SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA Certified Information Systems Auditor Vocab
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Purposefully hidden malicious or damaging code within an authorized computer program. Unlike viruses; they do not replicate themselves; but they can be just as destructive to a single computer.
Shell
Prototyping
Queue
Trojan horse
2. The acts preventing; mitigating and recovering from disruption. The terms business resumption planning; disaster recovery planning and contingency planning also may be used in this context; they all concentrate on the recovery aspects of continuity.
Virtual private network (VPN)
Whitebox testing
Continuity
COSO
3. A data recovery strategy that includes a recovery from complete backups that are physically shipped off site once a week. Specifically; logs are batched electronically several times daily; and then loaded into a tape library located at the same facil
Enterprise governance
Addressing
Bulk data transfer
Taps
4. The act of copying raw data from one place to another with little or no formatting for readability. Usually; dump refers to copying data from main memory to a display screen or a printer. Dumps are useful for diagnosing bugs. After a program fails; o
Memory dump
Data integrity
Parallel simulation
RADIUS
5. Memory reserved to temporarily hold data. Buffers are used to offset differences between the operating speeds of different devices; such as a printer and a computer. In a program; buffers are reserved areas of RAM that hold data while they are being
Queue
Base case
Detailed IS ontrols
Buffer
6. A popular local area network operating system developed by the Novell Corp.
Content filtering
Public key
Netware
Log
7. The process that limits and controls access to resources of a computer system; a logical or physical control designed to protect against unauthorized entry or use. Access control can be defined by the system (mandatory access control; or MAC) or defi
Circular routing
Access control
Sequential file
ICMP (internet control message protocol)
8. An entity (department; cost center; division or other group) responsible for entering and maintaining budget data.
Tcpdump
Budget organization
Systems development life cycle (SDLC)
Application software tracing and mapping
9. A document that has been approved by the IETF becomes an RFC and is assigned a unique number once published. If it gains enough interest; it may evolve into an Internet standard.
Access path
RFC (request for comments)
Split data systems
Dry-pipe fire extinguisher system
10. Machine-readable instructions produced from a compiler or assembler program that has accepted and translated the source code
Full duplex
Object code
Dumb terminal
Dry-pipe fire extinguisher system
11. The router at the extreme edge of the network under control; usually connected to an ISP or other service provider; also known as border router
External router
Payment system
Expert systems
Echo checks
12. A group of budgets linked together at different levels such that the budgeting authority of a lower-level budget is controlled by an upper-level budget.
Spoofing
Utility programs
Budget hierarchy
Network administrator
13. A disk access method that stores data sequentially; while also maintaining an index of key fields to all the records in the file for direct access capability
Indexed sequential access method (ISAM)
Electronic signature
Application controls
Hash total
14. Computer operating instructions which detail the step-by-step processes that are to occur so an application system can be properly executed. It also identifies how to address problems that occur during processing.
Telecommunications
Audit plan
Error risk
Run instructions
15. A complex set of software programs that control the organization; storage and retrieval of data in a database. It also controls the security and integrity of the database.
Port
Finger
Database management system (DBMS)
Gateway
16. The boundary defining the scope of control authority for an entity. For example; if a system is within the control perimeter; the right and ability exists to control it in response to an attack.
Enterprise governance
Control perimeter
Continuity
Cleartext
17. To record details of information or events in an organized record-keeping system; usually sequenced in the order they occurred
Sniffing
Local area network (LAN)
Corporate governance
Log
18. A proxy service that connects programs running on internal networks to services on exterior networks by creating two connections; one from the requesting client and another to the destination service
Hierarchical database
Error risk
Application proxy
Fail-over
19. An entity that may be given responsibility for performing some of the administrative tasks necessary in the registration of subjects; such as confirming the subject's identity; validating that the subject is entitled to have the attributes requested
Node
Registration authority (RA)
Simple fail-over
Fraud risk
20. A project management technique used in the planning and control of system projects
Ethernet
Program evaluation and review technique (PERT)
Passive assault
Voice mail
21. The process of transmitting messages in convenient pieces that can be reassembled at the destination
Personal identification number (PIN)
Packet switching
Reciprocal agreement
Permanent virtual circuit (PVC)
22. Attackers that penetrate systems by using user identifiers and passwords taken from legitimate users
Masqueraders
ISP (Internet service provider)
Intrusion detection
Microwave transmission
23. A resource whose loss will result in the loss of service or production
Control risk
Link editor (linkage editor)
Single point of failure
Decentralization
24. A tunnelling protocol developed by Cisco Systems to support the creation of VPNs
Applet
L2F (Layer 2 forwarding)
Program narratives
Packet
25. A computer program or series of programs designed to perform certain automated functions. These functions include reading computer files; selecting data; manipulating data; sorting data; summarizing data; performing calculations; selecting samples an
Default password
Parity check
Generalized audit software
Electronic data interchange (EDI)
26. Allows the network interface to capture all network traffic irrespective of the hardware device to which the packet is addressed
Fraud risk
Promiscuous mode
Irregularities
Database
27. Refers to the processes by which organisations conduct business electronically with their customers and or public at large using the Internet as the enabling technology.
Business-to-consumer e-commerce (B2C)
Check digit verification (self-checking digit)
Budget
Static analysis
28. An audit designed to determine the accuracy of financial records; as well as evaluate the internal controls of a function or department
Smart card
Comprehensive audit
Audit objective
Private key cryptosystems
29. Identified by one central processor and databases that form a distributed processing configuration
Mapping
Certificate Revocation List
Antivirus software
Centralized data processing
30. The outward impression of being self-governing and free from conflict of interest and undue influence
Strategic risk
Independent appearance
Application programming
Corporate governance
31. Unauthorized electronic exits; or doorways; out of an authorized computer program into a set of malicious instructions or programs
Gateway
Trap door
Wiretapping
Privacy
32. The quality or state of not being named or identified
Security policy
Direct reporting engagement
Anonymity
Audit
33. A sub-network of the Internet through which information is exchanged by text; graphics; audio and video.
Hot site
Error
world wide web (WWW)
HTTP (hyper text transfer protocol)
34. Making sure the modified/new system includes appropriate access controls and does not introduce any security holes that might compromise other systems
Trap door
Data integrity
Security testing
Alpha
35. Any automated audit technique; such as generalized audit software; test data generators; computerized audit programs and specialized audit utilities
Whitebox testing
Protocol converter
Computer-assisted audit technique (CAATs)
Controls (Control procedures)
36. Commonly it is the network segment between the Internet and a private network. It allows access to services from the Internet and the internal private network; while denying access from the Internet directly to the private network.
Spool (simultaneous peripheral operations online)
Signatures
Dry-pipe fire extinguisher system
DMZ (demilitarized zone)
37. Permanent reference data used in transaction processing. These data are changed infrequently; such as a product price file or a name and address file.
Permanent virtual circuit (PVC)
World Wide Web Consortium (W3C)
Standing data
Split data systems
38. Systems for which detailed specifications of their components composition are published in a nonproprietary environment; thereby enabling competing organizations to use these standard components to build competitive systems. The advantages of using o
Intranet
Comprehensive audit
Pervasive IS controls
Open systems
39. An independent audit of the control structure of a service organization; such as a service bureau; with the objective of providing assurances to the users of the service organization that the internal control structure is adequate; effective and soun
Topology
Hacker
Third-party review
Application security
40. Processing is achieved by entering information into the computer via a video display terminal. The computer immediately accepts or rejects the information; as it is entered.
Control Objectives for Enterprise Governance
Node
Electronic signature
Online data processing
41. A private network that is configured within a public network. For years; common carriers have built VPNs that appear as private national or international networks to the customer; but physically share backbone trunks with other customers. VPNs enjoy
Gateway
Virtual private network (VPN)
Preventive controls
Generalized audit software
42. Software used to create data to be used in the testing of computer programs
Electronic funds transfer (EFT)
Decentralization
Electronic cash
Test generators
43. Unusual or statistically rare
Dry-pipe fire extinguisher system
Logoff
Control perimeter
Anomaly
44. An international consortium founded in 1994 of affiliates from public and private organizations involved with the Internet and the web. The W3C's primary mission is to promulgate open standards to further enhance the economic growth of Internet web s
Utility software
HTTP (hyper text transfer protocol)
Vulnerability analysis
World Wide Web Consortium (W3C)
45. Also known as ''automated remote journaling of redo logs.'' A data recovery strategy that is similar to electronic vaulting; except that instead of transmitting several transaction batches daily; the archive logs are shipped as they are created.'
Router
Structured Query Language (SQL)
Biometrics
Transaction protection
46. The systems development phase in which systems specifications and conceptual designs are developed; based on end-user needs and requirements
Address
IP (Internet protocol)
Systems analysis
Netware
47. The ability of end users to design and implement their own information system utilizing computer software products
End-user computing
Virus
Handprint scanner
Integrity
48. A document which defines the IS audit function's responsibility; authority and accountability
Incremental testing
Accountability
Audit charter
Hot site
49. The information an auditor gathers in the course of performing an IS audit. Evidence is relevant if it pertains to the audit objectives and has a logical relationship to the findings and conclusions it is used to support.
Evidence
Trusted systems
Sequential file
Useful audit evidence
50. Verifies that the control number follows sequentially and any control numbers out of sequence are rejected or noted on an exception report for further research
Finger
Audit charter
Computer sequence checking
Reasonable assurance
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests