Cisa Exam Cram 2

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

callback systems

Capability Maturity Model (CMM) carbon dioxide CAs (Certificate Authorities) 2nd

CCB (change control board)

CCB (change-control board) CCIPS (Computer Crime and Intellectual Property Section) CD-ROM 2nd 3rd 4th 5th 6th

     explanations of answers     installing 2nd

     minimum system requirements 2nd     question types     technical support

     test modes 2nd

central processing units (CPUs)

centralized access-control administration

CERT Coordination Center Certificate Authorities (CAs) 2nd

certificate revocation lists (CRLs)

certificates, digital 2nd certification

Certified Tech Trainers CD-ROM 2nd 3rd 4th 5th 6th

     explanations of answers

     installing 2nd     minimum system requirements 2nd     question types

     technical support

     test modes 2nd

change control 2nd 3rd 4th 5th

     systems software 2nd

change control board (CCB)

change management

     change control and emergency change-management 2nd

     strategies and policies 2nd 3rd

change requests (CRs) 2nd

change-control board (CCB)

change-management process

charts (PERT)

CIA triad circuit-level gateways 2ndCISA exam

     answer key 1 2nd 3rd 4th 5th 6th

     answer key 2 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th    exam prep questions         application systems 2nd 3rd 4th

         business process evaluation 2nd 3rd 4th 5th 6th 7th         disaster recovery and business continuity 2nd 3rd 4th

         IS audit process 2nd 3rd

         management, planning, and organization of IS 2nd 3rd

         security 2nd 3rd 4th 5th     practice exam 1 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th     practice exam 2 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

     self-assessment

         educational background 2nd         exam readiness 2nd         hands-on experience 2nd

         ideal Certified Information Systems Auditor candidate 2nd 3rd Classic Life Cycle Model

closing     projects CMM (Capability Maturity Model) 2nd

CMM (Software Capability Maturity Model) 2nd

CO2

CobiT framework

     hardware policy CobiT framework (ISACA) 2nd 3rd

Code of Professional Ethics (ISACA) 2nd 3rd 4th

codification 2nd cognitive passwords

cold sites

collisions (network) 2nd

Common Vulnerability and Exposure (CVE) communicating audit results 2nd 3rd 4thcommunication

     communicating audit results 2nd 3rd

     techniques 2nd

communications handlers

communications teams

completeness checks

compliance audits

compliance testing 2nd

Computer Crime and Intellectual Property Section (CCIPS)

computer operations

     segregation of duties

computing function point metrics 2nd

conclusions (audit) 2nd

    evidence         obtaining 2nd 3rd         preserving 2nd 3rd

     information-gathering techniques 2nd 3rd 4th

     organization's use of system platforms, IT infrastruction, and applications 2nd concurrency 2nd confidentiality agreements

configuration management     systems software 2nd

configuration management (hardware) 2nd 3rd

contingency policies

continuity risk contract audit objectives 2nd contract management 2nd

     confidentiality agreements

     contract audit objectives 2nd     discovery agreements     employee contracts

     noncompete agreements     trade secret agreements

control group control risk control self-assessment (CSA) 2nd

controlling

     projects

controls

     administrative controls     aligning with business objectives

         applications 2nd

         data management         IT department heads

         IT steering committees 2nd

         operations

         organizational structure 2nd 3rd         quality assurance         security department 2nd

         strategic planning 2nd

         technical support

     hardware 2nd 3rd 4th 5th 6th 7th

         aquisition control objectives 2nd 3rd 4th 5th

         CobiT framework

         ITT (invitation to tender) 2nd 3rd

     internal accounting controls

     IS operational practices 2nd

     logical access controls 2nd 3rd

         access

         access paths

         access-control matrices

         ACLs (access-control lists) 2nd         authentication 2nd 3rd 4th         authorization

         centralized/decentralized

         discretionary access         identification 2nd 3rd 4th         lattice-based access

         MACs (mandatory access controls) 2nd         nondiscretionary access 2nd

         restricted interfaces

         role-based access

         rule-based access         subjects 2nd         task-based access

     logical security controls 2nd 3rd

     network infrastructure 2nd 3rd     objectives and activities 2nd 3rd 4th     operational controls

     physical security controls 2nd 3rd 4th 5th 6th 7th         biometric systems 2nd

     systems software 2nd     table of 2nd controls (application) 2nd 3rd

     automated controls 2nd

     data integrity controls 2nd

     data validation edits and controls 2nd 3rd 4th

     EDI (electronic data interchange) 2nd 3rd     input/output controls

         batch controls

         input authorization 2nd     manual controls

     output controls 2nd

     processing controls 2nd

CPM (Critical Path Methodology) CPUs (central processing units) crackers

CRCs (cyclical redundancy checks)

credentials

crisis management. [See BCPs (business continuity plans), DRPs (disaster recovery plans)]

critical functions

Critical Path Methodology (CPM)

CRLs (certificate revocation lists)

CRM (customer relationship management)

CRs (change requests) 2nd

cryptography

CSA (control self-assessment) 2nd

Custom mode (Certified Tech Trainers CD-ROM)

customer relationship management (CRM)

CVE (Common Vulnerability and Exposure) cyclical redundancy checks (CRCs)

Категории