Cisa Exam Cram 2

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

languages

LANs (Local Area Networks) 2nd 3rd 4th 5th laptops lattice-based access

layers (OSI)

     Layer 1 (Physical) 2nd     Layer 2 (Data Link) 2nd 3rd     Layer 3 (Network) 2nd

     Layer 4 (Transport) 2nd 3rd     Layer 5 (Session) 2nd 3rd

     Layer 6 (Presentation) 2nd 3rd     Layer 7 (Application) 2nd 3rd     table of 2nd

liability insurance 2nd

life cycle of projects 2nd

life cycles

     SDLC (Software Development Life Cycle) 2nd 3rd         Classic Life Cycle Model

         design 2nd 3rd

         development 2nd 3rd         feasibility 2nd

         implementation 2nd 3rd

         Linear Sequential Model

         programming languages         prototyping 2nd         RAD (rapid application development) 2nd

         requirements definition 2nd 3rd

         Software Capability Maturity Model (CMM) 2nd

         Waterfall Method 2nd

limit checks

line management 2nd 3rd

Linear Sequential Model

lists

     ACLs (access-control lists) 2nd

Local Area Networks (LANs) 2nd 3rd 4th 5th

logic bombs

logical access controls 2nd 3rd

     access

     access paths     access-control matrices     ACLs (access-control lists) 2nd

     authentication 2nd 3rd 4th

         alert thresholds         passwords 2nd         two-factor (strong) authentication

     authorization     centralized/decentralized

     discretionary access

     identification 2nd 3rd 4th

     lattice-based access     MACs (mandatory access controls) 2nd     nondiscretionary access 2nd

     restricted interfaces

     role-based access     rule-based access     subjects 2nd

     task-based access logical relationship checks

logical security controls 2nd 3rd

Категории