SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A fail-over process; which is basically a two-way idle standby: two servers are configured so that both can take over the other node's resource group. Both must have enough CPU power to run both applications with sufficient speed; or performance loss
Bar code
Electronic vaulting
Mutual takeover
Security software
2. Point-of-sale systems enable capture of data at the time and place of transaction. POS terminals may include use of optical scanners for use with bar codes or magnetic card readers for use with credit cards. POS systems may be online to a central com
PPP (point-to-point protocol)
Masqueraders
Rotating standby
Point-of-sale systems (POS)
3. The possibility of an act or event occurring that would have an adverse effect on the organization and its information systems
Node
Hardware
Risk
Indexed sequential access method (ISAM)
4. A protocol originally developed by Netscape Communications to provide a high level of security for its browser software. It has become accepted widely as a means of securing Internet message exchanges. It ensures confidentiality of the data in transm
Source lines of code (SLOC)
Scure socket layer (SSL)
Inheritance (objects)
Electronic funds transfer (EFT)
5. A hierarchical database that is distributed across the Internet that allows names to be resolved into IP addresses (and vice versa) to locate services such as web and e-mail servers
Financial audit
Integrated test facilities (ITF)
Decentralization
DNS (domain name system)
6. A layer within the International Organization for Standardization (ISO)/Open Systems Interconnection (OSI) model. It is used in information transfers between users through application programs and other devices. In this layer various protocols are ne
Decentralization
Application layer
Application controls
Data analysis
7. An automated function that can be operating system or application based in which electronic data being transmitted between storage areas are spooled or stored until the receiving device or storage area is prepared and able to receive the information.
Public key
Spool (simultaneous peripheral operations online)
Arithmetic-logic unit (ALU)
Dry-pipe fire extinguisher system
8. A set of protocols developed by the IETF to support the secure exchange of packets
System flowcharts
IPSec (Internet protocol security)
Librarian
Test data
9. A sampling technique used to estimate the average or total value of a population based on a sample; a statistical model used to project a quantitative characteristic; such as a dollar amount
Variable sampling
Completeness check
Business impact analysis (BIA)
Trojan horse
10. A fail-over process in which there are two nodes (as in idle standby but without priority). The node that enters the cluster first owns the resource group; and the second will join as a standby node.
UDDI
Scure socket layer (SSL)
Rotating standby
DoS (denial-of-service) attack
11. Individuals; normally managers or directors; who have responsibility for the integrity; accurate reporting and use of computerized data
Filtering router
Data owner
Cohesion
Sampling risk
12. The information an auditor gathers in the course of performing an IS audit. Evidence is relevant if it pertains to the audit objectives and has a logical relationship to the findings and conclusions it is used to support.
Anonymity
Evidence
Address
Latency
13. The exchange of money via telecommunications. EFT refers to any financial transaction that originates at a terminal and transfers a sum of money from one account to another.
Electronic funds transfer (EFT)
Inherent risk
Penetration testing
Base case
14. A popular local area network operating system developed by the Novell Corp.
Biometric locks
Netware
Transaction protection
Real-time analysis
15. The traditional Internet service protocol widely used for many years on UNIX-based operating systems and supported by the Internet Engineering Task Force (IETF) that allows a program on one computer to execute a program on another (e.g.; server). The
Criteria
Remote procedure calls (RPCs)
Masking
Bridge
16. The range between the highest and lowest transmittable frequencies. It equates to the transmission capacity of an electronic line and is expressed in bytes per second or Hertz (cycles per second).
Bandwidth
Port
Professional competence
Bar code
17. Audit evidence is useful if it assists the IS auditors in meeting their audit objectives.
Operating system
Engagement letter
Useful audit evidence
Dial-back
18. A document which defines the IS audit function's responsibility; authority and accountability
Audit charter
Degauss
IT governance
Threat
19. One who obtains products or services from a bank to be used primarily for personal; family or household purposes.
Brouters
Waterfall development
Data security
Consumer
20. The risk of errors occurring in the area being audited
Error risk
File server
Security administrator
Point-of-sale systems (POS)
21. A physical control technique that uses a secured card or ID to gain access to a highly sensitive location. Card swipes; if built correctly; act as a preventative control over physical access to those sensitive locations. After a card has been swiped;
Card swipes
Public key cryptosystem
Nonrepudiable trnasactions
Token ring topology
22. A data dictionary is a database that contains the name; type; range of values; source and authorization for access for each data element in a database. It also indicates which application programs use that data so that when a data structure is contem
Data dictionary
Tape management system (TMS)
Registration authority (RA)
Security policy
23. Software that is being used and executed to support normal and authorized organizational operations. Such software is to be distinguished from test software; which is being developed or modified; but has not yet been authorized for use by management.
Masking
Service level agreement (SLA)
Check digit verification (self-checking digit)
Production software
24. A fail-over process; in which all nodes run the same resource group (there can be no IP or MAC addresses in a concurrent resource group) and access the external storage concurrently
Criteria
Console log
Nonrepudiation
Concurrent access
25. Test data are processed in production systems. The data usually represent a set of fictitious entities such as departments; customers and products. Output reports are verified to confirm the correctness of the processing.
Interface testing
Trap door
Systems development life cycle (SDLC)
Integrated test facilities (ITF)
26. A testing approach which focuses on the functionality of the application or product and does not require knowledge of the code intervals.
Black box testing
Waterfall development
Criteria
Salami technique
27. Self-governance and freedom from conflict of interest and undue influence. The IS auditor should be free to make his/her own decisions; not influenced by the organization being audited and its people (managers and employers).
Datagram
Proxy server
False positive
Independence
28. In a passive assault; intruders attempt to learn some characteristic of the data being transmitted. They may be able to read the contents of the data so the privacy of the data is violated. Alternatively; although the content of the data itself may r
Bypass label processing (BLP)
Content filtering
Reliable audit evidence
Passive assault
29. A terminal with built-in processing capability. It has no disk or tape storage but has memory. The terminal interacts with the user by editing and validating data as they are entered prior to final processing.
Log
SMTP (Simple Mail Transport Protocol)
Intelligent terminal
Transaction
30. Systems that employ sufficient hardware and software assurance measures to allow their use for processing of a range of sensitive or classified information
Trusted systems
Asymmetric key (public key)
Idle standby
Test programs
31. The actions/controls dealing with operational effectiveness; efficiency and adherence to regulations and management policies
Systems acquisition process
Completeness check
Spoofing
Administrative controls
32. A pair of small; insulated wires that are twisted around each other to minimize interference from other wires in the cable. This is a low-capacity transmission medium.
Twisted pairs
Intrusive monitoring
Cohesion
Telecommunications
33. A file format in which the file is divided into multiple subfiles and a directory is established to locate each subfile
Hub
Sniffing
Web Services Description Language (WSDL)
Partitioned file
34. A technique used to recover the original plaintext from the ciphertext such that it is intelligible to the reader. The decryption is a reverse process of the encryption.
Decryption
Piggy backing
Internal control
Credentialed analysis
35. Controlling access to a network by analyzing the attributes of the incoming and outgoing packets and either letting them pass; or denying them; based on a list of rules
Prototyping
Application acquisition review
Packet filtering
Journal entry
36. Risks that could impact the organization's ability to perform business or provide a service. They can be financial; regulatory or control oriented.
Point-of-sale systems (POS)
Network administrator
Business risk
Budget organization
37. Those controls that seek to maintain confidentiality; integrity and availability of information
Cathode ray tube (CRT)
Electronic funds transfer (EFT)
Data security
Source documents
38. Interface between data terminal equipment and data communications equipment employing serial binary data interchange
Interest rate risk
RS-232 interface
Test data
Static analysis
39. Computer operating instructions which detail the step-by-step processes that are to occur so an application system can be properly executed. It also identifies how to address problems that occur during processing.
Database replication
Non-intrusive monitoring
Run instructions
Credentialed analysis
40. A port configured on a network switch to receive copies of traffic from one or more other ports on the switch
Vulnerability analysis
Public key cryptosystem
Monitor
Spanning port
41. The machine language code that is generally referred to as the object or load module
Echo checks
Access rights
Executable code
Electronic data interchange (EDI)
42. A group of budgets linked together at different levels such that the budgeting authority of a lower-level budget is controlled by an upper-level budget.
Output analyzer
Central processing unit (CPU)
Database specifications
Budget hierarchy
43. An IS backup facility that has the necessary electrical and physical components of a computer facility; but does not have the computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user
Cold site
Simple fail-over
Regression testing
Coaxial cable
44. A hardware/software package that is used to connect networks with different protocols. The gateway has its own processor and memory and can perform protocol and bandwidth conversions.
Internal storage
Materiality
Gateway
Exception reports
45. A data recovery strategy that takes a set of physically disparate disks and synchronously mirrors them over high performance communication lines. Any write to a disk on one side will result in a write on the other. The local write will not return unt
Geographic disk mirroring
Source code
Audit
Telnet
46. A response option in intrusion detection in which the system simply reports and records the problem detected; relying on the user to take subsequent action
Computer sequence checking
Access rights
Passive response
Expert systems
47. Authorized users of a computer system who overstep their legitimate access rights. This category is divided into masqueraders and clandestine users.
Test programs
Online data processing
Internal penetrators
Integrated services digital network (ISDN)
48. System narratives provide an overview explanation of system flowcharts; with explanation of key control points and system interfaces.
Reengineering
Digital certificate
System narratives
UNIX
49. A data transmission service requiring the establishment of a circuit-switched connection before data can be transferred from source data terminal equipment (DTE) to a sink DTE. A circuit-switched data transmission service uses a connection network.
Arithmetic-logic unit (ALU)
Circuit-switched network
RSA
Point-of-sale systems (POS)
50. Editing ensures that data conform to predetermined criteria and enable early identification of potential errors.
Editing
Check digit verification (self-checking digit)
Harden
Detailed IS ontrols