100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

ISACA-CISA Extended Glossary () Questions & 100% Correct Answers

Rating
-
Sold
-
Pages
224
Grade
A+
Uploaded on
09-09-2024
Written in
2024/2025

Abend * :~~ An abnormal end to a computer job; termination of a task prior to its completion because of an error condition that cannot be resolved by recovery facilities while the task is executing. Acceptable use policy :~~ A policy that establishes an agreement between users and the enterprise and defines for all parties' the ranges of use that are approved before gaining access to a network or the Internet Access control * :~~ The processes, rules and deployment mechanisms that control access to information systems, resources and physical access to premises. Access control list (ACL) * :~~ An internal computerized table of access rules regarding the levels of computer access permitted to logon IDs and computer terminals. Also referred to as access control tables. 2 | P a g e | © copyright 2024/2025 | Grade A+ Master01 | September, 2024/2025 | Latest update Access control table * :~~ An internalized computerized table of access rules regarding the levels of computer access permitted to logon IDs and computer terminals. Access path * :~~ The logical route an end user takes to access computerized information. Typically, it includes a route through the operating system, telecommunications software, selected application software and the access control system. Access rights * :~~ The permission or privileges granted to users, programs or workstations to create, change, delete or view data and files within a system, as defined by rules established by data owners and the information security policy. Access servers * :~~ Provides centralized access control for managing remote access dial-up servers. Access method * 3 | P a g e | © copyright 2024/2025 | Grade A+ Master01 | September, 2024/2025 | Latest update :~~ The technique used for selecting records in a file; one at a time, for processing, retrieval or storage. The access method is related to, but distinct from, the file organization, which determines how the records are stored. Address * :~~ Within computer storage, the code used to designate the location of a specified piece of data. Address space * :~~ The number of distinct locations that may be referred to with the machine address. For most binary machines it is equal to 2n, where n is the number of bits in the machine address. Addressing * :~~ The method used to identify the location of a participant in a network. Ideally, adressing specifies where the participant is located rather than who they are (name) or how to get there (routing). Administrative audit 4 | P a g e | © copyright 2024/2025 | Grade A+ Master01 | September, 2024/2025 | Latest update :~~ Verifies that appropriate policies and procedures exist, and that they have been implemented as management intended. This audit focuses on operational effectiveness and efficiency. Administrative controls * :~~ The rules, procedures and practices dealing with operational effectiveness, efficiency and adherence to regulations and management policies. Advanced Encryption Standard (AES) :~~ Symmetric

Show more Read less
Institution
Module











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Module

Document information

Uploaded on
September 9, 2024
Number of pages
224
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

1 | P a g e | © copyright 2024/2025 | Grade A+




ISACA-CISA Extended Glossary (2011-
2015) Questions & 100% Correct
Answers
Abend *


✓ :~~ An abnormal end to a computer job; termination of a task prior to its

completion because of an error condition that cannot be resolved by

recovery facilities while the task is executing.




Acceptable use policy


✓ :~~ A policy that establishes an agreement between users and the

enterprise and defines for all parties' the ranges of use that are approved

before gaining access to a network or the Internet




Access control *

✓ :~~ The processes, rules and deployment mechanisms that control access

to information systems, resources and physical access to premises.




Access control list (ACL) *

✓ :~~ An internal computerized table of access rules regarding the levels of

computer access permitted to logon IDs and computer terminals. Also

referred to as access control tables.




Master01 | September, 2024/2025 | Latest update

, 2 | P a g e | © copyright 2024/2025 | Grade A+


Access control table *

✓ :~~ An internalized computerized table of access rules regarding the levels

of computer access permitted to logon IDs and computer terminals.




Access path *


✓ :~~ The logical route an end user takes to access computerized

information. Typically, it includes a route through the operating system,

telecommunications software, selected application software and the access

control system.




Access rights *

✓ :~~ The permission or privileges granted to users, programs or workstations

to create, change, delete or view data and files within a system, as defined

by rules established by data owners and the information security policy.




Access servers *


✓ :~~ Provides centralized access control for managing remote access dial-up

servers.




Access method *




Master01 | September, 2024/2025 | Latest update

, 3 | P a g e | © copyright 2024/2025 | Grade A+


✓ :~~ The technique used for selecting records in a file; one at a time, for

processing, retrieval or storage. The access method is related to, but

distinct from, the file organization, which determines how the records are

stored.




Address *

✓ :~~ Within computer storage, the code used to designate the location of a

specified piece of data.




Address space *

✓ :~~ The number of distinct locations that may be referred to with the

machine address. For most binary machines it is equal to 2n, where n is the

number of bits in the machine address.




Addressing *


✓ :~~ The method used to identify the location of a participant in a network.

Ideally, adressing specifies where the participant is located rather than who

they are (name) or how to get there (routing).




Administrative audit




Master01 | September, 2024/2025 | Latest update

, 4 | P a g e | © copyright 2024/2025 | Grade A+


✓ :~~ Verifies that appropriate policies and procedures exist, and that they

have been implemented as management intended. This audit focuses on

operational effectiveness and efficiency.




Administrative controls *

✓ :~~ The rules, procedures and practices dealing with operational

effectiveness, efficiency and adherence to regulations and management

policies.




Advanced Encryption Standard (AES)

✓ :~~ Symmetric-key encryption system designed by Belgian mathematicians.

Also known as the Rijndael, Advanced Encryption Standard (AES) replaces

the outdated Data Encryption Standard (DES) previously used by the U.S.

government. This is the de facto standard for many applications because

AES is approved by the U.S. National Institute of Standards and Technology

(NIST) for unclassified and certain classified information.




Adware *




Master01 | September, 2024/2025 | Latest update
$14.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Graders University Of New Hampshire
Follow You need to be logged in order to follow users or courses
Sold
508
Member since
2 year
Number of followers
167
Documents
27095
Last sold
18 hours ago
Study Smart

Your one-stop resource for high-quality, exam-focused study materials. Here, you'll find expertly crafted summaries, past exam papers, notes, and assignments tailored to help you succeed in your courses. Every document is written with clarity, accuracy, and exam performance in mind—saving you hours of studying and helping you boost your grades. ✅ Clear and well-structured content ✅ Covers key exam topics and common questions ✅ Trusted by students for academic success ✅ Instant downloads and affordable prices Whether you're cramming for finals or just staying ahead in class, my materials are designed to make your studying smarter, not harder. Take a look around and get the edge you need!

Read more Read less
3.8

121 reviews

5
54
4
26
3
21
2
4
1
16

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions