Test your basic knowledge |

CISA Certified Information Systems Auditor Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The ability of end users to design and implement their own information system utilizing computer software products






2. Applications that detect; prevent and possibly remove all known viruses from files located in a microcomputer hard drive






3. The act of capturing network packets; including those not necessarily destined for the computer running the sniffing software






4. The acts preventing; mitigating and recovering from disruption. The terms business resumption planning; disaster recovery planning and contingency planning also may be used in this context; they all concentrate on the recovery aspects of continuity.






5. Processing is achieved by entering information into the computer via a video display terminal. The computer immediately accepts or rejects the information; as it is entered.






6. An organized assembly of resources and procedures required to collect; process and distribute data for use in decision making






7. Error control deviations (compliance testing) or misstatements (substantive testing)






8. The risk that an error which could occur in an audit area; and which could be material; individually or in combination with other errors; will not be prevented or detected and corrected on a timely basis by the internal control system






9. To the basic border firewall; add a host that resides on an untrusted network where the firewall cannot protect it. That host is minimally configured and carefully managed to be as secure as possible. The firewall is configured to require incoming an






10. Used to electronically scan and input written information from a source document






11. A fail-over process in which the primary node owns the resource group. The backup node runs idle; only supervising the primary node. In case of a primary node outage; the backup node takes over. The nodes are prioritized; which means the surviving no






12. An individual or department responsible for the security and information classification of the shared data stored on a database system. This responsibility includes the design; definition and maintenance of the database.






13. The area of the system that the intrusion detection system is meant to monitor and protect






14. Audit evidence is reliable if; in the IS auditor's opinion; it is valid; factual; objective and supportable.






15. The standards and benchmarks used to measure and present the subject matter and against which the IS auditor evaluates the subject matter. Criteria should be: Objective—free from bias Measurable—provide for consistent measurement Complete—include all






16. A protocol originally developed by Netscape Communications to provide a high level of security for its browser software. It has become accepted widely as a means of securing Internet message exchanges. It ensures confidentiality of the data in transm






17. Faking the sending address of a transmission in order to gain illegal entry into a secure system






18. A data dictionary is a database that contains the name; type; range of values; source and authorization for access for each data element in a database. It also indicates which application programs use that data so that when a data structure is contem






19. Considered for acquisition the person responsible for high-level decisions; such as changes to the scope and/or budget of the project; and whether or not to implement






20. A communication network that serves several users within a specified geographic area. It is made up of servers; workstations; a network operating system and a communications link. Personal computer LANs function as distributed processing systems in w






21. The act of copying raw data from one place to another with little or no formatting for readability. Usually; dump refers to copying data from main memory to a display screen or a printer. Dumps are useful for diagnosing bugs. After a program fails; o






22. An ASP that also provides outsourcing of business processes such as payment processing; sales order processing and application development






23. Information generated by an encryption algorithm to protect the plaintext. The ciphertext is unintelligible to the unauthorized reader.






24. To apply a variable; alternating current (AC) field for the purpose of demagnetizing magnetic recording media. The process involves increasing the AC field gradually from zero to some maximum value and back to zero; which leaves a very low residue of






25. A technique of reading a computer file while bypassing the internal file/data set label. This process could result in bypassing of the security access control system.






26. A testing technique that is used to test program logic within a particular program or module. The purpose of the test is to ensure that the program meets system development guidelines and does not abnormally end during processing.






27. A mathematical key (kept secret by the holder) used to create digital signatures and; depending upon the algorithm; to decrypt messages or files encrypted (for confidentiality) with the corresponding public key






28. The person responsible for maintaining a LAN and assisting end users






29. Any yearly accounting period without regard to its relationship to a calendar year.






30. The list of rules and/or guidance that is used to analyze event data






31. A phase of an SDLC methodology where the affected user groups define the requirements of the system for meeting the defined needs






32. Is the risk to earnings or capital arising from a bank's inability to meet its obligations when they come due; without incurring unacceptable losses. Internet banking may increase deposit volatility from customers who maintain accounts solely on the






33. Specialized tools that can be used to analyze the flow of data; through the processing logic of the application software; and document the logic; paths; control conditions and processing sequences. Both the command language or job control statements






34. A workstation or PC on a network that does not have its own disk. Instead; it stores files on a network file server.






35. A weakness in system security procedures; system design; implementation or internal controls that could be exploited to violate system security.






36. An audit designed to evaluate the various internal controls; economy and efficiency of a function or department






37. Computer operating instructions which detail the step-by-step processes that are to occur so an application system can be properly executed. It also identifies how to address problems that occur during processing.






38. A layer within the International Organization for Standardization (ISO)/Open Systems Interconnection (OSI) model. It is used in information transfers between users through application programs and other devices. In this layer various protocols are ne






39. The use of software packages that aid in the development of all phases of an information system. System analysis; design programming and documentation are provided. Changes introduced in one CASE chart will update all other related charts automatical






40. The initialization procedure that causes an operating system to be loaded into storage at the beginning of a workday or after a system malfunction






41. A row or record consisting of a set of attribute value pairs (column or field) in a relational data structure






42. The act of transferring computerized information from one computer to another computer






43. A protected; generally computer-encrypted string of characters that authenticate a computer user to the computer system






44. An interface point between the CPU and a peripheral device






45. A point in a routine at which sufficient information can be stored to permit restarting the computation from that point. NOTE: seems to pertain to recover - shutting down database after all records have been committed for example






46. The logical language a computer understands






47. Expert or decision support systems that can be used to assist IS auditors in the decision-making process by automating the knowledge of experts in the field. This technique includes automated risk analysis; systems software and control objectives sof






48. The ability to map a given activity or event back to the responsible party






49. The application of audit procedures to less than 100 percent of the items within a population to obtain audit evidence about a particular characteristic of the population






50. A discussion document which sets out an ''Enterprise Governance Model'' focusing strongly on both the enterprise business goals and the information technology enablers which facilitate good enterprise governance; published by the Information Systems