100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ISACA-CISA Extended Glossary () Questions & 100% Correct Answers

Beoordeling
-
Verkocht
-
Pagina's
224
Cijfer
A+
Geüpload op
09-09-2024
Geschreven in
2024/2025

Abend * :~~ An abnormal end to a computer job; termination of a task prior to its completion because of an error condition that cannot be resolved by recovery facilities while the task is executing. Acceptable use policy :~~ A policy that establishes an agreement between users and the enterprise and defines for all parties' the ranges of use that are approved before gaining access to a network or the Internet Access control * :~~ The processes, rules and deployment mechanisms that control access to information systems, resources and physical access to premises. Access control list (ACL) * :~~ An internal computerized table of access rules regarding the levels of computer access permitted to logon IDs and computer terminals. Also referred to as access control tables. 2 | P a g e | © copyright 2024/2025 | Grade A+ Master01 | September, 2024/2025 | Latest update Access control table * :~~ An internalized computerized table of access rules regarding the levels of computer access permitted to logon IDs and computer terminals. Access path * :~~ The logical route an end user takes to access computerized information. Typically, it includes a route through the operating system, telecommunications software, selected application software and the access control system. Access rights * :~~ The permission or privileges granted to users, programs or workstations to create, change, delete or view data and files within a system, as defined by rules established by data owners and the information security policy. Access servers * :~~ Provides centralized access control for managing remote access dial-up servers. Access method * 3 | P a g e | © copyright 2024/2025 | Grade A+ Master01 | September, 2024/2025 | Latest update :~~ The technique used for selecting records in a file; one at a time, for processing, retrieval or storage. The access method is related to, but distinct from, the file organization, which determines how the records are stored. Address * :~~ Within computer storage, the code used to designate the location of a specified piece of data. Address space * :~~ The number of distinct locations that may be referred to with the machine address. For most binary machines it is equal to 2n, where n is the number of bits in the machine address. Addressing * :~~ The method used to identify the location of a participant in a network. Ideally, adressing specifies where the participant is located rather than who they are (name) or how to get there (routing). Administrative audit 4 | P a g e | © copyright 2024/2025 | Grade A+ Master01 | September, 2024/2025 | Latest update :~~ Verifies that appropriate policies and procedures exist, and that they have been implemented as management intended. This audit focuses on operational effectiveness and efficiency. Administrative controls * :~~ The rules, procedures and practices dealing with operational effectiveness, efficiency and adherence to regulations and management policies. Advanced Encryption Standard (AES) :~~ Symmetric

Meer zien Lees minder
Instelling
ISACA











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Documentinformatie

Geüpload op
9 september 2024
Aantal pagina's
224
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

1 | P a g e | © copyright 2024/2025 | Grade A+




ISACA-CISA Extended Glossary (2011-
2015) Questions & 100% Correct
Answers
Abend *


✓ :~~ An abnormal end to a computer job; termination of a task prior to its

completion because of an error condition that cannot be resolved by

recovery facilities while the task is executing.




Acceptable use policy


✓ :~~ A policy that establishes an agreement between users and the

enterprise and defines for all parties' the ranges of use that are approved

before gaining access to a network or the Internet




Access control *

✓ :~~ The processes, rules and deployment mechanisms that control access

to information systems, resources and physical access to premises.




Access control list (ACL) *

✓ :~~ An internal computerized table of access rules regarding the levels of

computer access permitted to logon IDs and computer terminals. Also

referred to as access control tables.




Master01 | September, 2024/2025 | Latest update

, 2 | P a g e | © copyright 2024/2025 | Grade A+


Access control table *

✓ :~~ An internalized computerized table of access rules regarding the levels

of computer access permitted to logon IDs and computer terminals.




Access path *


✓ :~~ The logical route an end user takes to access computerized

information. Typically, it includes a route through the operating system,

telecommunications software, selected application software and the access

control system.




Access rights *

✓ :~~ The permission or privileges granted to users, programs or workstations

to create, change, delete or view data and files within a system, as defined

by rules established by data owners and the information security policy.




Access servers *


✓ :~~ Provides centralized access control for managing remote access dial-up

servers.




Access method *




Master01 | September, 2024/2025 | Latest update

, 3 | P a g e | © copyright 2024/2025 | Grade A+


✓ :~~ The technique used for selecting records in a file; one at a time, for

processing, retrieval or storage. The access method is related to, but

distinct from, the file organization, which determines how the records are

stored.




Address *

✓ :~~ Within computer storage, the code used to designate the location of a

specified piece of data.




Address space *

✓ :~~ The number of distinct locations that may be referred to with the

machine address. For most binary machines it is equal to 2n, where n is the

number of bits in the machine address.




Addressing *


✓ :~~ The method used to identify the location of a participant in a network.

Ideally, adressing specifies where the participant is located rather than who

they are (name) or how to get there (routing).




Administrative audit




Master01 | September, 2024/2025 | Latest update

, 4 | P a g e | © copyright 2024/2025 | Grade A+


✓ :~~ Verifies that appropriate policies and procedures exist, and that they

have been implemented as management intended. This audit focuses on

operational effectiveness and efficiency.




Administrative controls *

✓ :~~ The rules, procedures and practices dealing with operational

effectiveness, efficiency and adherence to regulations and management

policies.




Advanced Encryption Standard (AES)

✓ :~~ Symmetric-key encryption system designed by Belgian mathematicians.

Also known as the Rijndael, Advanced Encryption Standard (AES) replaces

the outdated Data Encryption Standard (DES) previously used by the U.S.

government. This is the de facto standard for many applications because

AES is approved by the U.S. National Institute of Standards and Technology

(NIST) for unclassified and certain classified information.




Adware *




Master01 | September, 2024/2025 | Latest update

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Graders University Of New Hampshire
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
508
Lid sinds
2 jaar
Aantal volgers
167
Documenten
27095
Laatst verkocht
19 uur geleden
Study Smart

Your one-stop resource for high-quality, exam-focused study materials. Here, you'll find expertly crafted summaries, past exam papers, notes, and assignments tailored to help you succeed in your courses. Every document is written with clarity, accuracy, and exam performance in mind—saving you hours of studying and helping you boost your grades. ✅ Clear and well-structured content ✅ Covers key exam topics and common questions ✅ Trusted by students for academic success ✅ Instant downloads and affordable prices Whether you're cramming for finals or just staying ahead in class, my materials are designed to make your studying smarter, not harder. Take a look around and get the edge you need!

Lees meer Lees minder
3,8

121 beoordelingen

5
54
4
26
3
21
2
4
1
16

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen