CISA Made Easy

                                           - easy CISA preparation

Tuesday, November 25, 2008

CISA Quick Tips 08-2511

1. CPM or Critical Path Methodology helps in determining critical tasks and identifies the dependencies between/among those tasks.

2. Social engineering is the technique where attacker acquires sensitive information or improper access by building a trust relationship with authorized users.

3.ACID test tests a Database Management System (DBMS) by testing

i. Atomicity,
ii. Consistency,
iii. Isolation, and
iv. Durability.


4.The Registration Authority (RA)is responsible for

i. User Enrollment
ii. Certificate Generation


5.Risk Assessment process helps in

i. Risk Mitigation / Risk Reduction
ii. Risk Transfer
iii. Risk Assignment
iv. Risk Acceptance

Readers who visited this post also read :

0 comments:

 

Home | | | | |

CISA made Easy - Easy CISA Preparation