Glossary- E Flashcards

1
Q

E-1

A

A common carrier standard protocol for transporting voice and data. E-1 can sup- port up to 32 separate voice channels of 64 kbit/sec each and is used primarily in Europe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

E-3

A

A common carrier standard protocol for transporting voice and data. E-3 can support up to 512 separate voice channels of 64 kbit/sec each and is used primarily in Europe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

e-mail

A

A network-based service used to transmit messages between individuals and groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

eavesdropping

A

The act of secretly intercepting and recording a voice or data transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

electric generator

A

A system consisting of an internal combustion engine powered by gasoline, diesel fuel, or natural gas that spins an electric generator. A generator can sup- ply electricity for as long as several days, depending upon the size of its fuel supply and whether it can be refueled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

electrically erasable programmable read-only memory (EEPROM)

A

A form of per- manent memory that can be rewritten using a special program on the computer that it is installed on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

elliptic curve

A

A public key cryptography algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

embedded audit module (EAM)

A

A continuous auditing technique that consists of a special software module embedded within a system that is designed to detect process- ing anomalies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

emergency communications plan

A

The communications that are required during a disaster. See also response document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

emergency response

A

The urgent activities that immediately follow a disaster, including evacuation of personnel, first aid, triage of injured personnel, and possibly firefighting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

employee handbook

A

See employee policy manual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

employee policy manual

A

A formal statement of the terms of employment, facts about

the organization, benefits, compensation, conduct, and policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

employment agreement

A

A legal contract between an organization and an employee, which may include a description of duties, roles and responsibilities, confidentiality, compliance, and termination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

encapsulation

A

A practice where a method can call on another method to help per- form its work. See also method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

encryption

A

The act of hiding sensitive information in plain sight. Encryption works by scrambling the characters in a message, using a method known only to the sender and receiver, making the message useless to anyone who intercepts the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

encryption key

A

A block of characters, used in combination with an encryption algo- rithm, to encrypt or decrypt a stream or block of data.

17
Q

enhanced interior gateway routing protocol (EIGRP)

A

A TCP/IP routing protocol that is used to transmit network routing information from one network router to an- other in order to determine the most efficient path through a large network.

18
Q

enterprise architecture

A

Activities that ensure important business needs are met by IT systems; the model that is used to map business functions into the IT environment and IT systems in increasing levels of detail.

19
Q

erasable programmable read-only memory (EPROM)

A

A form of permanent memo- ry that can be erased by shining ultraviolet (UV) light through a quartz window on the top of the chip.

20
Q

error handling

A

Functions that are performed when errors in processing are encountered.

21
Q

espionage

A

The act of spying on an organization.

22
Q

Ethernet

A

A standard protocol for assembling a stream of data into frames for trans- port over a physical medium from one station to another on a local area network. On an Ethernet network, any station is free to transmit a packet at any time, provided that another station is not already doing so.

23
Q

evacuation procedure

A

nstructions to safely evacuate a work facility in the event of a fire, earthquake, or other disaster.

24
Q

evidence

A

Information gathered by the auditor that provides proof that a control exists and is being operated.

25
Q

expected error rate

A

An estimate that expresses the percent of errors or exceptions that may exist in an entire population.

26
Q

exposure factor (EF)

A

The financial loss that results from the realization of a threat, expressed as a percentage of the asset’s total value.