Test your basic knowledge |

CISA Certified Information Systems Auditor Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A numeric value; which has been calculated mathematically; is added to data to ensure that original data have not been altered or that an incorrect; but valid match has occurred. This control is effective in detecting transposition and transcription






2. A software engineering technique whereby an existing application system code can be redesigned and coded using computer-aided software engineering (CASE) technology






3. Detection on the basis of whether the system activity matches that defined as bad






4. In an asymmetric cryptographic scheme; the key that may be widely published to enable the operation of the scheme






5. A formal agreement with a third party to perform an IS function for an organization






6. The information an auditor gathers in the course of performing an IS audit. Evidence is relevant if it pertains to the audit objectives and has a logical relationship to the findings and conclusions it is used to support.






7. The range between the highest and lowest transmittable frequencies. It equates to the transmission capacity of an electronic line and is expressed in bytes per second or Hertz (cycles per second).






8. A condition in which each of an organization's regional locations maintains its own financial and operational data while sharing processing with an organizationwide; centralized database. This permits easy sharing of data while maintaining a certain






9. A phone number that represents the area in which the communications provider or Internet service provider (ISP) provides service






10. The systems development phase in which systems specifications and conceptual designs are developed; based on end-user needs and requirements






11. The central database that stores and organizes data






12. A telecommunications traffic controlling methodology in which a complete message is sent to a concentration point and stored until the communications path is established






13. A data recovery strategy that takes a set of physically disparate disks and synchronously mirrors them over high performance communication lines. Any write to a disk on one side will result in a write on the other. The local write will not return unt






14. Programmed checking of data validity in accordance with predetermined criteria






15. A specially configured server; designed to attract intruders so that their actions do not affect production systems; also known as a decoy server






16. Cooperating packages of executable software that make their services available through defined interfaces. Components used in developing systems may be commercial off-the-shelf software (COTS) or may be purposely built. However; the goal of component






17. The list of rules and/or guidance that is used to analyze event data






18. In vulnerability analysis; gaining information by performing standard system status queries and inspecting system attributes






19. The specific information subject to the IS auditor's report and related procedures which can include things such as the design or operation of internal controls and compliance with privacy practices or standards or specified laws and regulations.






20. The main memory of the computer's central processing unit






21. Hardware devices; such as asynchronous and synchronous transmissions; that convert between two different types of transmission






22. An audit designed to determine the accuracy of financial records; as well as evaluate the internal controls of a function or department






23. The process of creating and managing duplicate versions of a database. Replication not only copies a database but also synchronizes a set of replicas so that changes made to one replica are reflected in all the others. The beauty of replication is th






24. Records of system events generated by a specialized operating system mechanism






25. An ASP that also provides outsourcing of business processes such as payment processing; sales order processing and application development






26. A security technique that verifies an individual's identity by analyzing a unique physical attribute; such as a handprint






27. An international standard that defines information confidentiality; integrity and availability controls






28. Small computers used to connect and coordinate communication links between distributed or remote devices and the main computer; thus freeing the main computer from this overhead function






29. Parallel simulation involves the IS auditor writing a program to replicate those application processes that are critical to an audit opinion and using this program to reprocess application system data. The results produced are compared with the resul






30. The process of electronically inputting source documents by taking an image of the document; thereby eliminating the need for key entry






31. A fail-over process in which the primary node owns the resource group. The backup node runs idle; only supervising the primary node. In case of a primary node outage; the backup node takes over. The nodes are prioritized; which means the surviving no






32. Any yearly accounting period without regard to its relationship to a calendar year.






33. The ability to exercise judgement; express opinions and present recommendations with impartiality






34. To apply a variable; alternating current (AC) field for the purpose of demagnetizing magnetic recording media. The process involves increasing the AC field gradually from zero to some maximum value and back to zero; which leaves a very low residue of






35. A packet (encapsulated with a frame containing information); which is transmitted in a packet-switching network from source to destination






36. Software used to create data to be used in the testing of computer programs






37. The policies; procedures; practices and organizational structures designed to provide reasonable assurance that business objectives will be achieved and that undesired events will be prevented or detected and corrected.






38. Detects errors in the input portion of information that is sent to the computer for processing. The controls may be manual or automated and allow the user to edit data errors before processing.






39. A type of service providing an authentication and accounting system often used for dial-up and remote access security






40. A test to check the system's ability to recover after a software or hardware failure






41. A popular local area network operating system developed by the Novell Corp.






42. Memory chips with embedded program code that hold their content when power is turned off






43. A testing approach which focuses on the functionality of the application or product and does not require knowledge of the code intervals.






44. The risk of giving an incorrect audit opinion






45. Generally; the assumption that an entity will behave substantially as expected. Trust may apply only for a specific function. The key role of this term in an authentication framework is to describe the relationship between an authenticating entity an






46. Is present when a financial asset or liability is denominated in a foreign currency or is funded by borrowings in another currency






47. In open systems architecture; circular routing is the logical path of a message in a communications network based on a series of gates at the physical network layer in the open systems interconnection (OSI) model.






48. A device that forwards packets between LAN devices or segments. LANs that use switches are called switched LANs.






49. A statement of the position within the organization; including lines of reporting and the rights of access






50. Expert or decision support systems that can be used to assist IS auditors in the decision-making process by automating the knowledge of experts in the field. This technique includes automated risk analysis; systems software and control objectives sof