Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] table look-ups tape storage 2nd 3rd task-based access TCP (Transmission Control Protocol) TCP/IP (Transmission Control Protocol/Internet Protocol) 2nd 3rd technical infrastructure 2nd exam prep questions 2nd 3rd 4th 5th 6th hardware 2nd 3rd change control 2nd 3rd configuration management 2nd 3rd CPUs (central processing units) I/O components mainframes microcomputers minicomputers multiprocessing multitasking multithreading notebooks/laptops PDAs (personal digital assistants) risks and controls 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th supercomputers IS operational practices 2nd risks and controls 2nd IT organizational structure 2nd 3rd 4th networks 2nd 3rd 4th bridges 2nd bus topology collisions 2nd data encapsulation 2nd Ethernet 2nd extranets 2nd firewalls 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th hubs/switches 2nd Internet intranets LANs (Local Area Networks) 2nd 3rd 4th 5th MANs (Metropolitan Area Networks) 2nd 3rd modems 2nd OSI (Open Systems Interconnect) model 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th ring topology 2nd risks and controls 2nd 3rd routers 2nd star topology 2nd TCP/IP (Transmission Control Protocol/Internet Protocol) 2nd 3rd VPN (virtual private networking) WANs (Wide Area Networks) 2nd system performance and monitoring processes 2nd systems software 2nd change control 2nd configuration management 2nd DBMS (database management systems) 2nd 3rd firmware middleware 2nd operating systems 2nd risks and controls 2nd technical infrastructure management help desk performance-measurement techniques 2nd problem management/resource management procedures 2nd scheduling service-level agreements technical suppor technical support Certified Tech Trainers CD-ROM technological feasibility studies Telnet (Remote Terminal Control Protocol) terminal-emulation software (TES) TES (terminal-emulation software) testing application systems 2nd 3rd BCPs (business continuity plans) full operational tests 2nd 3rd paper tests preparedness tests walk-through tests blackbox testing compliance testing 2nd DRPs (disaster recovery plans) full operational tests 2nd 3rd paper tests preparedness tests walk-through tests interface/integration testing penetration testing 2nd 3rd regression testing security 2nd 3rd 4th 5th 6th 7th substantive testing system testing unit testing whitebox testing theft of service third-party services evaluating 2nd 3rd 4th 5th risk-mitigation strategies 2nd 3rd SLAs (service-level agreements) when to use threads throughput 2nd top-down testing approach topologies (network) bus topology ring topology 2nd star topology 2nd total power failure TP (transaction-processing) monitors trade secret agreements traffic analysis 2nd transaction integrity transaction-processing (TP) monitors transaction-processing databases Transmission Control Protocol (TCP) Transmission Control Protocol/Internet Protocol (TCP/IP) 2nd 3rd Transport layer (OSI) 2nd 3rd transportation teams Triple DES (3DES) Trojan horses tunneling protocol tuples two-factor authentication |