequacy of resources for the development or acquisition of a system solution to a user need
Control Objectives for Enterprise Governance
Downloading
Feasibility study
Uploading
32. A discussion document which sets out an ''Enterprise Governance Model'' focusing strongly on both the enterprise business goals and the information technology enablers which facilitate good enterprise governance; published by the Information Systems
Audit plan
vulnerability
ICMP (internet control message protocol)
Control Objectives for Enterprise Governance
33. Program narratives provide a detailed explanation of program flowcharts; including control points and any external input.
Transaction
Content filtering
Program narratives
Value-added network (VAN)
34. Asoftware testing technique whereby the internal workings of the item being tested are not known by the tester. For example - in a black box test on a software design the tester only knows the inputs and what the expected outcomes should be and not h
Blackbox testing
Fail-over
Object orientation
Test generators
35. A manual or automated log of all updates to data files and databases
Image processing
Transaction log
Exposure
Top-level management
36. A system development technique that enables users and developers to reach agreement on system requirements. Prototyping uses programmed simulation techniques to represent a model of the final system to the user for advisement and critique. The emphas
Standing data
Prototyping
Systems development life cycle (SDLC)
Universal Description; Discovery and Integration (UDDI)
37. A visible trail of evidence enabling one to trace information contained in statements or reports back to the original input source
Audit trail
System testing
Passive response
L2F (Layer 2 forwarding)
38. The processing of a group of transactions at the same time. Transactions are collected and processed against the master files at a specified time.
Manual journal entry
Completeness check
Batch processing
Dial-back
39. Compares data to predefined reasonability limits or occurrence rates established for the data.
Online data processing
Local area network (LAN)
Reasonableness check
Application system
40. The person responsible for implementing; monitoring and enforcing security rules established and authorized by management
Service bureau
Security administrator
Dial-back
Feasibility study
41. Tests of specified amount fields against stipulated high or low limits of acceptability. When both high and low values are used; the test may be called a range check.
System flowcharts
Application layer
Limit check
Structured Query Language (SQL)
42. Used to electronically input; read and interpret information directly from a source document; requires the source document to have specially-coded magnetic ink typeset
Magnetic ink character recognition (MICR)
Latency
Demodulation
System narratives
43. A security technique that verifies an individual's identity by analyzing a unique physical attribute; such as a handprint
Biometrics
Fail-safe
X.500
Fourth generation language (4GL)
44. The range between the highest and lowest transmittable frequencies. It equates to the transmission capacity of an electronic line and is expressed in bytes per second or Hertz (cycles per second).
Standing data
Bandwidth
TACACS+ (terminal access controller access control system plus)
Rotating standby
45. A connection-based Internet protocol that supports reliable data transfer connections. Packet data is verified using checksums and retransmitted if it is missing or corrupted. The application plays no part in validating the transfer.
Token
Control risk self-assessment
Privilege
TCP (transmission control protocol)
46. A platform-independent XML-based formatted protocol enabling applications to communicate with each other over the Internet. Use of this protocol may provide a significant security risk to web application operations; since use of SOAP piggybacks onto
ISP (Internet service provider)
Systems analysis
Simple Object Access Protocol (SOAP)
BSP (business service provider)
47. Checks that data are entered correctly
Verification
Abend
Software
Terms of reference
48. A transmission signal that varies continuously in amplitude and time and is generated in wave formation. Analog signals are used in telecommunications.
Analog
Incremental testing
Redundancy check
Cryptography
49. A biometric device that is used to authenticate a user through palm scans
Handprint scanner
TCP (transmission control protocol)
Sniffing
Antivirus software
50. In vulnerability analysis; gaining information by performing standard system status queries and inspecting system attributes
Privilege
Allocation entry
Non-intrusive monitoring
Test generators