SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A program that processes actions upon business data; such as data entry; update or query. It contrasts with systems program; such as an operating system or network control program; and with utility programs; such as copy or sort.
Reliable audit evidence
Service provider
Application program
Centralized data processing
2. A device for sending and receiving computerized data over transmission lines
Structured Query Language (SQL)
Terminal
Half duplex
Application system
3. Specialized security checker that tests user's passwords; searching for passwords that are easy to guess by repeatedly trying words from specially crafted dictionaries. Failing that; many password crackers can brute force all possible combinations in
Hash function
Compiler
Audit evidence
Password cracker
4. The process of distributing computer processing to different locations within an organization
RADIUS
FIN (final)
Decentralization
Brute force
5. A networking device that can send (route) data packets from one local area network (LAN) or wide area network (WAN) to another; based on addressing at the network layer (Layer 3) in the OSI model. Networks connected by routers can use different or si
Object-oriented system development
Substantive testing
SYN (synchronize)
Router
6. A device that is used to authenticate a user; typically in addition to a username and password. It is usually a credit card-sized device that displays a pseudo random number that changes every few minutes.
Token
Application software tracing and mapping
Idle standby
Parallel testing
7. Audit evidence is sufficient if it is adequate; convincing and would lead another IS auditor to form the same conclusions.
Application layer
Sufficient audit evidence
X.500
Web Services Description Language (WSDL)
8. A system software tool that logs; monitors and directs computer tape usage
Tape management system (TMS)
False negative
Generalized audit software
Computer-aided software engineering (CASE)
9. A named collection of related records
Criteria
File
IT governance
Source documents
10. A system development methodology that is organised around ''objects'' rather than ''actions;' and 'data ' rather than 'logic.' Object-oriented analysis is an assessment of a physical system to determine which objects in the real world need to be repr
Assembly language
Object-oriented system development
Administrative controls
Budget formula
11. A test that has been designed to evaluate the performance of a system. In a benchmark test; a system is subjected to a known workload and the performance of the system against this workload is measured. Typically; the purpose is to compare the measur
Circuit-switched network
Optical scanner
Multiplexor
Benchmark
12. Computer programs provided by a computer hardware manufacturer or software vendor and used in running the system. This technique can be used to examine processing activities; to test programs; system activities and operational procedures; to evaluate
Project sponsor
Active response
Data integrity
Utility software
13. To record details of information or events in an organized record-keeping system; usually sequenced in the order they occurred
Record
LDAP (Lightweight Directory Access Protocol)
Log
Ring topology
14. A programmed edit or routine that detects transposition and transcription errors by calculating and checking the check digit
Production programs
Strategic risk
Corporate governance
Check digit verification (self-checking digit)
15. A server that acts on behalf of a user. Typical proxies accept a connection from a user; make a decision as to whether or not the user or client IP address is permitted to use the proxy; perhaps perform additional authentication; and complete a conne
Binary code
Proxy server
Centralized data processing
Machine language
16. The quality or state of not being named or identified
Generalized audit software
Decryption key
Top-level management
Anonymity
17. Programs that provide assurance that the software being audited is the correct version of the software; by providing a meaningful listing of any discrepancies between the two versions of the program
Passive response
Memory dump
Console log
Source code compare programs
18. A form of modulation in which data signals are pulsed directly on the transmission medium without frequency division and usually utilize a transceiver. In baseband the entire bandwidth of the transmission medium (e.g.; coaxial cable) is utilized for
Audit objective
Trojan horse
Data-oriented systems development
Baseband
19. A device used for combining several lower-speed channels into a higher-speed channel
Screening routers
Multiplexor
Coverage
Accountability
20. Point-of-sale systems enable capture of data at the time and place of transaction. POS terminals may include use of optical scanners for use with bar codes or magnetic card readers for use with credit cards. POS systems may be online to a central com
Screening routers
Point-of-sale systems (POS)
Fiber optic cable
Computer server
21. An independent audit of the control structure of a service organization; such as a service bureau; with the objective of providing assurances to the users of the service organization that the internal control structure is adequate; effective and soun
Control objective
Local area network (LAN)
Third-party review
SYN (synchronize)
22. Commonly it is the network segment between the Internet and a private network. It allows access to services from the Internet and the internal private network; while denying access from the Internet directly to the private network.
Asynchronous transmission
Attribute sampling
DMZ (demilitarized zone)
Attitude
23. Is the risk to earnings or capital arising from movements in interest rates. From an economic perspective; a bank focuses on the sensitivity of the value of its assets; liabilities and revenues to changes in interest rates. Internet banking may attra
Abend
Consumer
Interest rate risk
Audit program
24. An interactive online system capability that immediately updates computer files when transactions are initiated through a terminal
Monitoring policy
File layout
Vulnerabilities
Real-time processing
25. Processes certified as supporting a security goal
Trusted processes
Automated teller machine (ATM)
Request for proposal (RFP)
Dumb terminal
26. A private key cryptosystem published by the National Bureau of Standards (NBS); the predecessor of the US National Institute of Standards and Technology (NIST). DES has been used commonly for data encryption in the forms of software and hardware impl
Access path
Record
Budget organization
Data Encryption Standard (DES)
27. The process of electronically inputting source documents by taking an image of the document; thereby eliminating the need for key entry
Image processing
Business impact analysis (BIA)
Production software
Encryption
28. A numeric value; which has been calculated mathematically; is added to data to ensure that original data have not been altered or that an incorrect; but valid match has occurred. This control is effective in detecting transposition and transcription
Bus
Continuity
Check digit
Threat
29. The consolidation in 1998 of the ''Cadbury;'' ''Greenbury'' and ''Hampel'' Reports. Named after the Committee Chairs; these reports were sponsored by the UK Financial Reporting Council; the London Stock Exchange; the Confederation of British Industry
Combined Code on Corporate Governance
Application acquisition review
price risk
Audit responsibility
30. The process of transmitting messages in convenient pieces that can be reassembled at the destination
Combined Code on Corporate Governance
Detection risk
Packet switching
Certificate Revocation List
31. A technique used to determine the size of a development task; based on the number of function points. Function points are factors such as inputs; outputs; inquiries and logical internal sites.
Program evaluation and review technique (PERT)
Function point analysis
Abend
Cadbury
32. The transfer of service from an incapacitated primary component to its backup component
Test data
Bridge
Fail-over
Anonymous File Transfer Protocol (FTP)
33. Cooperating packages of executable software that make their services available through defined interfaces. Components used in developing systems may be commercial off-the-shelf software (COTS) or may be purposely built. However; the goal of component
Components (as in component-based development)
Latency
Data-oriented systems development
Appearance
34. The central database that stores and organizes data
Circular routing
Reputational risk
Public key infrastructure
Repository
35. A code whose representation is limited to 0 and 1
Point-of-sale systems (POS)
Address
Run instructions
Binary code
36. Behavior adequate to meet the situations occurring during audit work (interviews; meetings; reporting; etc.). The IS auditor should be aware that appearance of independence depends upon the perceptions of others and can be influenced by improper acti
Appearance of independence
Man-in-the-middle attack
SYN (synchronize)
Attribute sampling
37. A transmission signal that varies continuously in amplitude and time and is generated in wave formation. Analog signals are used in telecommunications.
Analog
Computer-aided software engineering (CASE)
Editing
Business impact analysis (BIA)
38. A system's level of resilience to seamlessly react from hardware and/or software failure
Fault tolerance
L2F (Layer 2 forwarding)
Application software tracing and mapping
Rotating standby
39. A certificate identifying a public key to its subscriber; corresponding to a private key held by that subscriber. It is a unique code that typically is used to allow the authenticity and integrity of communicated data to be verified.
Program flowcharts
Packet
Digital certificate
Computer server
40. Detects transmission errors by appending calculated bits onto the end of each segment of data
Redundancy check
Windows NT
Offline files
Hacker
41. Range checks ensure that data fall within a predetermined range (also see limit checks).
Relevant audit evidence
Console log
Range check
Rootkit
42. The application of an edit; using a predefined field definition to a submitted information stream; a test to ensure that data conform to a predefined format
Hacker
Local area network (LAN)
Format checking
Information processing facility (IPF)
43. The act of giving the idea or impression of being or doing something
Appearance
Privilege
Recovery point objective (RPO)—
Permanent virtual circuit (PVC)
44. An XML-formatted language used to describe a web service's capabilities as collections of communication endpoints capable of exchanging messages. WSDL is the language that UDDI uses. (Also see Universal Description; Discovery and Integration (UDDI))
Password cracker
Intranet
Web Services Description Language (WSDL)
Peripherals
45. The communication lines that provide connectivity between the telecommunications carrier's central office and the subscriber's facilities
Internal storage
Duplex routing
Local loop
IPSec (Internet protocol security)
46. Diagramming data that are to be exchanged electronically; including how it is to be used and what business management systems need it. It is a preliminary step for developing an applications link. (Also see application tracing and mapping.)
Error risk
Terms of reference
Automated teller machine (ATM)
Mapping
47. An entity that may be given responsibility for performing some of the administrative tasks necessary in the registration of subjects; such as confirming the subject's identity; validating that the subject is entitled to have the attributes requested
Registration authority (RA)
Message switching
Broadband
Computer-aided software engineering (CASE)
48. Test data are processed in production systems. The data usually represent a set of fictitious entities such as departments; customers and products. Output reports are verified to confirm the correctness of the processing.
Database administrator (DBA)
Port
Integrated test facilities (ITF)
Central processing unit (CPU)
49. A program written in a portable; platform independent computer language; such as Java. It is usually embedded in an HTML page and then executed by a browser. Applets can only perform a restricted set of operations; thus preventing; or at least minimi
Shell
Applet
Independence
Control weakness
50. A set of routines; protocols and tools referred to as ''building blocks'' used in business application software development. A good API makes it easier to develop a program by providing all the building blocks related to functional characteristics of
Hacker
Standing data
Structured Query Language (SQL)
Application programming interface (API)