Cisa Exam Cram 2

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

packet PDU (protocol data unit) 2nd

packet-filtering firewalls 2nd paper tests passive attacks 2nd

passwords 2nd

     cognitive passwords     dictionary attacks     one-time passwords

paths     access paths

payments     EFT (electronic funds transfer) PDAs (personal digital assistants)

PDU (protocol data unit)

     bits PDU 2nd

     data PDU 2nd

     frame PDU 2nd 3rd     packet PDU 2nd

     segment PDU 2nd

penetration testing 2nd 3rd penetration tests

performance

     performance-measurement techniques 2nd

performance indicators 2nd 3rd 4th personal digital assistants (PDAs) personnel management

personnel-management

     techniques 2nd 3rd

PERT (program evaluation review technique) 2nd

physical controls 2nd 3rd 4th 5th

     biometric systems 2nd

Physical layer (OSI) 2nd

physical security controls 2nd

PKI (public key infrastructure) 2nd 3rd

planning

    BCP (business continuity management)

         strategies and policies 2nd 3rd

     BCPs (business continuity plans) 2nd

         backup and storage 2nd 3rd 4th 5th         BIA (business impact analysis) 2nd 3rd 4th 5th         cold sites

         critical functions

         duplicate processing facilities 2nd         evacuation planning 2nd 3rd         evaluating 2nd 3rd 4th 5th 6th 7th 8th

         exam prep questions 2nd 3rd 4th         hot sites 2nd

         insurance 2nd

         natural disaster costs

         noncritical functions         process development 2nd 3rd         reciprocal agreements 2nd 3rd 4th 5th

         response teams 2nd 3rd

         sensitive functions         testing 2nd 3rd         vital functions

         warm sites    DRP (disaster recovery planning)

         strategies and policies 2nd 3rd     DRPs (disaster recovery plans) 2nd         backup and storage 2nd 3rd 4th 5th

         BIA (business impact analysis) 2nd 3rd 4th 5th

         cold sites

         critical functions

         duplicate processing facilities 2nd         evacuation planning 2nd 3rd

         evaluating 2nd 3rd 4th 5th 6th 7th 8th

         exam prep questions 2nd 3rd 4th         hot sites 2nd

         insurance 2nd

         natural disaster costs

         noncritical functions         process development 2nd 3rd         reciprocal agreements 2nd 3rd 4th 5th

         response teams 2nd 3rd

         sensitive functions

         testing 2nd 3rd

         vital functions

         warm sites

     IS steering committees 2nd

     planning policies

     projects

     strategic planning 2nd 3rd 4th

planning policies

Point-to-Point Tunneling Protocol (PPTP)

policies 2nd

     advisory policies     BCP (business continuity management) 2nd 3rd     contingency policies

     contract management 2nd

         confidentiality agreements         contract audit objectives 2nd         discovery agreements

         employee contracts         noncompete agreements

         trade secret agreements

    deployment

         evaluating process for 2nd     development 2nd         evaluating process for 2nd

     DRP (disaster recovery planning) 2nd 3rd

     ensuring compliance with 2nd 3rd     financial and accounting policies     hardware policies

     informative policies     network policies

     operations policies     organizational policies     planning policies

     problem- and change management 2nd 3rd

     project management 2nd 3rd 4th

         project life cycle 2nd

         risk indicators 2nd         system upgrade risks 2nd

     quality management 2nd 3rd 4th 5th

         accreditation         certification

         ISO 9001 2nd

         ISO 9126 2nd

         QA (quality assurance)         QC (quality control)         Software Capability Maturity Model (CMM) 2nd

     regulatory policies

     security

     security management 2nd 3rd 4th 5th 6th 7th

         CIA triad

         data integrity risks 2nd

         logical controls 2nd 3rd

         physical controls 2nd

     security policies

policies. [See also procedures, strategies]

policy development 2nd

     evaluating process for 2nd

polymorphic viruses

post-implementation review techniques 2nd power failures 2nd PPTP (Point-to-Point Tunneling Protocol)

practice exam 1 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

     answer key 2nd 3rd 4th 5th 6th practice exam 2 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th     answer key 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

practices     application-implementation practices 2nd

preparedness tests

Presentation layer (OSI) 2nd 3rd

preserving evidence 2nd 3rd print services private keys

problem logs

problem management     procedures 2nd     strategies and policies 2nd 3rd

procedures 2nd 3rd 4th     definition of

     ensuring compliance with 2nd 3rd     security procedures. [See also policies, strategies]

process owners

     security management responsibilities

processes

     application system-acquisition processes 2nd processing controls 2nd

procurement control

program evaluation review technique (PERT) 2nd programming languages

project management 2nd 3rd 4th 5th

     CPM (Critical Path Methodology)

     FPA (function point analysis) 2nd     PERT (program evaluation review technique) 2nd     strategies and policies 2nd 3rd 4th

         project life cycle 2nd

         risk indicators 2nd

         system upgrade risks 2nd

     work breakdown structure

projects

     closing

     controlling

     life cycle 2nd

     monitoring

     planning

     scheduling

property insurance 2nd

protection. [See security]protocol data unit. [See PDU]protocols

     ARP (Address Resolution Protocol)

     DNS (Domain Name Service)     ICMP (Internet Control Message Protocol)     IP (Internet Protocol)

     IPSec     NFS (Network File System)

     PPTP (Point-to-Point Tunneling Protocol)

     SMTP (Simple Mail Transfer Protocol)

     SSL (Secure Sockets Layer)     TCP (Transmission Control Protocol)     TCP/IP (Transmission Control Protocol/Internet Protocol) 2nd 3rd

     Telnet (Remote Terminal Control Protocol)

     tunneling protocol     UDP (User Datagram Protocol) prototyping 2nd

proxy firewalls 2nd 3rd 4th 5th 6th public key infrastructure (PKI) 2nd 3rd

public keys 2nd 3rd

Категории