CISA Made Easy

                                           - easy CISA preparation

Thursday, December 11, 2008

CISA Quick Tips 08-1112

1. Asymmetric key cryptography is known as Public key encryption and involves a private key and a public key.


2. A good Backup and recovery System should have following features:

i. Backup should be properly labeled.
ii. Retention period should be clearly mentioned
iii. System log and application log should be separately stored
v. Periodic audit of the Backup & Recovery System should be there.
vi. Backup and Recovery Manual should be available.


3.Periodic testing / recovery and documentation are the most important part of backup policy.


4. Two important types of parities are:

i. vertical parity - single character

ii. horizontal parity - multiple character

Both parity together can not only detect but correct errors as well.


5. A duplicate information processing facility

i. is used as a recovery site
ii.can backup critical systems and application
iii.many times dedicated.
iv.helps in quick and efficient recovery in many situations

Readers who visited this post also read :

0 comments:

 

Home | | | | |

CISA made Easy - Easy CISA Preparation