Blog Posts - Cisa - Quick Tips



Passing CISA is easy - final tips to pass CISA

All your queries and hits has made me to devote more and more time for this blog and this blog has become a vital part of my life. Thanks for your support. Now examination is standing next to... [[ This is a content summary only. Visit my webs...

Passing CISA is easy - final tips to pass CISA

All your queries and hits has made me to devote more and more time for this blog and this blog has become a vital part of my life. Thanks for your support. Now examination is standing next to... [[ This is a content summary only. Visit my webs...

CISA Quick Tips 08-1112

1. Asymmetric key cryptography is known as Public key encryption and involves a private key and a public key. 2. A good Backup and recovery System should have following features: i. Backup... [[ This is a content summary only. Visit my websit...

CISA Quick Tips 08-1112

1. Asymmetric key cryptography is known as Public key encryption and involves a private key and a public key. 2. A good Backup and recovery System should have following features: i. Backup... [[ This is a content summary only. Visit my websit...

CISA Quick Tips 08-1012

1. The purpose of setting, Disaster Recovery Site is to avoid Single Point of failure and maitain Business Continuity. 2. Logical Access & Physical Access Audit must include authorization as per... [[ This is a content summary only. Visit my we.

CISA Quick Tips 08-1012

1. The purpose of setting, Disaster Recovery Site is to avoid Single Point of failure and maitain Business Continuity. 2. Logical Access & Physical Access Audit must include authorization as per... [[ This is a content summary only. Visit my we.

CISA Quick Tips 08-0912

1. When data volume is more Symmetric cryptography is fast and suitable method to encrypt such data. 2.Access Control Lists(ACLs) are used in firewalls and in interfaces that connect two or more... [[ This is a content summary only. Visit my websi...

CISA Quick Tips 08-0912

1. When data volume is more Symmetric cryptography is fast and suitable method to encrypt such data. 2.Access Control Lists(ACLs) are used in firewalls and in interfaces that connect two or more... [[ This is a content summary only. Visit my websi...

CISA Quick Tips 08-0512

1. Dry pipe sprinklers are i.very effective fire suppressor ii. environment friendly fire suppressor 2.Security administrator should not have full access/write access to security devices... [[ This is a content summary only. Visit my website...

CISA Quick Tips 08-0512

1. Dry pipe sprinklers are i.very effective fire suppressor ii. environment friendly fire suppressor 2.Security administrator should not have full access/write access to security devices... [[ This is a content summary only. Visit my website...

CISA Quick Tips 08-2611

1. programmer should not be allowed to alter or patch the Live environment. 2. Loss/Leakage of Confidential data may lead to Reputation Risk for the Organization. 3. Location of smoke detectors is... [[ This is a content summary only. Visit my web...

CISA Quick Tips 08-2611

1. programmer should not be allowed to alter or patch the Live environment. 2. Loss/Leakage of Confidential data may lead to Reputation Risk for the Organization. 3. Location of smoke detectors is... [[ This is a content summary only. Visit my web...

CISA Quick Tips 08-2511

1. CPM or Critical Path Methodology helps in determining critical tasks and identifies the dependencies between/among those tasks. 2. Social engineering is the technique where attacker acquires ... [[ This is a content summary only. Visit my websit...

CISA Quick Tips 08-2511

1. CPM or Critical Path Methodology helps in determining critical tasks and identifies the dependencies between/among those tasks. 2. Social engineering is the technique where attacker acquires ... [[ This is a content summary only. Visit my websit...

CISA Quick Tips 08-2111

1. Data mining is the process of analyzing data from different sources and perspectives and summarizing it into helpful information by means of association, clustering, sequencing and... [[ This is a content summary only. Visit my website for full l...

CISA Quick Tips 08-2111

1. Data mining is the process of analyzing data from different sources and perspectives and summarizing it into helpful information by means of association, clustering, sequencing and... [[ This is a content summary only. Visit my website for full l...

CISA Quick Tips 08-2011

1. Maintaining Strong and tough password is an Preventive Control. 2. Stream cipher is a type of symmetric encryption which operates on continuous streams of plain text (1 & 0) Mostly used in... [[ This is a content summary only. Visit my webs.

CISA Quick Tips 08-2011

1. Maintaining Strong and tough password is an Preventive Control. 2. Stream cipher is a type of symmetric encryption which operates on continuous streams of plain text (1 & 0) Mostly used in... [[ This is a content summary only. Visit my webs.

CISA Quick Tips 08-1811

1. Liquid fire should be ideally suppressed by agents like Dry powders and/or Carbon Dioxide. 2. Data Link(OSI Layer 2) handles bridging work. 3. Business Impact Analysis (BIA) phase of BCP must... [[ This is a content summary only. Visit my webs...

CISA Quick Tips 08-1811

1. Liquid fire should be ideally suppressed by agents like Dry powders and/or Carbon Dioxide. 2. Data Link(OSI Layer 2) handles bridging work. 3. Business Impact Analysis (BIA) phase of BCP must... [[ This is a content summary only. Visit my webs...


Trending Topics

Close