{ "@context": "https://schema.org", "@type": "Organization", "name": "Brainscape", "url": "https://www.brainscape.com/", "logo": "https://www.brainscape.com/pks/images/cms/public-views/shared/Brainscape-logo-c4e172b280b4616f7fda.svg", "sameAs": [ "https://www.facebook.com/Brainscape", "https://x.com/brainscape", "https://www.linkedin.com/company/brainscape", "https://www.instagram.com/brainscape/", "https://www.tiktok.com/@brainscapeu", "https://www.pinterest.com/brainscape/", "https://www.youtube.com/@BrainscapeNY" ], "contactPoint": { "@type": "ContactPoint", "telephone": "(929) 334-4005", "contactType": "customer service", "availableLanguage": ["English"] }, "founder": { "@type": "Person", "name": "Andrew Cohen" }, "description": "Brainscape’s spaced repetition system is proven to DOUBLE learning results! Find, make, and study flashcards online or in our mobile app. Serious learners only.", "address": { "@type": "PostalAddress", "streetAddress": "159 W 25th St, Ste 517", "addressLocality": "New York", "addressRegion": "NY", "postalCode": "10001", "addressCountry": "USA" } }

Glossary- E Flashcards

(26 cards)

1
Q

E-1

A

A common carrier standard protocol for transporting voice and data. E-1 can sup- port up to 32 separate voice channels of 64 kbit/sec each and is used primarily in Europe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

E-3

A

A common carrier standard protocol for transporting voice and data. E-3 can support up to 512 separate voice channels of 64 kbit/sec each and is used primarily in Europe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

e-mail

A

A network-based service used to transmit messages between individuals and groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

eavesdropping

A

The act of secretly intercepting and recording a voice or data transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

electric generator

A

A system consisting of an internal combustion engine powered by gasoline, diesel fuel, or natural gas that spins an electric generator. A generator can sup- ply electricity for as long as several days, depending upon the size of its fuel supply and whether it can be refueled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

electrically erasable programmable read-only memory (EEPROM)

A

A form of per- manent memory that can be rewritten using a special program on the computer that it is installed on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

elliptic curve

A

A public key cryptography algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

embedded audit module (EAM)

A

A continuous auditing technique that consists of a special software module embedded within a system that is designed to detect process- ing anomalies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

emergency communications plan

A

The communications that are required during a disaster. See also response document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

emergency response

A

The urgent activities that immediately follow a disaster, including evacuation of personnel, first aid, triage of injured personnel, and possibly firefighting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

employee handbook

A

See employee policy manual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

employee policy manual

A

A formal statement of the terms of employment, facts about

the organization, benefits, compensation, conduct, and policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

employment agreement

A

A legal contract between an organization and an employee, which may include a description of duties, roles and responsibilities, confidentiality, compliance, and termination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

encapsulation

A

A practice where a method can call on another method to help per- form its work. See also method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

encryption

A

The act of hiding sensitive information in plain sight. Encryption works by scrambling the characters in a message, using a method known only to the sender and receiver, making the message useless to anyone who intercepts the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

encryption key

A

A block of characters, used in combination with an encryption algo- rithm, to encrypt or decrypt a stream or block of data.

17
Q

enhanced interior gateway routing protocol (EIGRP)

A

A TCP/IP routing protocol that is used to transmit network routing information from one network router to an- other in order to determine the most efficient path through a large network.

18
Q

enterprise architecture

A

Activities that ensure important business needs are met by IT systems; the model that is used to map business functions into the IT environment and IT systems in increasing levels of detail.

19
Q

erasable programmable read-only memory (EPROM)

A

A form of permanent memo- ry that can be erased by shining ultraviolet (UV) light through a quartz window on the top of the chip.

20
Q

error handling

A

Functions that are performed when errors in processing are encountered.

21
Q

espionage

A

The act of spying on an organization.

22
Q

Ethernet

A

A standard protocol for assembling a stream of data into frames for trans- port over a physical medium from one station to another on a local area network. On an Ethernet network, any station is free to transmit a packet at any time, provided that another station is not already doing so.

23
Q

evacuation procedure

A

nstructions to safely evacuate a work facility in the event of a fire, earthquake, or other disaster.

24
Q

evidence

A

Information gathered by the auditor that provides proof that a control exists and is being operated.

25
expected error rate
An estimate that expresses the percent of errors or exceptions that may exist in an entire population.
26
exposure factor (EF)
The financial loss that results from the realization of a threat, expressed as a percentage of the asset’s total value.