Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] callback systems Capability Maturity Model (CMM) carbon dioxide CAs (Certificate Authorities) 2nd CCB (change control board) CCB (change-control board) CCIPS (Computer Crime and Intellectual Property Section) CD-ROM 2nd 3rd 4th 5th 6th explanations of answers installing 2nd minimum system requirements 2nd question types technical support test modes 2nd central processing units (CPUs) centralized access-control administration CERT Coordination Center Certificate Authorities (CAs) 2nd certificate revocation lists (CRLs) certificates, digital 2nd certification Certified Tech Trainers CD-ROM 2nd 3rd 4th 5th 6th explanations of answers installing 2nd minimum system requirements 2nd question types technical support test modes 2nd change control 2nd 3rd 4th 5th systems software 2nd change control board (CCB) change management change control and emergency change-management 2nd strategies and policies 2nd 3rd change requests (CRs) 2nd change-control board (CCB) change-management process charts (PERT) CIA triad circuit-level gateways 2nd CISA exam answer key 1 2nd 3rd 4th 5th 6th answer key 2 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th exam prep questions application systems 2nd 3rd 4th business process evaluation 2nd 3rd 4th 5th 6th 7th disaster recovery and business continuity 2nd 3rd 4th IS audit process 2nd 3rd management, planning, and organization of IS 2nd 3rd security 2nd 3rd 4th 5th practice exam 1 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th practice exam 2 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th self-assessment educational background 2nd exam readiness 2nd hands-on experience 2nd ideal Certified Information Systems Auditor candidate 2nd 3rd Classic Life Cycle Model closing projects CMM (Capability Maturity Model) 2nd CMM (Software Capability Maturity Model) 2nd CO2 CobiT framework hardware policy CobiT framework (ISACA) 2nd 3rd Code of Professional Ethics (ISACA) 2nd 3rd 4th codification 2nd cognitive passwords cold sites collisions (network) 2nd Common Vulnerability and Exposure (CVE) communicating audit results 2nd 3rd 4th communication communicating audit results 2nd 3rd techniques 2nd communications handlers communications teams completeness checks compliance audits compliance testing 2nd Computer Crime and Intellectual Property Section (CCIPS) computer operations segregation of duties computing function point metrics 2nd conclusions (audit) 2nd evidence obtaining 2nd 3rd preserving 2nd 3rd information-gathering techniques 2nd 3rd 4th organization's use of system platforms, IT infrastruction, and applications 2nd concurrency 2nd confidentiality agreements configuration management systems software 2nd configuration management (hardware) 2nd 3rd contingency policies continuity risk contract audit objectives 2nd contract management 2nd confidentiality agreements contract audit objectives 2nd discovery agreements employee contracts noncompete agreements trade secret agreements control group control risk control self-assessment (CSA) 2nd controlling projects controls administrative controls aligning with business objectives applications 2nd data management IT department heads IT steering committees 2nd operations organizational structure 2nd 3rd quality assurance security department 2nd strategic planning 2nd technical support hardware 2nd 3rd 4th 5th 6th 7th aquisition control objectives 2nd 3rd 4th 5th CobiT framework ITT (invitation to tender) 2nd 3rd internal accounting controls IS operational practices 2nd logical access controls 2nd 3rd access access paths access-control matrices ACLs (access-control lists) 2nd authentication 2nd 3rd 4th authorization centralized/decentralized discretionary access identification 2nd 3rd 4th lattice-based access MACs (mandatory access controls) 2nd nondiscretionary access 2nd restricted interfaces role-based access rule-based access subjects 2nd task-based access logical security controls 2nd 3rd network infrastructure 2nd 3rd objectives and activities 2nd 3rd 4th operational controls physical security controls 2nd 3rd 4th 5th 6th 7th biometric systems 2nd systems software 2nd table of 2nd controls (application) 2nd 3rd automated controls 2nd data integrity controls 2nd data validation edits and controls 2nd 3rd 4th EDI (electronic data interchange) 2nd 3rd input/output controls batch controls input authorization 2nd manual controls output controls 2nd processing controls 2nd CPM (Critical Path Methodology) CPUs (central processing units) crackers CRCs (cyclical redundancy checks) credentials crisis management. [See BCPs (business continuity plans), DRPs (disaster recovery plans)] critical functions Critical Path Methodology (CPM) CRLs (certificate revocation lists) CRM (customer relationship management) CRs (change requests) 2nd cryptography CSA (control self-assessment) 2nd Custom mode (Certified Tech Trainers CD-ROM) customer relationship management (CRM) CVE (Common Vulnerability and Exposure) cyclical redundancy checks (CRCs) |