Blog Posts - Cisa - Quick Tips
Passing CISA is easy - final tips to pass CISA

All your queries and hits has made me to devote more and more time for this blog and this blog has become a vital part of my life. Thanks for your support. Now examination is standing next to... [[ This is a content summary only. Visit my webs...
by CISA made Easy - Easy CISA Preparation on Dec 12, 2008
Passing CISA is easy - final tips to pass CISA

All your queries and hits has made me to devote more and more time for this blog and this blog has become a vital part of my life. Thanks for your support. Now examination is standing next to... [[ This is a content summary only. Visit my webs...
by CISA made Easy - Easy CISA Preparation on Dec 12, 2008
CISA Quick Tips 08-1112

1. Asymmetric key cryptography is known as Public key encryption and involves a private key and a public key. 2. A good Backup and recovery System should have following features: i. Backup... [[ This is a content summary only. Visit my websit...
by CISA made Easy - Easy CISA Preparation on Dec 11, 2008
CISA Quick Tips 08-1112

1. Asymmetric key cryptography is known as Public key encryption and involves a private key and a public key. 2. A good Backup and recovery System should have following features: i. Backup... [[ This is a content summary only. Visit my websit...
by CISA made Easy - Easy CISA Preparation on Dec 11, 2008
CISA Quick Tips 08-1012

1. The purpose of setting, Disaster Recovery Site is to avoid Single Point of failure and maitain Business Continuity. 2. Logical Access & Physical Access Audit must include authorization as per... [[ This is a content summary only. Visit my we.
by CISA made Easy - Easy CISA Preparation on Dec 10, 2008
CISA Quick Tips 08-1012

1. The purpose of setting, Disaster Recovery Site is to avoid Single Point of failure and maitain Business Continuity. 2. Logical Access & Physical Access Audit must include authorization as per... [[ This is a content summary only. Visit my we.
by CISA made Easy - Easy CISA Preparation on Dec 10, 2008
CISA Quick Tips 08-0912

1. When data volume is more Symmetric cryptography is fast and suitable method to encrypt such data. 2.Access Control Lists(ACLs) are used in firewalls and in interfaces that connect two or more... [[ This is a content summary only. Visit my websi...
by CISA made Easy - Easy CISA Preparation on Dec 9, 2008
CISA Quick Tips 08-0912

1. When data volume is more Symmetric cryptography is fast and suitable method to encrypt such data. 2.Access Control Lists(ACLs) are used in firewalls and in interfaces that connect two or more... [[ This is a content summary only. Visit my websi...
by CISA made Easy - Easy CISA Preparation on Dec 9, 2008
CISA Quick Tips 08-0512

1. Dry pipe sprinklers are i.very effective fire suppressor ii. environment friendly fire suppressor 2.Security administrator should not have full access/write access to security devices... [[ This is a content summary only. Visit my website...
by CISA made Easy - Easy CISA Preparation on Dec 8, 2008
CISA Quick Tips 08-0512

1. Dry pipe sprinklers are i.very effective fire suppressor ii. environment friendly fire suppressor 2.Security administrator should not have full access/write access to security devices... [[ This is a content summary only. Visit my website...
by CISA made Easy - Easy CISA Preparation on Dec 8, 2008
CISA Quick Tips 08-2611

1. programmer should not be allowed to alter or patch the Live environment. 2. Loss/Leakage of Confidential data may lead to Reputation Risk for the Organization. 3. Location of smoke detectors is... [[ This is a content summary only. Visit my web...
by CISA made Easy - Easy CISA Preparation on Nov 26, 2008
CISA Quick Tips 08-2611

1. programmer should not be allowed to alter or patch the Live environment. 2. Loss/Leakage of Confidential data may lead to Reputation Risk for the Organization. 3. Location of smoke detectors is... [[ This is a content summary only. Visit my web...
by CISA made Easy - Easy CISA Preparation on Nov 26, 2008
CISA Quick Tips 08-2511

1. CPM or Critical Path Methodology helps in determining critical tasks and identifies the dependencies between/among those tasks. 2. Social engineering is the technique where attacker acquires ... [[ This is a content summary only. Visit my websit...
by CISA made Easy - Easy CISA Preparation on Nov 25, 2008
CISA Quick Tips 08-2511

1. CPM or Critical Path Methodology helps in determining critical tasks and identifies the dependencies between/among those tasks. 2. Social engineering is the technique where attacker acquires ... [[ This is a content summary only. Visit my websit...
by CISA made Easy - Easy CISA Preparation on Nov 25, 2008
CISA Quick Tips 08-2111

1. Data mining is the process of analyzing data from different sources and perspectives and summarizing it into helpful information by means of association, clustering, sequencing and... [[ This is a content summary only. Visit my website for full l...
by CISA made Easy - Easy CISA Preparation on Nov 21, 2008
CISA Quick Tips 08-2111

1. Data mining is the process of analyzing data from different sources and perspectives and summarizing it into helpful information by means of association, clustering, sequencing and... [[ This is a content summary only. Visit my website for full l...
by CISA made Easy - Easy CISA Preparation on Nov 21, 2008
CISA Quick Tips 08-2011

1. Maintaining Strong and tough password is an Preventive Control. 2. Stream cipher is a type of symmetric encryption which operates on continuous streams of plain text (1 & 0) Mostly used in... [[ This is a content summary only. Visit my webs.
by CISA made Easy - Easy CISA Preparation on Nov 20, 2008
CISA Quick Tips 08-2011

1. Maintaining Strong and tough password is an Preventive Control. 2. Stream cipher is a type of symmetric encryption which operates on continuous streams of plain text (1 & 0) Mostly used in... [[ This is a content summary only. Visit my webs.
by CISA made Easy - Easy CISA Preparation on Nov 20, 2008
CISA Quick Tips 08-1811

1. Liquid fire should be ideally suppressed by agents like Dry powders and/or Carbon Dioxide. 2. Data Link(OSI Layer 2) handles bridging work. 3. Business Impact Analysis (BIA) phase of BCP must... [[ This is a content summary only. Visit my webs...
by CISA made Easy - Easy CISA Preparation on Nov 18, 2008
CISA Quick Tips 08-1811

1. Liquid fire should be ideally suppressed by agents like Dry powders and/or Carbon Dioxide. 2. Data Link(OSI Layer 2) handles bridging work. 3. Business Impact Analysis (BIA) phase of BCP must... [[ This is a content summary only. Visit my webs...
by CISA made Easy - Easy CISA Preparation on Nov 18, 2008