100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ISACA-CISA Extended Glossary () Study Guide $14.49   Add to cart

Exam (elaborations)

ISACA-CISA Extended Glossary () Study Guide

 8 views  0 purchase
  • Course
  • CISA - Certified Information Systems Auditor
  • Institution
  • CISA - Certified Information Systems Auditor

ISACA-CISA Extended Glossary () Study Guide Abend * - Answer️️ -An abnormal end to a computer job; termination of a task prior to its completion because of an error condition that cannot be resolved by recovery facilities while the task is executing. Acceptable use policy - Answer️️ -A ...

[Show more]

Preview 4 out of 177  pages

  • August 16, 2024
  • 177
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CISA - Certified Information Systems Auditor
  • CISA - Certified Information Systems Auditor
avatar-seller
OliviaWest
©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM



ISACA-CISA Extended Glossary (2024-2025) Study Guide


Abend * - Answer✔️✔️-An abnormal end to a computer job; termination of a task

prior to its completion because of an error condition that cannot be resolved by

recovery facilities while the task is executing.


Acceptable use policy - Answer✔️✔️-A policy that establishes an agreement

between users and the enterprise and defines for all parties' the ranges of use that

are approved before gaining access to a network or the Internet


Access control * - Answer✔️✔️-The processes, rules and deployment mechanisms

that control access to information systems, resources and physical access to

premises.


Access control list (ACL) * - Answer✔️✔️-An internal computerized table of access

rules regarding the levels of computer access permitted to logon IDs and computer

terminals. Also referred to as access control tables.


Access control table * - Answer✔️✔️-An internalized computerized table of access

rules regarding the levels of computer access permitted to logon IDs and computer

terminals.




1

,©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM


Access path * - Answer✔️✔️-The logical route an end user takes to access

computerized information. Typically, it includes a route through the operating

system, telecommunications software, selected application software and the access

control system.


Access rights * - Answer✔️✔️-The permission or privileges granted to users,

programs or workstations to create, change, delete or view data and files within a

system, as defined by rules established by data owners and the information security

policy.


Access servers * - Answer✔️✔️-Provides centralized access control for managing

remote access dial-up servers.


Access method * - Answer✔️✔️-The technique used for selecting records in a file;

one at a time, for processing, retrieval or storage. The access method is related to,

but distinct from, the file organization, which determines how the records are

stored.


Address * - Answer✔️✔️-Within computer storage, the code used to designate the

location of a specified piece of data.




2

,©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM


Address space * - Answer✔️✔️-The number of distinct locations that may be

referred to with the machine address. For most binary machines it is equal to 2n,

where n is the number of bits in the machine address.


Addressing * - Answer✔️✔️-The method used to identify the location of a

participant in a network. Ideally, adressing specifies where the participant is

located rather than who they are (name) or how to get there (routing).


Administrative audit - Answer✔️✔️-Verifies that appropriate policies and procedures

exist, and that they have been implemented as management intended. This audit

focuses on operational effectiveness and efficiency.


Administrative controls * - Answer✔️✔️-The rules, procedures and practices dealing

with operational effectiveness, efficiency and adherence to regulations and

management policies.


Advanced Encryption Standard (AES) - Answer✔️✔️-Symmetric-key encryption

system designed by Belgian mathematicians. Also known as the Rijndael,

Advanced Encryption Standard (AES) replaces the outdated Data Encryption

Standard (DES) previously used by the U.S. government. This is the de facto

standard for many applications because AES is approved by the U.S. National




3

, ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM


Institute of Standards and Technology (NIST) for unclassified and certain

classified information.


Adware * - Answer✔️✔️-A software package that automatically plays, displays or

downloads advertising material to a computer after the software is installed on it or

while the application is being used. In most cases, this is done without any

notification to the user or without the user's consent. The term adware may also

refer to software that displays advertisements, whther or not it does so with the

user's consent; such programs display advertisements as an alternative to shareware

registration fees. These are classified as adware in the sense of advertising

supported software, but not as spyware. Adware in this form does not operate

surreptitiously or mislead the user, an dprovides the user with a specific service.


After-image - Answer✔️✔️-Changes to data in the database are held in a temporary

file called the after-image journal. The transaction can be reversed (discarded) until

the program writes the change into the master file. Also see before-image and

ACID principle.


Agile development - Answer✔️✔️-A micromanagement methodology to force

development within a series of short time boxes. Agile is used for the development

of prototypes. The focus is on tactile knowledge in a person's mind, rather than the

use of formal SDLC design and development documentation.



4

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller OliviaWest. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $14.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

73243 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$14.49
  • (0)
  Add to cart