Introduction |
|
1 | (1) |
|
|
1 | (1) |
|
|
2 | (1) |
|
|
2 | (1) |
|
How to Prepare for the Exam |
|
|
3 | (1) |
|
Additional Exam-Preparation Resources |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
5 | (1) |
|
What This Book Does Not Do |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
6 | (3) |
|
|
7 | (1) |
|
Extensive Practice Test Options |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
9 | (2) |
|
|
11 | (10) |
|
|
12 | (1) |
|
|
12 | (2) |
|
|
12 | (2) |
|
|
14 | (1) |
|
|
14 | (4) |
|
|
15 | (1) |
|
|
16 | (1) |
|
More Exam Preparation Tips |
|
|
16 | (2) |
|
|
18 | (3) |
|
Part I: IT Governance and the Audit Process |
|
|
|
|
21 | (42) |
|
|
24 | (1) |
|
Issues and Challenges of the IS Auditor |
|
|
24 | (3) |
|
|
26 | (1) |
|
Standards and Guidelines for ISACA IS Auditors |
|
|
27 | (5) |
|
|
28 | (3) |
|
|
31 | (1) |
|
|
32 | (4) |
|
|
33 | (2) |
|
|
35 | (1) |
|
Auditing and the Use of Internal Controls |
|
|
36 | (3) |
|
|
38 | (1) |
|
|
39 | (11) |
|
|
40 | (1) |
|
|
41 | (1) |
|
|
42 | (3) |
|
|
45 | (1) |
|
Compliance Versus Substantive Testing |
|
|
46 | (1) |
|
Sampling and Embedded Audit Modules |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
49 | (1) |
|
Changes in the IS Audit Process |
|
|
50 | (4) |
|
The Control Self-Assessment Process |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
52 | (2) |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
55 | (7) |
|
|
55 | (4) |
|
|
59 | (2) |
|
Answers to Exam Questions |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
63 | (50) |
|
|
67 | (1) |
|
Best Practices for Senior Management |
|
|
67 | (7) |
|
Audit's Role in Governance |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
71 | (1) |
|
Information Security Governance |
|
|
72 | (2) |
|
The Role of Strategy, Policies, Planning, and Procedures |
|
|
74 | (5) |
|
|
75 | (1) |
|
|
76 | (3) |
|
Risk Identification and Management |
|
|
79 | (9) |
|
|
80 | (1) |
|
|
81 | (1) |
|
|
81 | (2) |
|
|
83 | (5) |
|
Management Practices and Controls |
|
|
88 | (11) |
|
|
89 | (4) |
|
|
93 | (2) |
|
Change Management and Quality Improvement Techniques |
|
|
95 | (4) |
|
Understanding Personnel Roles and Responsibilities |
|
|
99 | (5) |
|
Employee Roles and Duties |
|
|
100 | (1) |
|
|
101 | (3) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
105 | (5) |
|
|
105 | (2) |
|
|
107 | (2) |
|
Answers to Exam Questions |
|
|
109 | (1) |
|
|
110 | (3) |
|
Part II: System and Infrastructure Lifecycle Management |
|
|
|
|
113 | (42) |
|
|
117 | (1) |
|
|
117 | (3) |
|
Roles, Responsibility, and Structure |
|
|
118 | (1) |
|
Project Culture and Objectives |
|
|
119 | (1) |
|
Project-Management Practices |
|
|
120 | (10) |
|
|
121 | (1) |
|
|
121 | (7) |
|
Project Control and Execution |
|
|
128 | (1) |
|
|
128 | (2) |
|
Business Application Development |
|
|
130 | (12) |
|
Systems-Development Methodology |
|
|
131 | (11) |
|
Alternative Application-Development Techniques |
|
|
142 | (4) |
|
Application-Development Approaches |
|
|
144 | (2) |
|
Information Systems Maintenance Practices |
|
|
146 | (2) |
|
|
148 | (1) |
|
|
148 | (1) |
|
|
148 | (6) |
|
|
149 | (1) |
|
|
150 | (2) |
|
Answers to Exam Questions |
|
|
152 | (2) |
|
|
154 | (1) |
|
System Infrastructure Control |
|
|
155 | (40) |
|
|
158 | (1) |
|
Programmed and Manual Application Controls |
|
|
158 | (10) |
|
Business Process Controls |
|
|
159 | (9) |
|
Auditing Application Controls |
|
|
168 | (8) |
|
Understanding the Application |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
170 | (2) |
|
Application System Testing |
|
|
172 | (1) |
|
Continuous Online Auditing |
|
|
173 | (3) |
|
Auditing Systems Development, Acquisition, and Maintenance |
|
|
176 | (2) |
|
|
177 | (1) |
|
Business Application Systems |
|
|
178 | (9) |
|
|
179 | (1) |
|
Electronic Data Interchange |
|
|
180 | (1) |
|
|
181 | (1) |
|
|
182 | (5) |
|
|
187 | (1) |
|
|
187 | (1) |
|
|
188 | (4) |
|
|
188 | (1) |
|
|
189 | (2) |
|
Answers to Exam Questions |
|
|
191 | (1) |
|
|
192 | (3) |
|
Part III: IT Service Delivery and Support |
|
|
|
Information Systems Hardware and Architecture |
|
|
195 | (44) |
|
|
198 | (1) |
|
Information Systems Operation |
|
|
198 | (11) |
|
Monitoring Resource Usage |
|
|
200 | (4) |
|
|
204 | (2) |
|
Change-Management Process |
|
|
206 | (3) |
|
Information Systems Hardware |
|
|
209 | (12) |
|
The Central Processing Unit |
|
|
210 | (2) |
|
|
212 | (1) |
|
|
213 | (1) |
|
|
214 | (1) |
|
Computer Configurations and Roles |
|
|
215 | (3) |
|
Radio Frequency Identification |
|
|
218 | (1) |
|
Hardware Maintenance Program |
|
|
219 | (1) |
|
Hardware Monitoring and Capacity Management |
|
|
219 | (2) |
|
Information Systems Architecture and Software |
|
|
221 | (10) |
|
|
221 | (2) |
|
|
223 | (1) |
|
|
224 | (1) |
|
Data Communication Software |
|
|
225 | (1) |
|
Database-Management Systems |
|
|
226 | (1) |
|
|
227 | (3) |
|
Software Licensing Issues |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
231 | (1) |
|
|
232 | (5) |
|
|
232 | (2) |
|
|
234 | (2) |
|
Answers to Exam Questions |
|
|
236 | (1) |
|
|
237 | (2) |
|
Information Systems Used for IT Delivery and Support |
|
|
239 | (50) |
|
|
242 | (1) |
|
|
242 | (32) |
|
|
242 | (2) |
|
Network Standards and Protocols |
|
|
244 | (1) |
|
|
244 | (4) |
|
Network Services and Applications |
|
|
248 | (1) |
|
Comparing the OSI Model to the TCP/IP Model |
|
|
249 | (5) |
|
|
254 | (2) |
|
|
256 | (3) |
|
|
259 | (4) |
|
|
263 | (4) |
|
|
267 | (2) |
|
|
269 | (3) |
|
|
272 | (2) |
|
Network Administration and Control |
|
|
274 | (3) |
|
Risks to Network Infrastructure and Controls |
|
|
276 | (1) |
|
|
277 | (3) |
|
|
277 | (3) |
|
|
280 | (5) |
|
|
280 | (2) |
|
|
282 | (2) |
|
Answers to Exam Questions |
|
|
284 | (1) |
|
|
285 | (4) |
|
Part IV: Protection of Information Assets |
|
|
|
Protection of Logical Assets |
|
|
289 | (72) |
|
|
293 | (1) |
|
The Goals of Logical Security |
|
|
293 | (10) |
|
Information Security Protection Mechanisms |
|
|
294 | (1) |
|
The Role of Confidentiality, Integrity, and Availability |
|
|
295 | (8) |
|
|
303 | (9) |
|
Identification and Authentication (I&A) |
|
|
303 | (4) |
|
|
307 | (2) |
|
|
309 | (2) |
|
|
311 | (1) |
|
Handling Confidential Information |
|
|
312 | (1) |
|
|
313 | (6) |
|
|
313 | (1) |
|
|
314 | (5) |
|
|
319 | (9) |
|
Network and Internet Security |
|
|
320 | (4) |
|
|
324 | (1) |
|
|
325 | (1) |
|
|
326 | (2) |
|
|
328 | (1) |
|
|
328 | (1) |
|
|
328 | (1) |
|
|
329 | (1) |
|
|
329 | (1) |
|
Containing Threats to Information Security |
|
|
330 | (7) |
|
|
332 | (2) |
|
|
334 | (1) |
|
Auditing Information Security |
|
|
335 | (2) |
|
Auditing Network Infrastructure Security |
|
|
337 | (3) |
|
Ethical Hacking and Penetration Testing |
|
|
337 | (2) |
|
|
339 | (1) |
|
|
339 | (1) |
|
|
340 | (13) |
|
|
341 | (8) |
|
Cryptographic Real-World Solutions |
|
|
349 | (2) |
|
Encryption Risks and Attacks |
|
|
351 | (2) |
|
|
353 | (2) |
|
|
353 | (2) |
|
|
355 | (5) |
|
|
356 | (1) |
|
|
357 | (2) |
|
Answers to Exam Questions |
|
|
359 | (1) |
|
|
360 | (1) |
|
|
361 | (42) |
|
|
364 | (1) |
|
|
364 | (17) |
|
Physical Security Exposures |
|
|
365 | (6) |
|
Physical Security Controls |
|
|
371 | (10) |
|
Environmental Protection Practices |
|
|
381 | (5) |
|
|
381 | (1) |
|
|
382 | (1) |
|
Heating, Ventilation, and Air Conditioning (HVAC) |
|
|
383 | (1) |
|
Fire Prevention, Detection, and Suppression |
|
|
384 | (2) |
|
|
386 | (3) |
|
|
387 | (2) |
|
|
389 | (6) |
|
|
389 | (1) |
|
|
390 | (1) |
|
|
390 | (1) |
|
Deploying and Implementing Policies |
|
|
391 | (1) |
|
Physical Asset and Information Control |
|
|
392 | (3) |
|
|
395 | (2) |
|
|
395 | (2) |
|
|
397 | (3) |
|
|
397 | (1) |
|
|
397 | (2) |
|
Answers to Exam Questions |
|
|
399 | (1) |
|
|
400 | (3) |
|
Part V: Business Continuity and Disaster Recovery |
|
|
|
Business Continuity and Disaster Recovery |
|
|
403 | (44) |
|
|
406 | (1) |
|
|
406 | (19) |
|
Disasters and Disruptive Events |
|
|
406 | (3) |
|
|
409 | (1) |
|
ISACA and the BCP Process |
|
|
409 | (16) |
|
|
425 | (13) |
|
Alternate Processing Sites |
|
|
426 | (3) |
|
|
429 | (2) |
|
Software and Data Recovery |
|
|
431 | (1) |
|
|
432 | (2) |
|
Telecommunications Recovery |
|
|
434 | (2) |
|
Verification of Disaster Recovery and Business Continuity Process |
|
|
436 | (2) |
|
|
438 | (1) |
|
|
438 | (1) |
|
|
439 | (5) |
|
|
440 | (1) |
|
|
441 | (2) |
|
Answers to Exam Questions |
|
|
443 | (1) |
|
|
444 | (3) |
|
Part VI: Final Preparation |
|
|
|
|
447 | (28) |
|
|
448 | (3) |
|
|
451 | (3) |
|
Systems and Infrastructure Lifecycle Management |
|
|
454 | (6) |
|
IT Service Delivery and Support |
|
|
460 | (6) |
|
Protection of Information Assets |
|
|
466 | (4) |
|
Business Continuity and Disaster Recovery |
|
|
470 | (5) |
|
|
475 | (34) |
|
|
476 | (33) |
|
Answers to Practice Exam Questions |
|
|
509 | (18) |
|
Answers at a Glance to Practice Exam |
|
|
509 | (1) |
|
Answers with Explanations |
|
|
510 | (17) |
Glossary |
|
527 | (38) |
Index |
|
565 | |