ISACA-CISA Extended Glossary (2011-
2015) Questions & 100% Correct
Answers
Abend *
✓ :~~ An abnormal end to a computer job; termination of a task prior to its
completion because of an error condition that cannot be resolved by
recovery facilities while the task is executing.
Acceptable use policy
✓ :~~ A policy that establishes an agreement between users and the
enterprise and defines for all parties' the ranges of use that are approved
before gaining access to a network or the Internet
Access control *
✓ :~~ The processes, rules and deployment mechanisms that control access
to information systems, resources and physical access to premises.
Access control list (ACL) *
✓ :~~ An internal computerized table of access rules regarding the levels of
computer access permitted to logon IDs and computer terminals. Also
referred to as access control tables.
Master01 | September, 2024/2025 | Latest update
, 2 | P a g e | © copyright 2024/2025 | Grade A+
Access control table *
✓ :~~ An internalized computerized table of access rules regarding the levels
of computer access permitted to logon IDs and computer terminals.
Access path *
✓ :~~ The logical route an end user takes to access computerized
information. Typically, it includes a route through the operating system,
telecommunications software, selected application software and the access
control system.
Access rights *
✓ :~~ The permission or privileges granted to users, programs or workstations
to create, change, delete or view data and files within a system, as defined
by rules established by data owners and the information security policy.
Access servers *
✓ :~~ Provides centralized access control for managing remote access dial-up
servers.
Access method *
Master01 | September, 2024/2025 | Latest update
, 3 | P a g e | © copyright 2024/2025 | Grade A+
✓ :~~ The technique used for selecting records in a file; one at a time, for
processing, retrieval or storage. The access method is related to, but
distinct from, the file organization, which determines how the records are
stored.
Address *
✓ :~~ Within computer storage, the code used to designate the location of a
specified piece of data.
Address space *
✓ :~~ The number of distinct locations that may be referred to with the
machine address. For most binary machines it is equal to 2n, where n is the
number of bits in the machine address.
Addressing *
✓ :~~ The method used to identify the location of a participant in a network.
Ideally, adressing specifies where the participant is located rather than who
they are (name) or how to get there (routing).
Administrative audit
Master01 | September, 2024/2025 | Latest update
, 4 | P a g e | © copyright 2024/2025 | Grade A+
✓ :~~ Verifies that appropriate policies and procedures exist, and that they
have been implemented as management intended. This audit focuses on
operational effectiveness and efficiency.
Administrative controls *
✓ :~~ The rules, procedures and practices dealing with operational
effectiveness, efficiency and adherence to regulations and management
policies.
Advanced Encryption Standard (AES)
✓ :~~ Symmetric-key encryption system designed by Belgian mathematicians.
Also known as the Rijndael, Advanced Encryption Standard (AES) replaces
the outdated Data Encryption Standard (DES) previously used by the U.S.
government. This is the de facto standard for many applications because
AES is approved by the U.S. National Institute of Standards and Technology
(NIST) for unclassified and certain classified information.
Adware *
Master01 | September, 2024/2025 | Latest update