Glossary- C Flashcards

1
Q

call tree

A

A method for ensuring the timely notification of key personnel, such as after a disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

campus area network (CAN)

A

The interconnection of LANs for an organization that has buildings in close proximity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

capability maturity model

A

A model that is used to measure the relative maturity of an organization or of its processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

capability maturity model integration (CMMI)

A

A maturity model that represents the aggregation of other maturity models.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

capacity management

A

The IT function that consists of activities that confirm there is sufficient capacity in IT systems and IT processes to meet service needs. Primarily, an IT system or process has sufficient capacity if its performance falls within an acceptable range, as specified in service-level agreements (SLAs). See also IT service management, service-level agreement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Category 3

A

A twisted-pair cabling standard that is capable of transporting 10MB Eth- ernet up to 100 m (328 ft). See also twisted-pair cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Category 5

A

A twisted-pair cabling standard that is capable of transporting 10MB, 100MB, and 1000MB (1GB) Ethernet up to 100 m (328 ft). See also twisted-pair cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Category 6

A

A twisted-pair cabling standard that is capable of transporting 10MB, 100MB, and 1000MB (1GB) Ethernet up to 100 m (328 ft). Category 6 has the same trans- port capability as Category 5, but has better noise resistance. See also twisted-pair cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Category 7

A

A twisted-pair cabling standard that is capable of transporting 10GB Eth- ernet over 100 m (328 ft). See also twisted-pair cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Category 8

A

A new cable standard, still under development, designed for high-speed networking. See also twisted-pair cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

central processing unit (CPU)

A

The main hardware component of a computer that executes program instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

certificate authority (CA)

A

A trusted party that stores digital certificates and public encryption keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

certificate revocation list (CRL)

A

An electronic list of digital certificates that have been revoked prior to their expiration date.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

certification practice statement (CPS)

A

A published statement that describes the practices used by the CA to issue and manage digital certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

chain of custody

A

Documentation that shows the acquisition, storage, control, and analysis of evidence. The chain of custody may be needed if the evidence is to be used in a legal proceeding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

change control

A

See change management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

change management

A

The IT function that is used to control changes made to an IT environment. See also IT service management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

change request

A

A formal request for a change to be made in an environment. See also change management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

change review

A

A formal review of a requested change. See also change request, change management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

channel service unit/data service unit (CSU/DSU)

A

A device used to connect a tele- communications circuit to a local device such as a router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

cipher lock

A

An electronic or mechanical door equipped with combination locks. Only persons who know the combination may unlock the door.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

ciphertext

A

A message, file, or stream of data that has been transformed by an encryp- tion algorithm and rendered unreadable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

circuit switched

A

A WAN technology where a dedicated, end-to-end communications channel is established that lasts for the duration of the connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CISC (complex instruction set computer)

A

A central processing unit design that uses a comprehensive instruction set. See also central processing unit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

class

A

The characteristics of an object, including its attributes, properties, fields, and the methods it can perform. See also object, method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

class library

A

A repository where classes are stored. See also class.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

classful network

A

A TCP/IP network whose addressing fits into one of the classes of networks: Class A, Class B, or Class C. A classful network will have a predetermined address range and subnet mask.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

classless network

A

A TCP/IP network whose addressing does not fit the classful net- work scheme, but instead uses an arbitrary subnet mask, as determined by the net- work’s physical and logical design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

client-server application

A

An application design where the database and some busi- ness logic are stored on a central server and where some business logic plus display logic are stored on each user’s workstation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

cloud computing

A

A technique of providing a dynamically scalable and usually virtu- alized computing resource as a service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

cluster

A

A tightly coupled collection of computers that are used to solve a common task. In a cluster, one or more servers actively perform tasks, while zero or more com- puters may be in a “standby” state, ready to assume active duty should the need arise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

coaxial

A

A type of network cable that consists of a solid inner conductor surrounded by an insulating jacket, which is surrounded by a metallic shield, which in turn is sur- rounded by a plastic jacket.

33
Q

code division multiple access (CDMA)

A

An airlink standard for wireless communica- tions between mobile devices and base stations.

34
Q

code division multiple access 2000 (CDMA2000)

A

An airlink standard for wireless communications between mobile devices and base stations.

35
Q

code of ethics

A

A statement that defines acceptable and unacceptable professional conduct.

36
Q

codec

A

A device or program that encodes or decodes a data stream.

37
Q

cold site

A

An alternate processing center where the degree of readiness for recovery systems is low. At the very least, a cold site is nothing more than an empty rack, or just allocated space on a computer room floor.

38
Q

compensating control

A

A control that is implemented because another control can- not be implemented or is ineffective.

39
Q

compliance audit

A

An audit to determine the level and degree of compliance to a law, regulation, standard, contract provision, or internal control.

40
Q

compliance testing

A

A type of testing that is used to determine if control procedures have been properly designed and implemented, and are operating properly.

41
Q

component-based development

A

A software development life cycle process where various components of a larger system are developed separately.

42
Q

computer-aided software engineering (CASE)

A

A broad variety of tools that are used to automate various aspects of application software development.

43
Q

computer-assisted audit technique (CAAT)

A

Any technique where computers are used to automate or simplify the audit process.

44
Q

computer trespass

A

Unlawful entry into a computer or application.

45
Q

confidence coefficient

A

The probability that a sample selected actually represents the
entire population. This is usually expressed as a percentage.

46
Q

configuration management

A

The IT function where the configuration of components in an IT environment is independently recorded. Configuration management is usually supported by the use of automated tools used to inventory and control system configu- rations. See also IT service management.

47
Q

configuration management database (CMDB)

A

A repository for every component in an environment that contains information on every configuration change made on those components.

48
Q

configuration standard

A

A standard that defines the detailed configurations that are used in servers, workstations, operating systems, database management systems, appli- cations, network devices, and other systems.

49
Q

conspiracy

A

A plan by two or more persons to commit an illegal act.

50
Q

constructive cost model (COCOMO)

A

A method for estimating software develop- ment projects based on the number of lines of code and the complexity of the software being developed.

51
Q

contact list

A

A list of key personnel and various methods used to contact them. See also response document.

52
Q

continuity of operations plan (COOP)

A

The activities required to continue critical and strategic business functions at an alternate site. See also response document.

53
Q

continuous and intermittent simulation (CIS)

A

A continuous auditing technique where flagged transactions are processed in a parallel simulation and the results com- pared to production processing results.

54
Q

continuous auditing

A

An auditing technique where sampling and testing are auto- mated and occur continuously.

55
Q

contract

A

A binding legal agreement between two parties that may be enforceable in a court of law.

56
Q

control

A

Policies, processes, and procedures that are created to achieve desired events or to avoid unwanted events.

57
Q

control failure

A

The result of an audit of a control where the control is determined to be ineffective.

58
Q

control objective

A

A foundational statement that describes desired states or outcomes from business operations.

59
Q

Control Objectives for Information and related Technology (COBIT)

A

A control framework for managing information systems and security. COBIT is published by ISACA.

60
Q

control risk

A

The risk that a material error exists that will not be prevented or detected by the organization’s control framework.

61
Q

control self-assessment (CSA)

A

A methodology used by an organization to review key business objectives, risks, and controls. Control self-assessment is a self-regulation activity.

62
Q

corrective action

A

An action that is initiated to correct an undesired condition.

63
Q

corrective control

A

A control that is used after an unwanted event has occurred.

64
Q

corroboration

A

An audit technique where an IS auditor interviews additional person- nel to confirm the validity of evidence obtained from others who were interviewed previously.

65
Q

countermeasure

A

Any activity or mechanism that is designed to reduce risk.

66
Q

crash gate

A

Hard barriers that lift into position, preventing the entry (or exit) of unau-
thorized vehicles, and that can be lowered to permit authorized vehicles.

67
Q

critical path methodology (CPM)

A

A technique that is used to identify the most criti- cal path in a project to understand which tasks are most likely to affect the project schedule.

68
Q

criticality analysis (CA)

A

A study of each system and process, a consideration of the impact on the organization if it is incapacitated, the likelihood of incapacitation, and the estimated cost of mitigating the risk or impact of incapacitation.

69
Q

cross-over error rate

A

The point at which the false reject rate (FRR) equals the false accept rate (FAR). This is the ideal point for a well-tuned biometric system. See also biometrics, false reject rate, and false accept rate.

70
Q

cryptanalysis

A

An attack on a cryptosystem where the attacker is attempting to deter- mine the encryption key that is used to encrypt messages.

71
Q

cryptography

A

The practice of hiding information from unwanted persons.

72
Q

cryptosystem

A

A set of algorithms used to generate an encryption key, to perform en-
cryption, and to perform decryption.

73
Q

custodian

A

A person or group delegated to operate or maintain an asset.

74
Q

customer relationship management (CRM)

A

An IS application that is used to track the details of the relationships with each of an organization’s customers.

75
Q

customization

A

A unique change that is made to a computer program or system.

76
Q

cutover

A

The step in the software development life cycle where an old replaced system
is shut down and a new replacement system is started.

77
Q

cutover test

A

An actual test of disaster recovery (DR) and/or business continuity re- sponse plans. The purpose of a parallel test is to evaluate the ability of personnel to follow directives in emergency response plans—to actually set up the DR business pro- cessing or data processing capability. In a cutover test, personnel shut down production systems and operate recovery systems to assume actual business workload. See also di- saster recovery plan.

78
Q

cyclical redundancy check (CRC)

A

A hash function used to create a checksum that is used to detect errors in network transmissions. The Ethernet standard uses a CRC to detect errors.