IA Knowledge VI Flashcards

(110 cards)

1
Q

A computer network made up of local-area networks over a large area (e.g., nation or world) using multiple transmission media.

A

Wide-area network (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Self-replicating malicious software that can disrupt networks or computers.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malicious code that attaches itself to storage media, documents, or executable files and is spread when the files are shared with others.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Use open Internet protocols and standards to create stand-alone, modular software called services that are capable of describing themselves and integrating with other similar services.

A

Web services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The combination of transfer protocol, domain name, directory path, and document name.

A

Uniform Resource Locator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A secure method of connecting two points on the Internet, often run by an Internet service providers.

A

Virtual private network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A type of firewall that enhances packet filtering by monitoring packet flows in general.

A

Stateful inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Process or transaction-level controls that must be in place for management and governance controls to be effective. They are usually specific to a given application but may also control larger technical processes such as system access rights.

A

Technical controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Unsolicited bulk e-mail.

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A network topology in which each device is wired to a central device that routes data to or from other devices, eliminating the need to wire between devices.

A

Star network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A contract between an organization and a software vendor specifying terms of use.

A

Software license agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Making illegal duplicate copies of software or installation of software beyond what is allowed in a license agreement.

A

Software piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A powerful computer with high bandwidth dedicated to a specific task such as providing access to files or managing the common application needs of an organization.

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A software system design that allows for sharing of Web services as needed; a service consumer gets Web services from various service providers.

A

Service-oriented architecture (SOA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The overall rules for a database.

A

Schema

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The processes an organization puts into place so that security controls and expenditures are fully commensurate with the risks to which the organization is exposed.

A

Security risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The acceptable levels of variation relative to the achievement of objectives.

A

Risk tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In terms of networking hardware, an intelligent processor that networks devices using protocols.

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A database management system that is arranged into two-dimensional files called tables, with links between tables that share a common attribute.

A

Relational database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A network topology in which the network is arranged in a circle, so two paths for data are available.

A

Ring network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In a database, a logical grouping of fields.

A

Record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A hardware control in which each transmitted data element receives an additional bit (character) of data mathematically related to the data; abnormal changes will void the mathematical relationship.

A

Redundant character check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Automated error checks built into computer processing as well as segregation of duties such as controlling programmers’ access to files and records. They check that data processing tasks are accurate, complete, and valid.

A

Processing controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

An encryption method in which two keys are created, private and public. The sender places the public key in a directory or an application automatically applies it to lock sent data; to decrypt the data, the private key must be used

A

Public key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
In a database, a unique key field number (i.e., a proper noun) used to identify a specific entity.
Primary key
26
An encryption method in which a sender creates an encryption key and sends it to a trusted receiver, who can use it to decrypt all messages in that session.
Private key encryption
27
In terms of networking hardware, a physical connection point to a device
Port
28
A type of proactive control that deters undesirable events from occurring.
Preventive control
29
A type of computer network that is a direct connection between two computers.
Peer-to-peer network
30
The means of preventing access to an asset such as locks and/or key cards preventing access to a building, to data centers, and to key operational areas.
Physical access controls
31
A type of firewall that compares source and destination addresses to an allowed list, examining headers and other fields in packets of data.
Packet filtering
32
The installation of released bug fixes to applications that are already in production.
Patch management
33
Process or transaction-level controls that find errors and verify the accuracy, completeness and validity of output data after processing is complete.
Output controls
34
A general term describing a logical grouping of data passing through network layers.
Packet
35
A method of defining how messages should be sent through a network so that unrelated products can work together.
Open Systems Interconnection (OSI) reference model
36
The software interface between the hardware and the applications and end user.
Operating system (O/S)
37
Hardware and software systems on a network that analyze incoming packet content, dropping malicious packets.
Network IPS (NIPS)
38
Software that allows multiple perspectives for a set of data to be analyzed.
Online analytical processing (OLAP)
39
Networking hardware that combines multiple channels into a single channel, such as multiple phone lines sharing a single physical phone line.
Multiplexer
40
Used by firewalls with packet filtering and stateful inspection to hide the internal host computer IP addresses from sniffer utilities.
Network address translation (NAT)
41
IT controls that determine and mitigate risks to critical assets, sensitive data, or operations, including standards, organizational structure, and physical and environmental controls.
Management controls
42
Type of processing that is halfway between batch and real-time processing. Creates real-time entries that are posted to a temporary memo file (which allows the updated information to be viewed); at a designated time the memo file is batch-processed to update the master file.
Memo posting
43
A type of computer network for a limited geographical area such as a building.
Local-area network (LAN)
44
A large computer capable of supporting massive inputs and outputs and many concurrent users.
Mainframe computer
45
In a database, the field used to identify an entity, such as employee number.
Key field
46
A type of control that requires data to be entered twice, by different persons if possible, and highlights any differences.
Keystroke verification
47
An organization that provides connection to the Internet via a TCP/IP (Transmission Control Protocol/Internet Protocol) connection or provides network services (IP network).
Internet service provider (ISP)
48
An internal network for employees built using thin-client tools, standards, and protocols of the World Wide Web and the Internet.
Intranent
49
A series of high-capacity trunk lines owned and operated by network service providers (e.g., long-distance telephone companies or governments).
Internet backbone
50
Numeric address for a specific computer located on the Internet, e.g., 128.6.13.42.
Internet protocol (IP) address
51
A process designed to provide reasonable assurance regarding the achievement of objectives in the categories of effectiveness and efficiency of operations, reliability of financial reporting, and compliance with applicable laws and regulations.
Internal control
52
A network of networks that have devoted a portion of their processing power and data to public use.
Internet
53
A type of control intended to prevent computer errors by controlling data as it manually or electronically enters the system.
Input controls
54
A type of control that tracks all read-only access to records.
Inquiry log
55
The illegal use of sensitive information to impersonate an individual over computer networks in order to defraud the person or commit a crime without the perpetrator's true identity being known.
Identity theft
56
The risk that inaccurate information is used to make a business decision.
Information risk
57
Regular and encrypted versions of the communications standard for Internet message formatting and transmission.
HTTP/HTTPS (Hypertext Transfer Protocol/Secure HTTP)
58
In terms of networking hardware, a port switching communications device.
Hub
59
Entity-level IT controls that applies generally to the IT environment or overall mix of systems, networks, data, people, and processes.
General control
60
Software that functions at the operating system kernel level to detect and block abnormal application behavior before it executes.
Host IPS (HIPS)
61
Networking hardware that connects networks with dissimilar architectures.
Gateway
62
A type of firewall that stops traffic flowing to a specific application such as File Transfer Protocol.
Gateway firewall
63
A hardware/software combination that routes all communications to or from the outside world through it, blocking unauthorized traffic.
Firewall
64
A type of control that checks to see that data is entered in an acceptable format.
Format check
65
In a database, a collection of related records.
File
66
Allows transfer of large files between computers on a network or the Internet.
File Transfer Protocol (FTP)
67
In a database, a business object such as a name or an asset.
Field
68
A type of control that involves a check to see if information in an entry field is complete.
Field check
69
A network that is similar to an intranet but is designed for customers, external partners, or suppliers.
Extranet
70
Components that have redundancies in hardware or software to allow continued operations if a system fails.
Fault-tolerant components
71
In a database, a record that relates to a person, place, or thing.
Entity
72
Software systems that capture the knowledge of a professional using a series of decision points; used to automate complex situations requiring judgment, such as the probability of loan default.
Expert systems
73
A portfolio of technologies that help disparate applications communicate.
Enterprise application integration (EAI)
74
Modular suites of business applications that share data between modules seamlessly and store all data in a single repository.
Enterprise resource planning (ERP) systems
75
A type of control that involves automated tests on data fields.
Edit check
76
Use of a mathematical algorithm to scramble data so that it cannot be unscrambled without a numeric key code.
Encryption
77
A hardware control in which a process is done twice and compared.
Duplicate process check
78
A hardware control in which received data is returned to the sender for comparison.
Echo check
79
A hierarchical server network that maintains the domain names for conversion to IP addresses.
Domain name system (DNS)
80
An input/output node for a mainframe system, consisting of either just a display and entry devices or a PC running terminal emulation software.
Dumb terminal
81
Uses public key encryption and a hashing algorithm (information about the transmitted data) to prevent an original message from being reconstructed.
Digital signature
82
A plain language label referring to a numeric IP address.
Domain name
83
An application that links users and programs to a database and allows the database to be manipulated by multiple applications.
Database management system (DBMS)
84
A broad category of software systems designed not to make decisions but to enhance information available to management in making decisions.
Decision support systems (DSS)
85
Database designed to collect the information from one or more transactional databases for purposes of multiyear storage of records and reporting.
Data warehouse
86
Any repository of data in a computer system.
Database
87
A user-friendly method of querying a database for information.
Data query language
88
An input/output node for a mainframe system, consisting of either just a display and entry devices or a PC running terminal emulation software.
Data terminal
89
A language that has commands for viewing or changing a database.
Data manipulation language
90
The capability of sifting through and analyzing large volumes of data to find certain patterns or associations.
Data mining
91
A master record concerning the data in a database.
Data dictionary
92
In a database, the specific data in fields.
Data items
93
The removal of redundancies and errors in a database.
Data cleansing
94
Describes the data and the relationships between data in a database, including logical access paths and records.
Data definition language
95
Files intended to be accessible only by the creator that are used to store data about a user's preferences.
Cookies
96
IT controls that are used once errors, fraud, or other control issues have been detected. These are designed to allow manual or automated correction of errors or irregularities discovered by detective controls.
Corrective controls
97
A computer network formed by a group of organizations to assist in intercommunications.
Consortium network
98
A system of internal controls for managing the availability of computer and other resources and data after a processing disruption.
Contingency planning
99
A network architecture that uses servers for specialized functions; clients (the recipients of these functions) are PCs that send requests to the servers.
Client/server architecture
100
The sum of all infrastructure and applications required to connect two or more network nodes (computers and devices).
Computer network
101
Any alphanumeric key; the item that is second-lowest in the database hierarchy.
Character
102
A type of control in which an extra digit is added that has an algorithmic relationship to the remaining digits to show if the number was incorrectly entered such as by transposition.
Check digits
103
A network topology that has a main line (bus); all devices are connected to the line.
Bus network
104
A set of processes developed for the entire enterprise, outlining the actions to be taken by the information technology (IT) organization, executive staff, and various business units in order to quickly resume operations in the event of a business disruption or service outage.
Business continuity plan
105
A binary digit; the item that is lowest in the database hierarchy.
Bit
106
Networking hardware that connects two or more LANs with similar architectures.
Bridge
107
In a database, fields relating to entities.
Attributes
108
A type of processing that accumulates data changes until a set time and then releases them to the database.
Batch processing
109
An IT control related to the specific functioning of an application system that supports a specific business process.
Application control
110
A type of firewall that serves as an intermediary for communications between the external world and private internal servers; intercepts external packets and, after inspection, relays a version of the information, called a proxy, to the private server, and vice versa.
Application gateway/proxy server