SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A set of communications protocols that encompasses media access; packet transport; session communications; file transfer; electronic mail; terminal emulation; remote file access and network management. TCP/IP provides the basis for the Internet.
Monitoring policy
Image processing
TCP/IP protocol (Transmission Control Protocol/Internet Protocol)
Spoofing
2. A response option in intrusion detection in which the system simply reports and records the problem detected; relying on the user to take subsequent action
Middleware
Structured Query Language (SQL)
Passive response
Spool (simultaneous peripheral operations online)
3. A private network that uses the infrastructure and standards of the Internet and World Wide Web; but is isolated from the public Internet by firewall barriers.
Default deny policy
Reasonableness check
Intranet
Source lines of code (SLOC)
4. A software suite designed to aid an intruder in gaining unauthorized administrative access to a computer system
Rootkit
Abend
Vulnerability analysis
Credit risk
5. Audit evidence is reliable if; in the IS auditor's opinion; it is valid; factual; objective and supportable.
Inheritance (objects)
Security perimeter
Reliable audit evidence
Uninterruptible power supply (UPS)
6. A type of LAN architecture that utilizes a central controller to which all nodes are directly connected. All transmissions from one station to another pass through the central controller; which is responsible for managing and controlling all communic
Ciphertext
Reputational risk
Star topology
Data security
7. General controls which are designed to manage and monitor the IS environment and which; therefore; affect all IS-related activities
Port
Trusted systems
Application layer
Pervasive IS controls
8. Availability relates to information being available when required by the business process now and in the future. It also concerns the safeguarding of necessary resources and associated capabilities.
IT governance
Posting
Application programming interface (API)
Availability
9. In vulnerability analysis; passive monitoring approaches in which passwords or other access credentials are required. This sort of check usually involves accessing a system data object.
Verification
Record
Credentialed analysis
Applet
10. The rate of transmission for telecommunication data. It is expressed in bits per second (bps).
Auditability
Transaction protection
Hub
Baud rate
11. ATM is a high-bandwidth low-delay switching and multiplexing technology. It is a data link layer protocol. This means that it is a protocol-independent transport mechanism. ATM allows integration of real-time voice and video as well as data. ATM allo
General computer controls
Asynchronous Transfer Mode (ATM)
Judgment sampling
Public key
12. An implementation of DNS intended to secure responses provided by the server such that different responses are given to internal vs. external users
False positive
Data custodian
Split DNS
Field
13. Diligence which a person; who possesses a special skill; would exercise under a given set of circumstances
Transaction log
Service bureau
Masqueraders
Due professional care
14. An exchange rate; which can be used optionally to perform foreign currency conversion. The corporate exchange rate is generally a standard market rate determined by senior financial management for use throughout the organization.
Trusted processes
Twisted pairs
Rootkit
Corporate exchange rate
15. Computer file storage media not physically connected to the computer; typically tapes or tape cartridges used for backup purposes
Offline files
Reciprocal agreement
Monetary unit sampling
Network hop
16. A type of LAN ring topology in which a frame containing a specific format; called the token; is passed from one station to the next around the ring. When a station receives the token; it is allowed to transmit. The station can send as many frames as
World Wide Web Consortium (W3C)
Full duplex
Token ring topology
ISP (Internet service provider)
17. The process of electronically inputting source documents by taking an image of the document; thereby eliminating the need for key entry
Hash total
Object-oriented system development
Image processing
Fail-over
18. Estimated cost and revenue amounts for a given range of periods and set of books. There can be multiple budget versions for the same set of books.
L2F (Layer 2 forwarding)
Record; screen and report layouts
Budget
Diskless workstations
19. Audit evidence is relevant if it pertains to the audit objectives and has a logical relationship to the findings and conclusions it is used to support.
Relevant audit evidence
Independent appearance
Reliable audit evidence
implementation life cycle review
20. Program narratives provide a detailed explanation of program flowcharts; including control points and any external input.
Program narratives
Anonymous File Transfer Protocol (FTP)
Error
Detection risk
21. In intrusion detection; an error that occurs when an attack is misdiagnosed as a normal activity
File
Active response
Plaintext
False negative
22. A visible trail of evidence enabling one to trace information contained in statements or reports back to the original input source
Spoofing
Handprint scanner
Audit trail
Coaxial cable
23. Any intentional violation of the security policy of a system
Sampling risk
Interest rate risk
Intrusion
Twisted pairs
24. A document that confirms the client's and the IS auditor's acceptance of a review assignment
Data diddling
Applet
Terms of reference
Data leakage
25. Emergency processing agreements between two or more organizations with similar equipment or applications. Typically; participants promise to provide processing time to each other when an emergency arises.
Reciprocal agreement
Default deny policy
Binary code
Corporate governance
26. A fail-over process in which the primary node owns the resource group. The backup node runs a non-critical application (e.g.; a development or test environment) and takes over the critical resource group but not vice versa.
Service bureau
Simple fail-over
Business process reengineering (BPR)
Application system
27. An algorithm that maps or translates one set of bits into another (generally smaller) so that a message yields the same result every time the algorithm is executed using the same message as input. It is computationally infeasible for a message to be
Computer server
Hash function
Application development review
Asynchronous Transfer Mode (ATM)
28. A data dictionary is a database that contains the name; type; range of values; source and authorization for access for each data element in a database. It also indicates which application programs use that data so that when a data structure is contem
Reasonable assurance
Data dictionary
Source documents
Queue
29. A program written in a portable; platform independent computer language; such as Java. It is usually embedded in an HTML page and then executed by a browser. Applets can only perform a restricted set of operations; thus preventing; or at least minimi
HTTPS (hyper text transfer protocol secure)
Applet
Management information system (MIS)
Audit trail
30. A code whose representation is limited to 0 and 1
Encryption
Topology
Attitude
Binary code
31. A sampling technique that estimates the amount of overstatement in an account balance
Check digit
Monetary unit sampling
Inherent risk
COSO
32. Is the risk to earnings or capital arising from movements in interest rates. From an economic perspective; a bank focuses on the sensitivity of the value of its assets; liabilities and revenues to changes in interest rates. Internet banking may attra
Scheduling
Professional competence
Telecommunications
Interest rate risk
33. A recovery solution provided by recovery and/or hardware vendors and includes a pre-established contract to deliver hardware resources within a specified number amount of hours after a disaster occurs. This solution usually provides organizations wit
Program evaluation and review technique (PERT)
Voice mail
Quick ship
Monitoring policy
34. A type of LAN architecture in which the cable forms a loop; with stations attached at intervals around the loop. Signals transmitted around the ring take the form of messages. Each station receives the messages and each station determines; on the bas
Ring topology
Switch
Normalization
Attribute sampling
35. Encapsulation is the technique used by layered protocols in which a lower layer protocol accepts a message from a higher layer protocol and places it in the data portion of a frame in the lower layer.
Address space
Encapsulation (objects)
Image processing
Application controls
36. The process of generating; recording and reviewing a chronological record of system events to ascertain their accuracy
Cleartext
Application program
Audit
Taps
37. Connects a terminal or computer to a communications network via a telephone line. Modems turn digital pulses from the computer into frequencies within the audio range of the telephone system. When acting in the receiver capacity; a modem decodes inco
Modem (modulator-demodulator)
Attitude
Business risk
Network
38. A condition in which each of an organization's regional locations maintains its own financial and operational data while sharing processing with an organizationwide; centralized database. This permits easy sharing of data while maintaining a certain
Split data systems
Business risk
Encryption key
Regression testing
39. Disturbances; such as static; in data transmissions that cause messages to be misinterpreted by the receiver
Memory dump
Internet Inter-ORB Protocol (IIOP)
Hierarchical database
Noise
40. Used in data encryption; it uses a secret key to encrypt the plaintext to the ciphertext. It also uses the same key to decrypt the ciphertext to the corresponding plaintext. In this case; the key is symmetric such that the encryption key is equivalen
Private key cryptosystems
Blackbox testing
Technical infrastructure security
Nonrepudiation
41. A hierarchical database that is distributed across the Internet that allows names to be resolved into IP addresses (and vice versa) to locate services such as web and e-mail servers
Appearance of independence
Backup
DNS (domain name system)
L2F (Layer 2 forwarding)
42. A device that is used to authenticate a user; typically in addition to a username and password. It is usually a credit card-sized device that displays a pseudo random number that changes every few minutes.
Surge suppressor
Project sponsor
Token
Protocol converter
43. An integrated set of computer programs designed to serve a particular function that has specific input; processing and output activities (e.g.; general ledger; manufacturing resource planning; human resource management)
Cohesion
Application system
Master file
Application implementation review
44. The art of designing; analyzing and attacking cryptographic schemes
Intelligent terminal
ISP (Internet service provider)
Sampling risk
Cryptography
45. The organization providing the outsourced service
X.25
E-mail/interpersonal messaging
Criteria
Service provider
46. These are the requirements for establishing a database application. They include field definitions; field requirements and reporting requirements for the individual information in the database.
Assembler
Reasonableness check
Token
Database specifications
47. The act of verifying the identity of a system entity (e.g.; a user; a system; a network node) and the entity's eligibility to access computerized information. Designed to protect against fraudulent logon activity. Authentication can also refer to the
Central processing unit (CPU)
COSO
Encryption
Authentication
48. 1) Following an authorized person into a restricted access area; 2) electronically attaching to an authorized telecommunications link to intercept and possibly alter transmissions.
DMZ (demilitarized zone)
Audit authority
Data custodian
Piggy backing
49. The individual responsible for the safeguard and maintenance of all program and data files
Bypass label processing (BLP)
Digital certification
Librarian
Twisted pairs
50. An evaluation of an application system under development which considers matters such as: appropriate controls are designed into the system; the application will process information in a complete; accurate and reliable manner; the application will fu
Edit controls
Application development review
RFC (request for comments)
Cathode ray tube (CRT)
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests