P


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

packet PDU (protocol data unit) 2nd
packet-filtering firewalls 2nd
paper tests
passive attacks 2nd
passwords 2nd
     cognitive passwords
     dictionary attacks
     one-time passwords
paths
     access paths
payments
     EFT (electronic funds transfer)
PDAs (personal digital assistants)
PDU (protocol data unit)
     bits PDU 2nd
     data PDU 2nd
     frame PDU 2nd 3rd
     packet PDU 2nd
     segment PDU 2nd
penetration testing 2nd 3rd
penetration tests
performance
     performance-measurement techniques 2nd
performance indicators 2nd 3rd 4th
personal digital assistants (PDAs)
personnel management
personnel-management
     techniques 2nd 3rd
PERT (program evaluation review technique) 2nd
physical controls 2nd 3rd 4th 5th
     biometric systems 2nd
Physical layer (OSI) 2nd
physical security controls 2nd
PKI (public key infrastructure) 2nd 3rd
planning
    BCP (business continuity management)
         strategies and policies 2nd 3rd
     BCPs (business continuity plans) 2nd
         backup and storage 2nd 3rd 4th 5th
         BIA (business impact analysis) 2nd 3rd 4th 5th
         cold sites
         critical functions
         duplicate processing facilities 2nd
         evacuation planning 2nd 3rd
         evaluating 2nd 3rd 4th 5th 6th 7th 8th
         exam prep questions 2nd 3rd 4th
         hot sites 2nd
         insurance 2nd
         natural disaster costs
         noncritical functions
         process development 2nd 3rd
         reciprocal agreements 2nd 3rd 4th 5th
         response teams 2nd 3rd
         sensitive functions
         testing 2nd 3rd
         vital functions
         warm sites
    DRP (disaster recovery planning)
         strategies and policies 2nd 3rd
     DRPs (disaster recovery plans) 2nd
         backup and storage 2nd 3rd 4th 5th
         BIA (business impact analysis) 2nd 3rd 4th 5th
         cold sites
         critical functions
         duplicate processing facilities 2nd
         evacuation planning 2nd 3rd
         evaluating 2nd 3rd 4th 5th 6th 7th 8th
         exam prep questions 2nd 3rd 4th
         hot sites 2nd
         insurance 2nd
         natural disaster costs
         noncritical functions
         process development 2nd 3rd
         reciprocal agreements 2nd 3rd 4th 5th
         response teams 2nd 3rd
         sensitive functions
         testing 2nd 3rd
         vital functions
         warm sites
     IS steering committees 2nd
     planning policies
     projects
     strategic planning 2nd 3rd 4th
planning policies
Point-to-Point Tunneling Protocol (PPTP)
policies 2nd
     advisory policies
     BCP (business continuity management) 2nd 3rd
     contingency policies
     contract management 2nd
         confidentiality agreements
         contract audit objectives 2nd
         discovery agreements
         employee contracts
         noncompete agreements
         trade secret agreements
    deployment
         evaluating process for 2nd
     development 2nd
         evaluating process for 2nd
     DRP (disaster recovery planning) 2nd 3rd
     ensuring compliance with 2nd 3rd
     financial and accounting policies
     hardware policies
     informative policies
     network policies
     operations policies
     organizational policies
     planning policies
     problem- and change management 2nd 3rd
     project management 2nd 3rd 4th
         project life cycle 2nd
         risk indicators 2nd
         system upgrade risks 2nd
     quality management 2nd 3rd 4th 5th
         accreditation
         certification
         ISO 9001 2nd
         ISO 9126 2nd
         QA (quality assurance)
         QC (quality control)
         Software Capability Maturity Model (CMM) 2nd
     regulatory policies
     security
     security management 2nd 3rd 4th 5th 6th 7th
         CIA triad
         data integrity risks 2nd
         logical controls 2nd 3rd
         physical controls 2nd
     security policies
policies. [See also procedures, strategies]
policy development 2nd
     evaluating process for 2nd
polymorphic viruses
post-implementation review techniques 2nd
power failures 2nd
PPTP (Point-to-Point Tunneling Protocol)
practice exam 1 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
     answer key 2nd 3rd 4th 5th 6th
practice exam 2 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
     answer key 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
practices
     application-implementation practices 2nd
preparedness tests
Presentation layer (OSI) 2nd 3rd
preserving evidence 2nd 3rd
print services
private keys
problem logs
problem management
     procedures 2nd
     strategies and policies 2nd 3rd
procedures 2nd 3rd 4th
     definition of
     ensuring compliance with 2nd 3rd
     security
procedures. [See also policies, strategies]
process owners
     security management responsibilities
processes
     application system-acquisition processes 2nd
processing controls 2nd
procurement control
program evaluation review technique (PERT) 2nd
programming languages
project management 2nd 3rd 4th 5th
     CPM (Critical Path Methodology)
     FPA (function point analysis) 2nd
     PERT (program evaluation review technique) 2nd
     strategies and policies 2nd 3rd 4th
         project life cycle 2nd
         risk indicators 2nd
         system upgrade risks 2nd
     work breakdown structure
projects
     closing
     controlling
     life cycle 2nd
     monitoring
     planning
     scheduling
property insurance 2nd
protection. [See security]
protocol data unit. [See PDU]
protocols
     ARP (Address Resolution Protocol)
     DNS (Domain Name Service)
     ICMP (Internet Control Message Protocol)
     IP (Internet Protocol)
     IPSec
     NFS (Network File System)
     PPTP (Point-to-Point Tunneling Protocol)
     SMTP (Simple Mail Transfer Protocol)
     SSL (Secure Sockets Layer)
     TCP (Transmission Control Protocol)
     TCP/IP (Transmission Control Protocol/Internet Protocol) 2nd 3rd
     Telnet (Remote Terminal Control Protocol)
     tunneling protocol
     UDP (User Datagram Protocol)
prototyping 2nd
proxy firewalls 2nd 3rd 4th 5th 6th
public key infrastructure (PKI) 2nd 3rd
public keys 2nd 3rd



Exam Cram 2. CISA
Cisa Exam Cram 2
ISBN: B001EEFNHG
EAN: N/A
Year: 2005
Pages: 146

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net