This class was created by Brainscape user Host Mom. Visit their profile to learn more about the creator.

Decks in this class (43)

Domain 5 Task Statements
Domain 5 protection of informatio...,
T51,
T52
7  cards
Chapter 5 Self Assessment 2019
An is auditor reviewing the confi...,
Which of the following best provi...,
An is auditor has just completed ...
22  cards
Domain 5: Protection of Information Assets (Part 5A)
An accuracy measure for a biometr...,
After reviewing its business proc...,
The best filter rule for protecti...
209  cards
Domain 5: Protection of Information Assets (Part 5B)
After installing a network an org...,
A benefit of quality of service i...,
A company determined that its web...
74  cards
5.1- Wireless WiFi Security (Doshi)
Protection of wireless wifi security,
Enable media access control mac f...,
Why would you enable encryption
21  cards
5.2 Firewall Types & Implementation (Doshi)
Type of firewall,
Packet filtering router,
Stateful inspection
29  cards
5.2.1 : Quiz Firewall (Doshi)
The most robust configuration in ...,
A packet filtering firewall opera...,
Which of the following would be t...
15  cards
5.3 : Logical Access (Doshi)
Logical access controls in inform...,
The two main types of access cont...,
Physical access control
35  cards
5.3.1 : Quiz Logical Access (Doshi)
The is auditor reviews logical ac...,
During review of critical applica...,
Which of the following is the bes...
32  cards
5.4: Classification of information Assets (Doshi)
Objectives benefits for data clas...,
5 logical steps for data classifi...,
With whom resides the accountabil...
28  cards
Domain 5 - Cryptography
7 which is true about des a it is...,
40 in relationship to cryptograph...,
49 the ipsec standard includes a ...
30  cards
CISSP (Chapter 7 - Cryptography)
What is the goal of cryptanalysis...,
The frequency of successful brute...,
Which of the following is not a p...
32  cards
Cryptography
Cryptography,
Cryptography,
Cryptography
42  cards
5.5: Digital Signature (Doshi)
What is a digital signature,
How is a digital signature created,
What is the other name of a hash
17  cards
5.5.1 : Quiz Digital signature (Doshi)
Hash function will address which ...,
A digital signature will address ...,
A digital signature is created by...
18  cards
5.6: Encryption (Doshi)
Symmetric encryption,
Why are the keys said to be symme...,
The advantage of symmetric encryp...
18  cards
5.6.1: Quiz Encryption (Doshi)
In public key encryption asymmetr...,
In public key encryption asymmetr...,
In public key encryption asymmetr...
12  cards
5.7: Elements of Public Key Infrastructure (Doshi)
What is a public key infrastructure,
The process involved in pki for d...,
Certificate revocation list
19  cards
5.8: Biometric (Doshi)
What is biometric,
Biometric verification,
Unique identifiers of biometric
26  cards
5.8.1: Quiz Biometric (Doshi)
An organization is considering im...,
An organization is considering im...,
The best overall quantitative per...
15  cards
OSI Architecture (Doshi)
Data link layer works on mac addr...,
Network layer inserts ip address ...,
When cisa question is about elect...
9  cards
5.9: IDS and IPS (Doshi)
What is an ids,
Is ids a substitute for firewall,
Monitoring activities network bas...
29  cards
5.9.1: Quiz IDS/IPS (Doshi)
An organization has installed a i...,
The component of an ids that coll...,
Even for normal activity which of...
11  cards
5.10: Single Sign On (SSO) (Doshi)
What is a single sign on,
Advantages of sso,
Disadvantages of sso
20  cards
5.11: Fire Suppression (Doshi)
Types of fire suppresion,
Wet water based systems wbs compa...,
Wet water based systems wbs compa...
20  cards
Review 5
An is auditor performing a review...,
The reason for having controls in...,
Which of the following types of r...
18  cards
DOSHI FLASHCARDS
Digital signature provides confid...,
What are the four best practices ...,
What are 3 services provided by d...
3  cards
Domain 5 Questions (Doshi)
1 an is auditor conducting an acc...
1  cards
Review 6 ***( The process of Auditing Information System )
A shared resource matrix is a tec...,
You are part of a security staff ...,
John is the product manager for a...
10  cards
Certified Information Systems Auditor (CISA) Cert Guide
All the following are required ac...,
As an auditor how often would you...,
As an auditor how would you descr...
94  cards
Main Questions
Above almost all other concerns w...,
An advantage of a continuous audi...,
After an is auditor has identifie...
10  cards
Vocabulary 3
Above almost all other concerns f...,
An advantage of a continuous audi...
2  cards
Exam 5
When performing an audit of an or...,
Allowing applications programmers...,
These are steps included in busin...
10  cards
Domain 5 Notes
Process ownership assignment does...,
Whether the design cost of test c...,
For gap minimization a specific r...
70  cards
ISACA 701 -800
Applying a digital signature to d...,
At a hospital medical personal ca...,
The best filter rule for protecti...
100  cards
ISACA 801-900
An accuracy measure for a biometr...,
After reviewing its business proc...,
The best overall quantitative mea...
7  cards
ISACA 901-1000
Assignment of process ownership i...,
A batch transaction job failed in...,
A business unit has selected a ne...
99  cards
2019 ISACA PreTest
The primary purpose of implementi...,
Which of the following would be o...,
Which of the following levels pro...
8  cards
Security
During an external vulnerability ...,
A penetration tester finds a user...,
A penetration tester notices the ...
14  cards
A5-1 -285
Web application developers someti...,
Which control is the best way to ...,
The primary purpose of audit trai...
29  cards
Review 6B
A benefit of open system architec...,
A common form of asymmetric encry...,
A dial back modem may be used to ...
42  cards
ExamPrep Notes
Control function planning,
Control function reviewing,
Control function detecting
30  cards
CISA
Question 1 topic 1 structured pro...,
Question 2 topic 1 after identify...,
Question 3 topic 1 when should an...
90  cards

More about
cisa 3.0 - isaca

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Host Mom's CISA 3.0 - ISACA flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

ISACA Audit Program
  • 2 decks
  • 15 flashcards
  • 1 learners
Decks: Cybersecurity And Audit S Role, Cybersecurity Governance, And more!
CISA - Doshi : Domain 5
  • 17 decks
  • 291 flashcards
  • 51 learners
Decks: 1 Wireless Wifi Security, 2firewall Types Implementation, 21 Quiz Firewall, And more!
ISACA Glossary
  • 1 decks
  • 23 flashcards
  • 2 learners
Decks: Glossary, And more!
CISA Doshi - Domain 1 - Auditing
  • 8 decks
  • 140 flashcards
  • 372 learners
Decks: 1 Risk Assessment, 1a Risk Assessment Quiz, 2 Audit Charter, And more!
Make Flashcards