Cisa Exam Cram 2

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

RAD (rapid application development) 2nd

range checks rapid application development (RAD) 2nd readiness for CISA exam 2nd

reasonableness checks

reciprocal agreements 2nd 3rd 4th 5threcovery     DRPs (disaster recovery plans) 2nd

         backup and storage 2nd 3rd 4th 5th         BIA (business impact analysis) 2nd 3rd 4th 5th

         cold sites         critical functions         duplicate processing facilities 2nd

         evacuation planning 2nd 3rd

         evaluating 2nd 3rd 4th 5th 6th 7th 8th

         exam prep questions 2nd 3rd 4th

         hot sites 2nd         insurance 2nd

         natural disaster costs

         noncritical functions         process development 2nd 3rd

         reciprocal agreements 2nd 3rd 4th 5th

         response teams 2nd 3rd

         sensitive functions         testing 2nd 3rd         vital functions

         warm sites

referential integrity tests

regression testing

regulatory policies

relational databases 2nd

relational integrity tests

relocation teams

remote procedure calls (RPC)

Remote Terminal Control Protocol (Telnet)

remote-access services

reports 2nd 3rd

request for proposal (RFP) 2nd 3rd 4th

requirements definition (SDLC) 2nd 3rd residual risk 2nd 3rdresource management

     procedures 2nd

response teams 2nd 3rd restricted interfaces results of audits, communicating 2nd 3rd 4th

reviewwing audits 2nd RFP (request for proposal) 2nd 3rd 4th

ring topology 2nd

risk assessment

risk management 2nd 3rd 4th 5th 6th     audit risk     business risk

     continuity risk

     control risk     data integrity risks 2nd     definition of

     detection risk     hardware 2nd 3rd 4th 5th 6th 7th

         CobiT framework     impact     inherent risk

     IS operational practices 2nd

     IS, business, and audit risk 2nd 3rd

     IT governance 2nd

     network infrastructure 2nd 3rd     project-planning risk indicators 2nd

     qualitative impacts

     quantitative impacts     residual risk 2nd 3rd

     risk assessment

     risk mitigation

     risk-analysis methods 2nd 3rd     risk-based audit strategy and objectives 2nd 3rd     security risk

     system upgrade risks 2nd

     systems software 2nd

     threats

     vulnerabilities

risk mitigation

risk-analysis methods 2nd 3rd

risk-mitigation strategies

     third-party services 2nd 3rd

Rivest, Shamir, Adleman (RSA)

role-based access

roles (IS) 2nd 3rd

routers 2nd

RPC (remote procedure calls) RSA (Rivest, Shamir, Adleman) rule-based access

run-to-run totals

Категории