Cisa Exam Cram 2

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

table look-ups

tape storage 2nd 3rd task-based access TCP (Transmission Control Protocol)

TCP/IP (Transmission Control Protocol/Internet Protocol) 2nd 3rd

technical infrastructure 2nd     exam prep questions 2nd 3rd 4th 5th 6th     hardware 2nd 3rd

         change control 2nd 3rd         configuration management 2nd 3rd

         CPUs (central processing units)         I/O components         mainframes

         microcomputers

         minicomputers

         multiprocessing

         multitasking         multithreading

         notebooks/laptops

         PDAs (personal digital assistants)         risks and controls 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

         supercomputers

     IS operational practices 2nd

         risks and controls 2nd     IT organizational structure 2nd 3rd 4th     networks 2nd 3rd 4th

         bridges 2nd

         bus topology

         collisions 2nd

         data encapsulation 2nd

         Ethernet 2nd

         extranets 2nd

         firewalls 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

         hubs/switches 2nd

         Internet

         intranets

         LANs (Local Area Networks) 2nd 3rd 4th 5th

         MANs (Metropolitan Area Networks) 2nd 3rd

         modems 2nd         OSI (Open Systems Interconnect) model 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th         ring topology 2nd

         risks and controls 2nd 3rd

         routers 2nd         star topology 2nd         TCP/IP (Transmission Control Protocol/Internet Protocol) 2nd 3rd

         VPN (virtual private networking)         WANs (Wide Area Networks) 2nd

     system performance and monitoring processes 2nd

     systems software 2nd

         change control 2nd         configuration management 2nd         DBMS (database management systems) 2nd 3rd

         firmware

         middleware 2nd         operating systems 2nd         risks and controls 2nd

technical infrastructure management     help desk

     performance-measurement techniques 2nd     problem management/resource management procedures 2nd     scheduling

     service-level agreements

technical suppor

technical support

     Certified Tech Trainers CD-ROM technological feasibility studies

Telnet (Remote Terminal Control Protocol)

terminal-emulation software (TES) TES (terminal-emulation software)

testing

     application systems 2nd 3rd

     BCPs (business continuity plans)         full operational tests 2nd 3rd         paper tests

         preparedness tests

         walk-through tests

     blackbox testing

     compliance testing 2nd

     DRPs (disaster recovery plans)

         full operational tests 2nd 3rd

         paper tests

         preparedness tests

         walk-through tests

     interface/integration testing

     penetration testing 2nd 3rd

     regression testing

     security 2nd 3rd 4th 5th 6th 7th     substantive testing     system testing

     unit testing

     whitebox testing theft of servicethird-party services

     evaluating 2nd 3rd 4th 5th     risk-mitigation strategies 2nd 3rd

     SLAs (service-level agreements)

     when to use

threads throughput 2nd top-down testing approach

topologies (network)

     bus topology     ring topology 2nd     star topology 2nd

total power failure TP (transaction-processing) monitors

trade secret agreements traffic analysis 2nd transaction integrity

transaction-processing (TP) monitors

transaction-processing databases

Transmission Control Protocol (TCP)

Transmission Control Protocol/Internet Protocol (TCP/IP) 2nd 3rd Transport layer (OSI) 2nd 3rd

transportation teams

Triple DES (3DES) Trojan horses

tunneling protocol

tuples

two-factor authentication

Категории