100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ISACA-CISA Extended Glossary () Questions & 100% Correct Answers $14.49   Add to cart

Exam (elaborations)

ISACA-CISA Extended Glossary () Questions & 100% Correct Answers

 9 views  0 purchase
  • Course
  • Institution

Abend * :~~ An abnormal end to a computer job; termination of a task prior to its completion because of an error condition that cannot be resolved by recovery facilities while the task is executing. Acceptable use policy :~~ A policy that establishes an agreement between users and the en...

[Show more]

Preview 4 out of 224  pages

  • September 9, 2024
  • 224
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
avatar-seller
1 | P a g e | © copyright 2024/2025 | Grade A+




ISACA-CISA Extended Glossary (2011-
2015) Questions & 100% Correct
Answers
Abend *


✓ :~~ An abnormal end to a computer job; termination of a task prior to its

completion because of an error condition that cannot be resolved by

recovery facilities while the task is executing.




Acceptable use policy


✓ :~~ A policy that establishes an agreement between users and the

enterprise and defines for all parties' the ranges of use that are approved

before gaining access to a network or the Internet




Access control *

✓ :~~ The processes, rules and deployment mechanisms that control access

to information systems, resources and physical access to premises.




Access control list (ACL) *

✓ :~~ An internal computerized table of access rules regarding the levels of

computer access permitted to logon IDs and computer terminals. Also

referred to as access control tables.




Master01 | September, 2024/2025 | Latest update

, 2 | P a g e | © copyright 2024/2025 | Grade A+


Access control table *

✓ :~~ An internalized computerized table of access rules regarding the levels

of computer access permitted to logon IDs and computer terminals.




Access path *


✓ :~~ The logical route an end user takes to access computerized

information. Typically, it includes a route through the operating system,

telecommunications software, selected application software and the access

control system.




Access rights *

✓ :~~ The permission or privileges granted to users, programs or workstations

to create, change, delete or view data and files within a system, as defined

by rules established by data owners and the information security policy.




Access servers *


✓ :~~ Provides centralized access control for managing remote access dial-up

servers.




Access method *




Master01 | September, 2024/2025 | Latest update

, 3 | P a g e | © copyright 2024/2025 | Grade A+


✓ :~~ The technique used for selecting records in a file; one at a time, for

processing, retrieval or storage. The access method is related to, but

distinct from, the file organization, which determines how the records are

stored.




Address *

✓ :~~ Within computer storage, the code used to designate the location of a

specified piece of data.




Address space *

✓ :~~ The number of distinct locations that may be referred to with the

machine address. For most binary machines it is equal to 2n, where n is the

number of bits in the machine address.




Addressing *


✓ :~~ The method used to identify the location of a participant in a network.

Ideally, adressing specifies where the participant is located rather than who

they are (name) or how to get there (routing).




Administrative audit




Master01 | September, 2024/2025 | Latest update

, 4 | P a g e | © copyright 2024/2025 | Grade A+


✓ :~~ Verifies that appropriate policies and procedures exist, and that they

have been implemented as management intended. This audit focuses on

operational effectiveness and efficiency.




Administrative controls *

✓ :~~ The rules, procedures and practices dealing with operational

effectiveness, efficiency and adherence to regulations and management

policies.




Advanced Encryption Standard (AES)

✓ :~~ Symmetric-key encryption system designed by Belgian mathematicians.

Also known as the Rijndael, Advanced Encryption Standard (AES) replaces

the outdated Data Encryption Standard (DES) previously used by the U.S.

government. This is the de facto standard for many applications because

AES is approved by the U.S. National Institute of Standards and Technology

(NIST) for unclassified and certain classified information.




Adware *




Master01 | September, 2024/2025 | Latest update

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller ExamArsenal. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $14.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67866 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$14.49
  • (0)
  Add to cart