R


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

RAD (rapid application development) 2nd
range checks
rapid application development (RAD) 2nd
readiness for CISA exam 2nd
reasonableness checks
reciprocal agreements 2nd 3rd 4th 5th
recovery
     DRPs (disaster recovery plans) 2nd
         backup and storage 2nd 3rd 4th 5th
         BIA (business impact analysis) 2nd 3rd 4th 5th
         cold sites
         critical functions
         duplicate processing facilities 2nd
         evacuation planning 2nd 3rd
         evaluating 2nd 3rd 4th 5th 6th 7th 8th
         exam prep questions 2nd 3rd 4th
         hot sites 2nd
         insurance 2nd
         natural disaster costs
         noncritical functions
         process development 2nd 3rd
         reciprocal agreements 2nd 3rd 4th 5th
         response teams 2nd 3rd
         sensitive functions
         testing 2nd 3rd
         vital functions
         warm sites
referential integrity tests
regression testing
regulatory policies
relational databases 2nd
relational integrity tests
relocation teams
remote procedure calls (RPC)
Remote Terminal Control Protocol (Telnet)
remote-access services
reports 2nd 3rd
request for proposal (RFP) 2nd 3rd 4th
requirements definition (SDLC) 2nd 3rd
residual risk 2nd 3rd
resource management
     procedures 2nd
response teams 2nd 3rd
restricted interfaces
results of audits, communicating 2nd 3rd 4th
reviewwing audits 2nd
RFP (request for proposal) 2nd 3rd 4th
ring topology 2nd
risk assessment
risk management 2nd 3rd 4th 5th 6th
     audit risk
     business risk
     continuity risk
     control risk
     data integrity risks 2nd
     definition of
     detection risk
     hardware 2nd 3rd 4th 5th 6th 7th
         CobiT framework
     impact
     inherent risk
     IS operational practices 2nd
     IS, business, and audit risk 2nd 3rd
     IT governance 2nd
     network infrastructure 2nd 3rd
     project-planning risk indicators 2nd
     qualitative impacts
     quantitative impacts
     residual risk 2nd 3rd
     risk assessment
     risk mitigation
     risk-analysis methods 2nd 3rd
     risk-based audit strategy and objectives 2nd 3rd
     security risk
     system upgrade risks 2nd
     systems software 2nd
     threats
     vulnerabilities
risk mitigation
risk-analysis methods 2nd 3rd
risk-mitigation strategies
     third-party services 2nd 3rd
Rivest, Shamir, Adleman (RSA)
role-based access
roles (IS) 2nd 3rd
routers 2nd
RPC (remote procedure calls)
RSA (Rivest, Shamir, Adleman)
rule-based access
run-to-run totals



Exam Cram 2. CISA
Cisa Exam Cram 2
ISBN: B001EEFNHG
EAN: N/A
Year: 2005
Pages: 146

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net