Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] RAD (rapid application development) 2nd range checks rapid application development (RAD) 2nd readiness for CISA exam 2nd reasonableness checks reciprocal agreements 2nd 3rd 4th 5th recovery DRPs (disaster recovery plans) 2nd backup and storage 2nd 3rd 4th 5th BIA (business impact analysis) 2nd 3rd 4th 5th cold sites critical functions duplicate processing facilities 2nd evacuation planning 2nd 3rd evaluating 2nd 3rd 4th 5th 6th 7th 8th exam prep questions 2nd 3rd 4th hot sites 2nd insurance 2nd natural disaster costs noncritical functions process development 2nd 3rd reciprocal agreements 2nd 3rd 4th 5th response teams 2nd 3rd sensitive functions testing 2nd 3rd vital functions warm sites referential integrity tests regression testing regulatory policies relational databases 2nd relational integrity tests relocation teams remote procedure calls (RPC) Remote Terminal Control Protocol (Telnet) remote-access services reports 2nd 3rd request for proposal (RFP) 2nd 3rd 4th requirements definition (SDLC) 2nd 3rd residual risk 2nd 3rd resource management procedures 2nd response teams 2nd 3rd restricted interfaces results of audits, communicating 2nd 3rd 4th reviewwing audits 2nd RFP (request for proposal) 2nd 3rd 4th ring topology 2nd risk assessment risk management 2nd 3rd 4th 5th 6th audit risk business risk continuity risk control risk data integrity risks 2nd definition of detection risk hardware 2nd 3rd 4th 5th 6th 7th CobiT framework impact inherent risk IS operational practices 2nd IS, business, and audit risk 2nd 3rd IT governance 2nd network infrastructure 2nd 3rd project-planning risk indicators 2nd qualitative impacts quantitative impacts residual risk 2nd 3rd risk assessment risk mitigation risk-analysis methods 2nd 3rd risk-based audit strategy and objectives 2nd 3rd security risk system upgrade risks 2nd systems software 2nd threats vulnerabilities risk mitigation risk-analysis methods 2nd 3rd risk-mitigation strategies third-party services 2nd 3rd Rivest, Shamir, Adleman (RSA) role-based access roles (IS) 2nd 3rd routers 2nd RPC (remote procedure calls) RSA (Rivest, Shamir, Adleman) rule-based access run-to-run totals |