Exam Essentials

Be able to evaluate the effectiveness of technical (logical) access controls. Technical controls include access control mechanisms, encryption, firewalls, and intrusion detection and prevention capabilities. Technical access control mechanisms include passwords, access control lists, and biometrics for authentication.

Understand the perimeter defense mechanisms. The network security infrastructure must provide sufficient perimeter defenses along with mechanisms to minimize loss from hackers, viruses, and worms. But the network is susceptible to attack by hacking, spoofing, spamming, and denial of service, along with other threats such as social engineering.

Recognize the different types of technical attacks. Passive attacks ...

Get CISA® Certified Information Systems Auditor®: Study Guide, Third Edition now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.