SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A data transmission service requiring the establishment of a circuit-switched connection before data can be transferred from source data terminal equipment (DTE) to a sink DTE. A circuit-switched data transmission service uses a connection network.
Due care
Circuit-switched network
Record; screen and report layouts
FIN (final)
2. The practice of eavesdropping on information being transmitted over telecommunications links
Data structure
Central processing unit (CPU)
DMZ (demilitarized zone)
Wiretapping
3. Freedom from unauthorized intrusion
Privacy
Optical scanner
Service level agreement (SLA)
Relevant audit evidence
4. Typically in large organisations where the quantum of data processed by the ERPs are extremely voluminous; analysis of patterns and trends prove to be extremely useful in ascertaining the efficiency and effectiveness of operations. Most ERPs provide
Data analysis
Database replication
Scure socket layer (SSL)
Hot site
5. An evaluation of an application system being acquired or evaluated; which considers such matters as: appropriate controls are designed into the system; the application will process information in a complete; accurate and reliable manner; the applicat
Application acquisition review
Coupling
Encryption key
Tcpdump
6. A flag set in a packet to indicate that this packet is the final data packet of the transmission
Criteria
FIN (final)
Leased lines
HTTPS (hyper text transfer protocol secure)
7. Compares data to predefined reasonability limits or occurrence rates established for the data.
Range check
SYN (synchronize)
COCO
Reasonableness check
8. A method for downloading public files using the File Transfer Protocol (FTP). Anonymous FTP is called anonymous because users do not need to identify themselves before accessing files from a particular server. In general; users enter the word anonymo
Anonymous File Transfer Protocol (FTP)
Non-intrusive monitoring
Application implementation review
Protocol
9. A testing approach that uses knowledge of a program/module's underlying implementation and code intervals to verify its expected behavior.
Hexadecimal
Confidentiality
Whitebox testing
UDP (User Datagram Protocol)
10. The technique used for selecting records in a file; one at a time; for processing; retrieval or storage. The access method is related to; but distinct from; the file organization that determines how the records are stored.
Concurrent access
Static analysis
Access method
Combined Code on Corporate Governance
11. Commonly it is the network segment between the Internet and a private network. It allows access to services from the Internet and the internal private network; while denying access from the Internet directly to the private network.
Dumb terminal
Independent appearance
Data dictionary
DMZ (demilitarized zone)
12. A recurring journal entry used to allocate revenues or costs. For example; an allocation entry could be defined to allocate costs to each department based on headcount.
Quick ship
Demodulation
Middleware
Allocation entry
13. In broadband; multiple channels are formed by dividing the transmission medium into discrete frequency segments. It generally requires the use of a modem.
Broadband
Operating system audit trails
Sniffing
Service bureau
14. Hardware devices; such as asynchronous and synchronous transmissions; that convert between two different types of transmission
Encapsulation (objects)
Business process reengineering (BPR)
world wide web (WWW)
Protocol converter
15. A software engineering technique whereby an existing application system code can be redesigned and coded using computer-aided software engineering (CASE) technology
Application software tracing and mapping
Reverse engineering
Rotating standby
Population
16. A protocol used for transmitting data between two ends of a connection
Budget formula
Internal control structure
Tuple
PPP (point-to-point protocol)
17. Transactions that cannot be denied after the fact
Security perimeter
Encryption key
Private key cryptosystems
Nonrepudiable trnasactions
18. The specific information subject to the IS auditor's report and related procedures which can include things such as the design or operation of internal controls and compliance with privacy practices or standards or specified laws and regulations.
Subject matter (Area of activity)
Public key
RS-232 interface
Port
19. The processing of a group of transactions at the same time. Transactions are collected and processed against the master files at a specified time.
Budget hierarchy
Batch processing
Verification
Network
20. The assurance that a party cannot later deny originating data; that it is the provision of proof of the integrity and origin of the data which can be verified by a third party. Nonrepudiation may be provided by a digital signature.
X.500
Budget
Nonrepudiation
Sampling risk
21. The structure through which the objectives of an organization are set; and the means of attaining those objectives; and determines monitoring performance guidelines. Good corporate governance should provide proper incentives for board and management
Degauss
Node
Cluster controller
Corporate governance
22. Any automated audit technique; such as generalized audit software; test data generators; computerized audit programs and specialized audit utilities
Security management
Administrative controls
Budget organization
Computer-assisted audit technique (CAATs)
23. These controls deal with the everyday operation of a company or organization to ensure all objectives are achieved.
Operational control
Logoff
Components (as in component-based development)
Evidence
24. An individual who attempts to gain unauthorized access to a computer system
Simple Object Access Protocol (SOAP)
Continuity
Trojan horse
Hacker
25. Integral part of an application system that is designed to identify and report specific transactions or other information based on pre-determined criteria. Identification of reportable items occurs as part of real-time processing. Reporting may be re
Point-of-sale systems (POS)
Alpha
Embedded audit module
LDAP (Lightweight Directory Access Protocol)
26. Any technique designed to provide the electronic equivalent of a handwritten signature to demonstrate the origin and integrity of specific data. Digital signatures are an example of electronic signatures.
Budget formula
Tcpdump
Administrative controls
Electronic signature
27. A numbering system that uses a base of 16 and uses 16 digits: 0; 1; 2; 3; 4; 5; 6; 7; 8; 9; A; B; C; D; E and F. Programmers use hexadecimal numbers as a convenient way of representing binary numbers.
Hexadecimal
HTTPS (hyper text transfer protocol secure)
Hypertext
Allocation entry
28. A test that has been designed to evaluate the performance of a system. In a benchmark test; a system is subjected to a known workload and the performance of the system against this workload is measured. Typically; the purpose is to compare the measur
Parallel simulation
Switch
Benchmark
Discovery sampling
29. A biometric device that is used to authenticate a user through palm scans
Structured programming
Handprint scanner
Coverage
System narratives
30. Specifies the format of packets and the addressing scheme
Mutual takeover
Untrustworthy host
Fscal year
IP (Internet protocol)
31. An organized assembly of resources and procedures required to collect; process and distribute data for use in decision making
Completeness check
Management information system (MIS)
Monetary unit sampling
Hexadecimal
32. Refers to the security of the infrastructure that supports the ERP networking and telecommunications; operating systems and databases.
Biometric locks
Control weakness
Security/transaction risk
Technical infrastructure security
33. A type of LAN architecture in which the cable forms a loop; with stations attached at intervals around the loop. Signals transmitted around the ring take the form of messages. Each station receives the messages and each station determines; on the bas
Computationally greedy
Risk
Address
Ring topology
34. A physical control technique that uses a secured card or ID to gain access to a highly sensitive location. Card swipes; if built correctly; act as a preventative control over physical access to those sensitive locations. After a card has been swiped;
Digital signature
Application software tracing and mapping
Posting
Card swipes
35. The process of converting a digital computer signal into an analog telecommunications signal
External router
Embedded audit module
Information processing facility (IPF)
Modulation
36. A weakness in system security procedures; system design; implementation or internal controls that could be exploited to violate system security.
Audit evidence
vulnerability
Security software
Digital certification
37. A method of user authentication. Challenge response authentication is carried out through use of the Challenge Handshake Authentication Protocol (CHAP). When a user tries to log into the server; the server sends the user a ''challenge;'' which is a r
Master file
Field
Challenge/response token
Dry-pipe fire extinguisher system
38. An exercise that determines the impact of losing the support of any resource to an organization and establishes the escalation of that loss over time; identifies the minimum resources needed to recover and prioritizes the recovery of processes and su
Corporate governance
Data integrity
Business impact analysis (BIA)
Peripherals
39. A cipher technique whereby different cryptographic keys are used to encrypt and decrypt a message (see public key cryptosystems)
PPTP (point-to-point tunneling protocol)
Hash total
Rapid application development
Asymmetric key (public key)
40. English-like; user friendly; nonprocedural computer languages used to program and/or read and process computer files
Piggy backing
Fourth generation language (4GL)
Black box testing
Data structure
41. A named collection of related records
Application implementation review
File
X.25
Frame relay
42. An audit designed to determine the accuracy of financial records; as well as evaluate the internal controls of a function or department
Comprehensive audit
Procedure
Input controls
Scheduling
43. Analysis of the security state of a system or its compromise on the basis of information collected at intervals
ISP (Internet service provider)
Vulnerability analysis
Subject matter (Area of activity)
Certificate Revocation List
44. An interactive system that provides the user with easy access to decision models and data; to support semistructured decision-making tasks
Passive response
Batch control
Control Objectives for Enterprise Governance
Decision support systems (DSS)
45. The physical layout of how computers are linked together. Examples include ring; star and bus.
Telecommunications
Switch
Operational control
Topology
46. Used to ensure that input data agree with predetermined criteria stored in a table
Technical infrastructure security
Table look-ups
Pervasive IS controls
Confidentiality
47. A set of protocols that allow systems to communicate information about the state of services on other systems. It is used; for example; in determining whether systems are up; maximum packet sizes on links; whether a destination host/network/port is a
Random access memory (RAM)
Business impact analysis (BIA)
liquidity risk
ICMP (internet control message protocol)
48. A communications terminal control hardware unit that controls a number of computer terminals. All messages are buffered by the controller and then transmitted to the receiver.
Non-intrusive monitoring
COBIT
Software
Cluster controller
49. Intentional violations of established management policy or regulatory requirements. Deliberate misstatements or omissions of information concerning the area under audit or the organization as a whole; gross negligence or unintentional illegal acts.
Output analyzer
Benchmark
Irregularities
Log
50. A system software tool that logs; monitors and directs computer tape usage
Check digit
Security testing
Application layer
Tape management system (TMS)
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests