SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An organization composed of engineers; scientists and students. The IEEE is best known for developing standards for the computer and electronics industry.
UDDI
IEEE (Institute of Electrical and Electronics Engineers)--Pronounced I-triple-E
Cryptography
Data Encryption Standard (DES)
2. A response; in which the system (automatically or in concert with the user) blocks or otherwise affects the progress of a detected attack. The response takes one of three forms--amending the environment; collecting more information or striking back a
World Wide Web Consortium (W3C)
IPSec (Internet protocol security)
Computer server
Active response
3. Controlling access to a network by analyzing the contents of the incoming and outgoing packets and either letting them pass or denying them based on a list of rules. Differs from packet filtering in that it is the data in the packet that are analyzed
browser
Cluster controller
Content filtering
Hot site
4. Controls over the business processes that are supported by the ERP
Masqueraders
TCP (transmission control protocol)
business process integrity
Firmware
5. The act of capturing network packets; including those not necessarily destined for the computer running the sniffing software
Security/transaction risk
Business risk
Split DNS
Sniff
6. An evaluation of an application system under development which considers matters such as: appropriate controls are designed into the system; the application will process information in a complete; accurate and reliable manner; the application will fu
Application development review
File layout
Diskless workstations
Source code
7. A protected; generally computer-encrypted string of characters that authenticate a computer user to the computer system
Application acquisition review
Unit testing
File layout
Password
8. A mathematical key (kept secret by the holder) used to create digital signatures and; depending upon the algorithm; to decrypt messages or files encrypted (for confidentiality) with the corresponding public key
Internal control
Data communications
Bus topology
Private key
9. Systems that employ sufficient hardware and software assurance measures to allow their use for processing of a range of sensitive or classified information
Internet
Run instructions
Salami technique
Trusted systems
10. An attack strategy in which the attacker intercepts the communications stream between two parts of the victim system and then replaces the traffic between the two components with the intruder's own; eventually assuming control of the communication
Enterprise resource planning
Broadband
Man-in-the-middle attack
Outsourcing
11. The relationships among files in a database and among data items within each file
Data structure
Real-time processing
Full duplex
Cadbury
12. Machine-readable instructions produced from a compiler or assembler program that has accepted and translated the source code
Internal penetrators
Quick ship
Object code
Error risk
13. An auditing concept regarding the importance of an item of information with regard to its impact or effect on the functioning of the entity being audited. An expression of the relative significance or importance of a particular matter in the context
Materiality
Passive assault
Monitoring policy
Computer sequence checking
14. Small computers used to connect and coordinate communication links between distributed or remote devices and the main computer; thus freeing the main computer from this overhead function
Communications controller
Sampling risk
UNIX
Spoofing
15. A process used to identify and evaluate risks and their potential effects
Relevant audit evidence
L2TP (Layer 2 tunneling protocol)
Computer-assisted audit technique (CAATs)
Risk assessment
16. An implementation of DNS intended to secure responses provided by the server such that different responses are given to internal vs. external users
Split DNS
Telnet
Intrusion detection
Simple fail-over
17. A data communication network that adds processing services such as error correction; data translation and/or storage to the basic function of transporting data
Extensible Markup Language (XML)
Value-added network (VAN)
System exit
Monetary unit sampling
18. An internal computerized table of access rules regarding the levels of computer access permitted to logon IDs and computer terminals
Security testing
Asymmetric key (public key)
Audit charter
Access control table
19. A device that connects two similar networks together
Concurrent access
Geographic disk mirroring
Bridge
Audit risk
20. Diligence which a person would exercise under a given set of circumstances
Availability
Due care
Statistical sampling
Application maintenance review
21. A report on Internal Control--An Integrated Framework sponsored by the Committee of Sponsoring Organizations of the Treadway Commission in 1992. It provides guidance and a comprehensive framework of internal control for all organizations.'
COSO
Third-party review
Audit
Hypertext
22. Information generated by an encryption algorithm to protect the plaintext. The ciphertext is unintelligible to the unauthorized reader.
Ciphertext
Geographic disk mirroring
Service level agreement (SLA)
Fault tolerance
23. One who obtains products or services from a bank to be used primarily for personal; family or household purposes.
Digital certification
Extended Binary-coded Decimal Interchange Code (EBCDIC)
Consumer
Application security
24. To apply a variable; alternating current (AC) field for the purpose of demagnetizing magnetic recording media. The process involves increasing the AC field gradually from zero to some maximum value and back to zero; which leaves a very low residue of
Audit plan
Budget organization
Degauss
Project sponsor
25. An international consortium founded in 1994 of affiliates from public and private organizations involved with the Internet and the web. The W3C's primary mission is to promulgate open standards to further enhance the economic growth of Internet web s
Dynamic analysis
Parity check
Error
World Wide Web Consortium (W3C)
26. Intentional violations of established management policy or regulatory requirements. Deliberate misstatements or omissions of information concerning the area under audit or the organization as a whole; gross negligence or unintentional illegal acts.
Comparison program
Irregularities
Statistical sampling
Blackbox testing
27. Freedom from unauthorized intrusion
Control weakness
RADIUS (remote authentication dial-in user service)
Privacy
Sniff
28. Unusual or statistically rare
Standing data
Spoofing
Professional competence
Anomaly
29. The process of electronically sending computerized information from one computer to another computer. Most often; the transfer is from a smaller computer to a larger one.
Irregularities
Bar code
Uploading
HTTP (hyper text transfer protocol)
30. A method of user authentication. Challenge response authentication is carried out through use of the Challenge Handshake Authentication Protocol (CHAP). When a user tries to log into the server; the server sends the user a ''challenge;'' which is a r
Optical character recognition
ACK (acknowledgement)
Foreign exchange risk
Challenge/response token
31. A printed machine-readable code that consists of parallel bars of varied width and spacing
Bar code
Embedded audit module
Cold site
End-user computing
32. The technique used for selecting records in a file; one at a time; for processing; retrieval or storage. The access method is related to; but distinct from; the file organization that determines how the records are stored.
Access control table
Completeness check
Intrusion detection
Access method
33. Any information collection mechanism utilized by an intrusion detection system
Synchronous transmission
Attitude
Detection risk
Monitor
34. The code used to designate the location of a specific piece of data within computer storage
Application maintenance review
Dumb terminal
Address
DMZ (demilitarized zone)
35. Glass fibers that transmit binary signals over a telecommunications network. Fiber optic systems have low transmission losses as compared to twisted-pair cables. They do not radiate energy or conduct electricity. They are free from corruption and lig
Fiber optic cable
Comparison program
Single point of failure
Demodulation
36. Proven level of ability; often linked to qualifications issued by relevant professional bodies and compliance with their codes of practice and standards
Split DNS
Multiplexing
Professional competence
Communications controller
37. In vulnerability analysis; passive monitoring approaches in which passwords or other access credentials are required. This sort of check usually involves accessing a system data object.
Cold site
Check digit verification (self-checking digit)
Terminal
Credentialed analysis
38. Transactions that cannot be denied after the fact
Nonrepudiable trnasactions
Mutual takeover
Brouters
Allocation entry
39. A phase of an SDLC methodology that researches the feasibility and adequacy of resources for the development or acquisition of a system solution to a user need
Security perimeter
Feasibility study
Recovery testing
Hash function
40. System flowcharts are graphical representations of the sequence of operations in an information system or program. Information system flowcharts show how data from source documents flow through the computer to final distribution to users. Symbols use
Test data
vulnerability
System flowcharts
Bandwidth
41. A layer within the International Organization for Standardization (ISO)/Open Systems Interconnection (OSI) model. It is used in information transfers between users through application programs and other devices. In this layer various protocols are ne
Operational audit
Vaccine
Application layer
Audit evidence
42. A complex set of software programs that control the organization; storage and retrieval of data in a database. It also controls the security and integrity of the database.
UDDI
Utility software
Database management system (DBMS)
ICMP (internet control message protocol)
43. Is the risk to earnings or capital arising from changes in the value of portfolios of financial instruments. Price risk arises from market making; dealing and position taking in interest rate; foreign exchange; equity and commodities markets. Banks m
Anomaly
Appearance
Cross-certification
price risk
44. A security technique that verifies an individual's identity by analyzing a unique physical attribute; such as a handprint
Biometrics
Parallel simulation
Systems analysis
Vulnerabilities
45. The method or communication mode of routing data over the communication network (also see half duplex and full duplex)
Duplex routing
Rootkit
Local loop
Integrated services digital network (ISDN)
46. A device that forms a barrier between a secure and an open environment. Usually; the open environment is considered hostile. The most notable hostile environment is the Internet. In other words; a firewall enforces a boundary between two or more netw
Firewall
Security/transaction risk
Initial program load (IPL)
Service bureau
47. Door and entry locks that are activated by such biometric features as voice; eye retina; fingerprint or signature
Rapid application development
Encryption key
Biometric locks
IEEE (Institute of Electrical and Electronics Engineers)--Pronounced I-triple-E
48. A system development technique that enables users and developers to reach agreement on system requirements. Prototyping uses programmed simulation techniques to represent a model of the final system to the user for advisement and critique. The emphas
Ciphertext
Relevant audit evidence
Compiler
Prototyping
49. A low-level computer programming language which uses symbolic code and produces machine instructions
Cleartext
Salami technique
Assembly language
Application software tracing and mapping
50. A third party that provides organizations with a variety of Internet; and Internet-related services
Reasonable assurance
ISP (Internet service provider)
ICMP (internet control message protocol)
Source documents
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests