Test your basic knowledge |

CISA Certified Information Systems Auditor Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A numbering system that uses a base of 16 and uses 16 digits: 0; 1; 2; 3; 4; 5; 6; 7; 8; 9; A; B; C; D; E and F. Programmers use hexadecimal numbers as a convenient way of representing binary numbers.






2. The time it takes a system and network delay to respond. System latency is the time a system takes to retrieve data. Network latency is the time it takes for a packet to travel from source to the final destination.






3. An audit designed to evaluate the various internal controls; economy and efficiency of a function or department






4. A point in a routine at which sufficient information can be stored to permit restarting the computation from that point. NOTE: seems to pertain to recover - shutting down database after all records have been committed for example






5. A type of password (i.e.; a secret number assigned to an individual) that; in conjunction with some means of identifying the individual; serves to verify the authenticity of the individual. PINs have been adopted by financial institutions as the prim






6. Computer hardware that houses the electronic circuits that control/direct all operations of the computer system






7. Unusual or statistically rare






8. Small computers used to connect and coordinate communication links between distributed or remote devices and the main computer; thus freeing the main computer from this overhead function






9. Polymorphism refers to database structures that send the same command to different child objects that can produce different results depending on their family hierarchical tree structure.






10. Universal Description; Discovery and Integration






11. Controlling access to a network by analyzing the attributes of the incoming and outgoing packets and either letting them pass; or denying them; based on a list of rules






12. Purposefully hidden malicious or damaging code within an authorized computer program. Unlike viruses; they do not replicate themselves; but they can be just as destructive to a single computer.






13. A type of LAN architecture in which the cable forms a loop; with stations attached at intervals around the loop. Signals transmitted around the ring take the form of messages. Each station receives the messages and each station determines; on the bas






14. An Internet standard that allows a network to use one set of IP addresses for internal traffic and a second set of addresses for external traffic. The server; providing the NAT service; changes the source address of outgoing packets from the internal






15. The act or function of developing and maintaining applications programs in production






16. A discussion document which sets out an ''Enterprise Governance Model'' focusing strongly on both the enterprise business goals and the information technology enablers which facilitate good enterprise governance; published by the Information Systems






17. The process of feeding test data into two systems; the modified system and an alternative system (possibly the original system) and comparing results






18. A biometric device that is used to authenticate a user through palm scans






19. The rules by which a network operates and controls the flow and priority of transmissions






20. The risk to earnings or capital arising from an obligor's failure to meet the terms of any contract with the bank or otherwise to perform as agreed. Internet banking provides the opportunity for banks to expand their geographic range. Customers can r






21. Program narratives provide a detailed explanation of program flowcharts; including control points and any external input.






22. Is the risk to earnings or capital arising from movements in interest rates. From an economic perspective; a bank focuses on the sensitivity of the value of its assets; liabilities and revenues to changes in interest rates. Internet banking may attra






23. A stored collection of related data needed by organizations and individuals to meet their information processing and retrieval requirements






24. A software engineering technique whereby an existing application system code can be redesigned and coded using computer-aided software engineering (CASE) technology






25. An organization composed of engineers; scientists and students. The IEEE is best known for developing standards for the computer and electronics industry.






26. A set of utilities that implement a particular network protocol. For instance; in Windows machines a TCP/IP stack consists of TCP/IP software; sockets software and hardware driver software.






27. The practice of eavesdropping on information being transmitted over telecommunications links






28. A common connection point for devices in a network; hubs commonly are used to connect segments of a LAN. A hub contains multiple ports. When a packet arrives at one port; it is copied to the other ports so that all segments of the LAN can see all pac






29. A type of LAN architecture that utilizes a central controller to which all nodes are directly connected. All transmissions from one station to another pass through the central controller; which is responsible for managing and controlling all communic






30. A protocol used to transmit data securely between two end points to create a VPN






31. A file of semipermanent information that is used frequently for processing data or for more than one purpose






32. Also called permissions or privileges; these are the rights granted to users by the administrator or supervisor. Access rights determine the actions users can perform (e.g.; read; write; execute; create and delete) on files in shared volumes or file






33. Freedom from unauthorized intrusion






34. A series of steps to complete an audit objective






35. A system of computers connected together by a communications network. Each computer processes its data and the network supports the system as a whole. Such a network enhances communication among the linked computers and allows access to shared files.






36. Information generated by an encryption algorithm to protect the plaintext. The ciphertext is unintelligible to the unauthorized reader.






37. The list of rules and/or guidance that is used to analyze event data






38. Analysis of information that occurs on a noncontinuous basis; also known as interval-based analysis






39. A packet-switched wide-area-network technology that provides faster performance than older packet-switched WAN technologies such as X.25 networks; because it was designed for today's reliable circuits and performs less rigorous error detection. Frame






40. Refers to a sprinkler system that does not have water in the pipes during idle usage; unlike a fully charged fire extinguisher system that has water in the pipes at all times. The dry-pipe system is activated at the time of the fire alarm; and water






41. A technique of reading a computer file while bypassing the internal file/data set label. This process could result in bypassing of the security access control system.






42. A top-down technique of designing programs and systems. It makes programs more readable; more reliable and more easily maintained.






43. A device that forwards packets between LAN devices or segments. LANs that use switches are called switched LANs.






44. A structure of relationships and processes to direct and control the enterprise in order to achieve the enterprise's goals by adding value while balancing risk versus return over IT and its processes






45. Those controls that seek to maintain confidentiality; integrity and availability of information






46. Way of thinking; behaving; feeling; etc.






47. A communications channel that can handle only one signal at a time. The two stations must alternate their transmissions.






48. Consists of one or more web pages that may originate at one or more web server computers. A person can view the pages of a website in any order; as he or she would a magazine.






49. A router that is configured to control network access by comparing the attributes of the incoming or outgoing packets to a set of rules






50. Devices that perform the functions of both bridges and routers; are called brouters. Naturally; they operate at both the data link and the network layers. A brouter connects same data link type LAN segments as well as different data link ones; which






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests