AP Notes, Outlines, Study Guides, Vocabulary, Practice Exams and more!

Chapter 4 Vocab (China) Flashcards

Terms : Hide Images
533965842LoessFertile yellow soil
533965843DikesEarthen walls built along a river to protect from floods
533965844BureaucracyGovernment organized into different levels and tasks
533965845AnimismBelief that spirits inhabit everything
533965846Oracle BonesCattle bones or tortoise shells on which Chinese priests would write questions and then interpret answers from the cracks that formed when the bones were healed
533965847DialectsVariations of a language
533965848CalligraphyChinese art of writing
533965849Xia DynastyLine of kings ruling over a late Neolithic people in the Huang River region of China starting in about 2000 BC
533965850Shang DynastyInvaders of the Huang River valley who came to power sometime between 1750 BC and 1500 BC and established the first dynasty in China
533965851Zhou DynastyPeople who overthrew the Shang dynasty of China in 1122 BC
533965852AutocracyGovernment in which the ruler holds absolute power
533965853Civil ServiceCentralized system that runs the day-to-day business of government
533965854LevelingPolicy in which government used price controls to balance the economic effects of farm surpluses or shortages
533965855Qin DynastyDynasty that came to power in China in 221 BC, under which the first true empire of China was created
533965856Han DynastyDynasty of rulers that ruled a centralized and growing empire in China
533965857ChengRuler of the Qin dynasty
533965858Great Wall of ChinaWall built and expanded upon by early rulers of China to protect from invasions
533965859Liu BangA commoner who became a Qin general
533965860Liu CheThe longest ruling Han emperor
533965861Silk RoadTrade route stretching from China to the Mediterranean
533965862YinForce that is female, dark, and passive; part of the Chinese belief of dualism or balance in life
533965863YangForce that is male, bright, and active; part of the Chinese belief of dualism or balance in life
533965864ConfuciusA leading philosopher in the Zhou era
533965865AnalectsCollection of the ideas and teachings of Confucius
533965866LaoziA philosopher who founded the philosophy called Daoism
533965867Dao De JingCompilation of Laozi's teaching on Daoism
533965868LegalismSchool of Chinese philosophy concerned with politics
533965869GenealogyRecord of a family history
533965870AcupunctureChinese medical practice of inserting needles into certain areas of the body
533965871Five ClassicsText used to train scholars and civil servants in ancient china

Peritoneal Cavity and Structures Flashcards

Terms : Hide Images
525322906What is the definition of an "intraperitoneal organ?"These are almost entirely covered with visceral peritoneum.
525322907What is the definition of "retroperitoneal organ?"These are external or posterior to the peritoneum and are only partially covered with peritoneum, usually on just one surface.
525322908What are the retroperitoneal structures?Abdominal aorta, inferior vena cava, kidneys, adrenal glands, ureters. All of these strucures lie directly against the posterior abdominal wall.
525322909What are the secondarily retroperitoneal structures?Pancreas, all of duodenum except 1st half of proximal segment, ascending colon and hepatic flexure, splenic flexure, and descending colon.
525322910What are the intraperitoneal bowel segments?Jejunum, ileum, appendix, cecum, transverse colon, sigmoid colon. Each of these intestinal segments, except the cecum, lie suspended in the abdominopelvic cavity by a broad peritoneal ligament called a mesentery.
525322911What are the borders of the omental bursa?Superior: diaphragm Anterior: lesser omentum, stomach, gastrocolic ligament Inferior: transverse colon, transverse mesocolon Posterior: upper abdominal wall Left: gastrophrenic, gastrosplenic, splenorenal ligaments Right: communicates with the greater sac through the epiploic foramen.
525322912Borders of the epiploic foramen:Superior: caudate lobe of liver Anterior: free border of lesser momentum containing the portal vein, hepatic artery proper, common bile duct Posterior: IVC Inferior: proximal half of 1st segment of duodenum
525322913What structures make up the pelvic viscera?Rectum, urinary bladder, uterus, uterine tubes (forming broad ligament)
525322914Clinical significance of the right lateral gutter?Slow percolation of infected fluids from appendix, gallbladder, right kidney, lesser curvature of the stomach, and first and second parts of duodenum may, when patient is supine, enter the hepatorenal pouch. Fluid may flow from hepatorenal pouch and enter superior recess of mental bursa- accessible to heart & lungs. If patient is maintained in semi-sitting position, fluids descend to relatively accessible reco-vesical (uterine) pouch that can be drained via rectum or vagina.
525322915Visceral painDull pain poorly localized to one of the midline regions of the abdomen (epigastric, umbilical, or hypogastric). Visceral pain fibers are sensitive to acute stretching and anoxia. The pain receptors are located in the muscular walls of the hollow abdominal and pelvic viscera and in the fibrous capsule of solid abdominal viscera.
525322916Referred painPain that a diseased or injured viscus refers to a dermatome that is innervated by the same spinal segment.
525322917Somatic painProduced by stimulation of parietal peritoneum pain fibers. Inflammation of the parietal peritoneum of the anterolateral abdominal wall produces somatic pain that is sharp and limited to region of inflammation. A diseased abdominal or pelvic viscus can produce somatic pain when its inflammatory process extends to the parietal peritoneum of those abdominopelvic wall regions with which the viscus contacts. Stretching exacerbates the somatic pain. Worsening of inflammation ultimately elicits reflex contraction and rigidity of abdominal wall muscles.
525322918Origin of pain between xiphoid process and umbilicusForegut: distal esophagus, stomach, proximal duodenum, biliary tree, pancreas, liver
525322919Origin of pain in periumbilical regionStructures derived from the midgut- small bowel, appendix, ascending colon, proximal 2/3 of transverse colon
525322920Origin of pain between umbilicus and the pubic symphisisHindgut organs, which include distal 1/3 of the transverse colon, descending colon, rectosigmoid regions.
525322921Rebound tendernessPain upon removal of pressure. Aggravation of parietal layer of peritoneum by stretching on or moving. One of the classical signs of peritonitis that can occur in diseases like appendicitis, and may occur in ulcerative colitis with rebound tenderness in the right lower quadrant. Other signs are tenderness and abdominal guarding.
525322922Suspensory ligament of the duodenum (Ligament of Treitz)Widens duodenojejunal flexure to facilitate movement of intestinal contents

S&D 2: peritoneal cavity Flashcards

Terms : Hide Images
529473852What does the parietal peritoneum line?The external lining of the peritoneal cavity. (think just deep to the rectus sheath)
529473853What does the visceral peritoneum line?The internal organs of the peritoneal cavity
529473854What connects the parietal peritoneum to the visceral peritoneum?Mesentery
529473855Which peritoneum layer is innervated by general sensory fibers, causing pain?Parietal peritoneum
529473856Which peritoneum is supplied by blood vessels and lymph drainage of the viscera?Visceral peritoneum
529473857What are the intraperitoneal organs?Stomach, 1st part of duodenum, liver, tail of pancreas, spleen, jejunum, ileum, transverse colon and sigmoid colon
529473858What are the retroperitoneal organs?(posterior to peritoneum) Urinary, circulatory (aorta/VC), esophagus, 2-4th parts of duodenum, pancreas, ascending colon, descending colon,
529473859What is the term for organs that are covered with parietal peritoneum but not visceral peritoneum?Secondarily retroperitoneal
529473860Excess fluid in the peritoneal cavity, often the result of inflammation of the peritoneumascites
529473861What is the name of the reflection of the peritoneum that is suspended from the greater curvature of the stomach?greater omentum
529473862What is the purpose of the greater omentum?Provides pathways for neurovascular structures and can prevent the spread of infection
529473863What happens to the greater omentum during development?Fuses together to form single sheath
529473864What is the purpose of the lesser omentum?Pathways for neurovascular structures
529473865What two ligaments make up the lesser omentum?Hepatogastric and hepatoduodenal ligaments
529473866What divides the greater sac into the supracolic and infracolic compartments?Transverse colon
529473867Where are the three recesses of the greater sac?Subphrenic (between liver and diaphragm), Morison's pouch (below liver), Paracolic recesses on either side of colon
529473868Where is the lesser sac (omental bursa)?Behind the liver, lesser omentum, and stomach
529473869Where is the omental foramen (epiploic foramen of Winslow)?Behind hepatoduodenal ligament
529473870What can accumulate in the omental bursa (lesser sac)?Loop of intestine (hernia), fluid
529473871What three things are found in the portal triad in the hepatoduodenal ligament?Common bile duct, portal vein, proper hepatic artery
529473872What is found posteriorly within the portal triad?Portal vein
529473873What suspends organs from body wall or connects organs to each other?Mesentery
529473874What is the location of the posterior body wall when parietal peritoneum reflects and forms the double layer?Root of the mesentery
529473875What does the root of the mesentery refer to?Root of small intestine
529473876Name the 2 peritoneal ligaments connecting the spleen.Gastrolienal and lienorenal
529473877Name the 2 peritoneal ligaments connecting the liver.Falciform (liver to diaphragm and ab wall) and coronary (top, bare area of liver)
529473878Name the 2 peritoneal ligaments that are embryological remnants.Ligamentum teres hepatis and ligamentum venosum
529473879About which vertebrae level is the celiac trunk? What does it supply?T12; supplies the foregut (liver, stomach, spleen)
529473880About which vertebrae level is the superior mesenteric artery? What does it supply?L1; supplies the midgut (SI, ascending LI, transverse LI)
529473881About which vertebrae level is the inferior mesenteric artery? What does it supply?L3; supplies the hindgut (descending LI, rectum)
529473882Branches of celiac trunk/axisCommon hepatic a., splenic a., left gastric a.
529473883The celiac trunk splits to the common hepatic on the right side. What 3 things does the common hepatic then split into?Proper hepatic (which splits again to L and R), right gastric a., gastroduodenal a.
529473884The celiac trunk splits to the splenic artery on the left side. What two branches does this form?Short gastric a., left gastroepiploic a.
529473885What is the smallest branch of the celiac trunk and where does it run?Left gastric artery, runs along lesser curvature
529473886What 6 branches does the superior mesenteric branch into?Inf. pancreaticoduodenal, jejunal and ileal branches, middle colic a., right colic a., ileocolic a., appendicular a.
529473887What is another name for the marginal artery of the colon?Artery of Drummond
529473888What 3 branches does the inferior mesenteric artery branch into?Left colic, sigmoid, superior rectal (hindgut)

Radiography Essentials Ch 3 Flashcards

Basic Physics for Radiography

Terms : Hide Images
8130682WavelengthThe penetrating power of an X-ray beam determined by its energy and measured by the distance from one crest to the next
8130683Mechanical energyCan be classified as either kinetic energy or potential energy
8130684Sine waveA form of repeating wave that changes the field through which electric and magnetic properties pass
8130685Electromagnetic energyConsists of light, X-rays, radio waves and microwaves
8130686Energy levelsUsed to refer to the orbital shells of an atom
8130687Resistance to an electrical circuitAny property of the circuit that opposes or hinders the flow of current
8130688Important functions of an electrical outletResistance and frequency
8130689VelocityMethod that all electromagnetic energy moves through space
8130690Frequency of waveThe number of times per second that a crest passes a given point
8130691Sine Wave VelocityWavelength x Frequency = Velocity
8130692PhotonThe smallest possible unit of electromagnetic energy
8130693EnergyThe ability to do work
8130694Kinetic energyEnergy of motion, the ability of a moving object to do work
8130695Potential energy"Stored" energy
8130696Chemical energyReleased through chemical changes in atoms or molecules
8130697Thermal energyThe result of atomic motion; commonly called heat
8130698Nuclear energyThe energy released by radionuclides used to produce electricity in a nuclear power plant
8130699Electric energyElectricity; the ability of electric charges to do work
8130700IonizationThe process of producing an atom with an electric charge; gaining or losing electrons
8130701ProtonOne of the fundamental particles that compose atoms; positive charge of +1
8130702VoltmeterDevice used to measure the difference in electrical potential between two points in a parallel circuit
8130703ElectronOne of the fundamental particles that compose an atom; located in an orbit around the nucleus and is negatively charged -1
8130704AmmeterDevice used to measure the current flowing in a series circuit
8130705TransformerIncreases or decreases voltage
8130706AtomBuilding blocks of matter
8130707MatterAnything that occupies space and has shape or form; solids, liquids and gas
8130708K shellInnermost shell of an atom
8130709Potential differenceThe force or strength of the electron flow in a current
8130710MassThe quantity of matter that makes up any physical object
8130711Step-down transformerA two-coil transformer with more windings on the primary side
8130712Direct currentCurrent that flows in only one direction
8130713CurrentThe quantity of electrons flowing through a circuit
8130714OhmUnit of resistance
8130715WeightTerm which means approximately the same thing as "mass"
8130716X-Rays consist of...Electromagnetic energy
8130717VoltsUnits of which potential difference is measured
813071860 HzThe frequency of alternating current delivered by electrical utilities in the U.S. and Canada
8130719Laws of ConservationMatter and Energy can be neither created nor destroyed, but can change form
8130720Characteristics of X-RaysHave no mass * Highly penetrating and invisible * Electrically neutral * Cause fluorescence in certain crystals * Cannot be focused with a lens * Produce biological changes in tissues * Affect photographic film
8130721Kilovolt peak (kVp)Measures the potential difference across an X-Ray tube; equal to 1000 volts
8130722Milliampere (mA)Measures X-ray tube current; equal to 1/1000 of an ampere
8130723Ampere (A)Measures the rate of current flow in a circuit
8130724DiodeAllows electrons to flow in only one direction
8130725RectificationAlternating current converted so that it flows in one direction only
8130726Step-up transformerA two-coil transformer with more windings on the secondary side

Amsco AP US History Chapter 20 Flashcards

Terms : Hide Images
360998562William SewardUnited States politician who as secretary of state in 1867 arranged for the purchase of Alaska from Russia for 7.2 million dollars(known at the time as Seward's Folly) Secretary of state for Lincoln and Johnson
360998563Alfred Thayer MahanAmerican Naval officer and historian. He is most famous for his book "The Influence of Sea Power on History" (1890) which defined Naval strategy. His philosophies had a major influence on the Navies of many nations resulting in a igniting of naval races between countries.
360998564jingoismextreme, chauvinistic patriotism, often favoring an aggressive, warlike foreign policy
360998565yellow journalismOne of the causes of the Spanish-American War (1898) - this was when newspaper publishers like Hearst and Pulitzer sensationalized news events (like the sinking of the Maine) to anger American public towards Spain. Journalism that exploits, distorts, or exaggerates the news to create sensations and attract readers
360998566DeLome letterConsidered a cause of the Spanish-American War - letter from the Spanish ambassador criticizing President McKinley which was published in the Hearst newspaper. (1898)
360998567Sinking of the MaineOne week after the de Lome letter made headlines on February 15,1898, the U.S. battleship Maine was at anchor in the harbor of Havana, Cuba when it suddenly exploded. 260 Americans were killed on board. The yellow press accused Spain of blowing up the ship, even though experts later concluded that the explosion was an accident.
360998568Teller AmendmentApril 1896 - U.S. declared Cuba free from Spain, but this amendment disclaimed any American intention to annex Cuba
360998569George DeweyA United States naval officer remembered for his victory at Manila Bay in the Spanish-American War, U.S. naval commander who led the American attack on the Philippines
360998570Rough RidersA volunteer calvary regiment led by Theodore Roosevelt which fought in Battle of San Juan Hill.
360998571LiliuokalaniHawaiian Queen who tried to eliminate white control in the Hawaiian government. The white population revolted and seized power. Under McKinley Hawaii was annexed
360998572Anti-Imperialist LeagueObjected to the annexation of the Philippines and the building of an American empire. Idealism, self-interest, racism, constitutionalism, and other reasons motivated them, but they failed to make their case and lost by 2 votes; the Philippines were annexed in 1900
360998573insular casesThese were court cases dealing with islands/countries that had been recently annexed and demanded the rights of a citizen. These Supreme Court cases decided that the Constitution did not always follow the flag, thus denying the rights of a citizen to Puerto Ricans and Filipinos.
360998574Platt AmendmentCuba had to agree to this to get US troops to leave Cuba: 1) Cuba makes no treaty with others if in endangers independence 2) can't borrow money if they can't pay back 3)US can get involved with Cuba affairs 4)US has naval base at Guantanamo Bay
360998575Open Door PolicyA policy, proposed by the United States in 1899, under which all nations would have equal opportunities to trade in China
360998576xenophobiaA fear or hatred of foreigners or strangers
360998577Boxer Rebellion1899 rebellion in Beijing, China started by a secret society of Chinese who opposed the "foreign devils". The rebellion was ended by British troops
360998578big-stick policyRoosevelt's philosophy - In international affairs, ask first but bring along a big army to help convince them. Threaten to use force, act as international policemen
360998579Hay-Pauncefote TreatyAn agreement in which the U.S would receive exclusive rights to construct and control a canal in Central America. It nullified the 1850 Clayton-Bulwer Treaty, thus allowing the Panama Canal to be built.
360998580Roosevelt CorollaryRoosevelt's 1904 extension of the Monroe Doctrine, stating that the United States has the right to protect its economic interests in South And Central America by using military force, first put into effect in Dominican Republic
360998581Russo-Japanese WarRussia and Japan were fighting over Korea, Manchuria, etc. Began in 1904, but neither side could gain a clear advantage and win. Both sent reps to Portsmouth, NH where TR mediated Treaty of New Hampshire in 1905. Teddy Roosevelt won the nobel peace prize for his efforts, the 1st pres. to do so.
360998582Treaty of Portsmouth(1905) ended the Russo-Japanese War (1904-1905). It was signed in Portsmouth, New Hampshire, after negotiations brokered by Theodore Roosevelt (for which he won the Nobel Peace Prize). Japan had dominated the war and received an indemnity, the Liaodong Peninsula in Manchuria, and half of Sakhalin Island, but the treaty was widely condemned in Japan because the public had expected more.
360998583Gentleman's Agreement(1907) agreement in which the Japanese promised not to issue passports to laborers seeking to come to the US, in return for no Japanese segregation in the US.
360998584great white fleet1907-1909 - Roosevelt sent the Navy on a world tour to show the world the U.S. naval power. Also to pressure Japan into the "Gentlemen's Agreement."
360998585Dollar DiplomacyForeign policy created under President Taft that had the U.S. exchanging financial support ($) for the right to "help" countries make decisions about trade and other commercial ventures. Basically it was exchanging money for political influence in Latin America and the Caribbean.
360998586Lodge CorollaryIn 1912 Senate passed resolution to Monroe Doctrine. It stated that non-European powers (such as Japan) would be excluded from owning territory in Western Hemisphere.
360998587New FreedomWoodrow Wilson's domestic policy that, promoted antitrust modification, tariff revision, and reform in banking and currency matters.
360998588Moral DiplomacyPresident Woodrow Wilson's approach to foreign policy, focusing on promoting democratic ideals and morals abroad.
360998589Jones Act1916-Act which granted full territorial status to the Philippines, guaranteed a bill of rights and universal male sufferage, as well as Philippine independence as soon as a stable government was established
360998590expeditionary forceWilson ordered General Pershing to pursue Pancho Villa into Mexico. They were in nothern Mexico for months without being able to capture Villa. Growing possibility of U.S. entry into World War I caused Wilson to withdraw Pershing's troops.

Chapter 13 (American Pageant) Flashcards

Terms : Hide Images
109416578Manifest Destiny~est. in 1840's ~belief that the U.S. was destined - by God and by history - to expand its boundaries from "sea to sea," from the Atlantic to the Pacific Ocean. ~This rationale drove the acquisition of territory. ~however, excluded the westward expansion of other races
109416579Henry Clay~he opposed Manifest Destiny ~believed it would cause controversy over slavery and threaten stability of Union (he was right)
109416580Stephen F. Austin~young immigrant from Missouri who est. the first legal American settlement in Texas in 1822 ~was effective in recruiting American immigrants but challenged Mexican gov.
109416581General Antonio Lopez de Santa Anna~he seized power as a dictator in Mexico in mid 1830's ~tries to re-establish Mexican rule in Texas from American revolts ~created armies that effectively drove some Americans to the east to escape but wasn't effective enough
109416582Battle of San Jacinto~battle in which the Americans under Sam Houston defeated the Mexican army and took Santa Anna prisoner ~resulted in Texas' independence
109416583Tejanos~Mexican residents of Texas ~fought Americans in revolution but after Texas' independence it was difficult
109416584Sam Houston~the president of Texas who led Americans in Battle of San Jacinto against Mexicans ~sent delegation to U.S. with hopes of annexation but rejected
109416585"joint-occupation"~the agreement between Britain and the U.S. to allow citizens of each country (in the Oregon country) to have equal access to the territory
109417646reason people migrated westfor economic opportunities
109417647Oregon Trailthe major route for ppl to travel westward (2,000 miles) ~a route from Independence, Missouri, to Oregon City, Oregon, used by pioneers traveling to the Oregon Territory
109417648Election of 1844~between Henry Clay and James K. Polk (Democrat) Democrats: support annexation; Republicans: no annexation
109417649James K. Polk~president in March 1845 (VP: John Tyler) ~wanted to settle Oregon Boundary dispute with britain. ~wanted to aquire California. ~wanted to incorperate Texas into union. ~won election largely because of his support for annexation
109420883Bear Flag Revolution-A revolt of American settlers in California against Mexican rule. -ignited the Mexican War and ultimately made California a state. -led by John C. Fremont
109420884Treaty of Guadalupe Hidalgo-treaty that ended the Mexican War, granting the U.S. control of Texas, New Mexico, and California in exchange for $15 million
109420885Wilmot Proviso-prohibited slavery in any territory acquired from Mexico -passed in the House but failed in the Senate
109420886"popular sovereignty"-plan suggested to solve the sectional divisions (slavery vs. no slavery) -would allow the people of each territory to decide the status of slavery there
109420887Free-Soil Party-emerged from the different parties because was insatisfied with the slavery views -they were opponents (supporters) of slavery -their candidate for president in elections after Polk was Martin Van Buren (but he lost to Taylor)
109420888Compromise of 1850-California admitted to Union as free state. -Popular sovereignty to determine slavery issue in Utah and New Mexico territories. -Texas border dispute with New Mexico resolved. -Texas recieves $10 million. -Slave trade, but not slavery itself, abolished in the District of Columbia. -Strong federal enforcement of new Fugitive Slave Act.
109420889Ostend Manifestoa declaration (1854) issued from Ostend, Belgium, by the U.S. ministers to England, France, and Spain, stating that the U.S. would be justified in seizing Cuba if Spain did not sell it to the U.S. -released to the public and angered many

AP US History: American Pageant Chapter 1 Flashcards

First will be terms and then Cause and Effect. I will update, and make sure I add as much information as possible about each chapter. :) This also helps me study, so I hope it helps all of you too.

Terms : Hide Images
452322397Corn or MaizeStaple crop that formed the economic foundation of Indian civilizations.
452322398PortugalFirst European nation to send explorers around the west coast of Africa.
452322399HorseAnimal introduced by Europeans that changed Indian way of life on the Great Plains
452322400Treaty of TordesillasTreaty that secured Spanish title to lands in Americas by dividing them with Portugal.
452322401MestizosPerson of mixed European and Indian ancestry.
452322402St. AugustineFounded in 1565, it's the oldest continually inhabited European settlement in US territory
452322403Black LegendBelief that the Spanish only killed, tortured, and stole in the Americas while doing nothing good
452322404Roanoke Island, NCColony founded by Sir Walter Raleigh that mysteriously disappeared in the 1580's.
452322405Joint-stockForerunner of the modern corporation that enabled investors to pool financial capital for colonial ventures.
452322406CharterRoyal document granting a specified group the right to form a colony and guaranteeing settlers their rights as English citizens.
452322407Indentured ServantsPenniless people obligated to forced labor for a fixed number of years, often in exchange for passage to the New World.
452322408Act of TolerationMaryland statute of 1649 that granted religious freedom to all Christians, but not Jews and atheists.
452322409SquattersPoor farmers in North Carolina and elsewhere who occupied land and raised crops without gaining legal title to the soil
452322410House of BurgessesFirst representative government in New World.
452322411Ferdinand and IsabellaFinanciers and beneficiaries of Columbus's voyages of discovery.
452322412CortesConqueror of the Aztecs.
452322413PizarroConqueror of the Incas.
452322414Dias and DaGamaPortuguese navigators who led early voyages of discovery.
452322415ColumbusItalian-born explorer who believed he arrived off the coast of Asia rather than on an unknown continent.
452322416MontezumaPowerful Aztec monarch who fell to Spanish conquerors
452322417Elizabeth IUnmarried English ruler who led England to national glory.
452322418HiawathaLegendary founder of the powerful Iroquois Confederation
452322419John CabotItalian-born explorer sent by the English to explore the coast of North America in 1498
452322420GeorgiaFounded as a refuge for debtors by philanthropists.
452322421North CarolinaColony that was called "a vale of humility between two mountains of conceit".
452322422Smith and Rolfeleaders who rescued Jamestown from the "starving time".
452322423MarylandFounded as a haven for Roman Catholics.
452322424Lord BaltimoreCatholic aristocrat who sought to build a sanctuary for his fellow believers.
452322425South CarolinaColony that turned to disease-resistant African-American slaves for labor in its extensive rice plantations.
452322426Raleigh and GilbertElizabethan courtiers who failed in their attempts to found New World colonies.
452322427JamestownRiverbank site where Virginia Company settlers planted the first permanent English colony.
452322428Cause: The Great Ice AgeEffect: Exposure of a "land bridge" between Asia and North America.
452322429Cause: Cultivation of Maize (corn)Effect: Formation of large, sophisticated civilizations in Mexico and South America
452322430Cause: New sailing technology and desire for spicesEffect: European voyages around Africa and across the Atlantic attempting to reach Asia.
452322431Cause: Portugal's creation of sugar plantations on Atlantic coastal islandsEffect: Rapid expansion of the African slave trade
452322432Cause: Columbus's first encounter with the New WorldEffect: A global exchange of animals, plants, and diseases.
452322433Cause: Native Americans' lack of immunity to various diseasesEffect: Decline of 90% in the New World Indian population
452322434Cause: Spanish conquest of larger quantities of New World gold and silverEffect: Rapid expansion of global economic commerce and manufacturing.
452322435Cause: Aztec legends of a returning god, QuetzalcoatlEffect: Cortes' relatively easy conquest of the Aztecs.
452322436Cause: Spanish need to protect Mexico against French and English encroachmentEffect: Establishment of Spanish settlements in Florida and New Mexico
452322437Cause: Franciscan friars' desire to convert Pacific coast Indians to CatholicismEffect: Formation of a chain of mission settlements in California.
452322438Cause: The English victory over the Spanish ArmadaEffect: Enabled England to gain control of the North Atlantic sea-lanes.
452322439Cause: The English law of primogenitureEffect: Led many younger sons of the gentry to seek their fortunes in exploration and colonization.
452322440Cause: The enclosing of English pastures and crop landEffect: Forced numerous laborers off the land and sent them looking for opportunities elsewhere.
452322441Cause: Lord DeLa Warr's use of brutal "Irish tactics" in VirginiaEffect: led to the two Anglo-Powhatan wars that virtually exterminated Virginia's Indian population.
452322442Cause: The English government's persecution of Roman CatholicsEffect: Led Lord Baltimore to establish Maryland.
452322443Cause: The slave codes of England's Barbados colonyEffect: Became the legal basis for slavery in North America.
452322444Cause: The introduction of tobaccoEffect: created the economic foundation for most of England's southern colonies.
452322445Cause: The flight of poor farmers and religious dissenters from planter run VirginiaEffect: Led to the founding of independent minded North Carolina.
452322446Cause: John Smith's stern leadership in VirginiaEffect: Whipped gold-hungry, nonworking colonists into line.
452322447Cause: Gorgia's unhealthy climate, restrictions on slavery, and vulnerability to Spanish attacksEffect: Kept the buffer colony poor and largely unpopulated for a long time.

CISA Revision Flashcards

Terms : Hide Images
295024972Audit CharterThe audit charter should state management's objectives for and delegation of authority to IS audit. Should be approved at the highest levels of management, and should outline the overall authority scope, and responsibilities of the audit function. Should not significantly change over time.
295024973IT Balanced ScorecardAn IT business governance tool aimed at monitoring IT performance evaluation indicators OTHER THAN financial results. It considers other key success factors such as customer satisfaction, innovation capacity, and processing.
295024974Stop or Freezing Point during New System DesignRequires that changes made after that point be evaluated for cost-effectiveness. Used to allow for a review of the cost-benefits and the payback period.
295024975Clustered Server SetupMakes the entire network vulnerable to natural disasters or other disruptive events. Not recommended for high-availability network configurations.
295024976Logical Access ControlsThe PRIMARY safeguard for securing software and data within an information processing facility.
295024977The most important criterion when selecting a location for an offsite storage facility for IS backup files.The offsite facility must be PHYSICALLY SEPARATED from the data center and not subject to the same risks as the primary data center.
295024978Attribute SamplingThe primary sampling method used for compliance testing. AS is used to estimate the rate of occurance of a specific quality (attribute) AND is used in compliance testing to confirm whether the quality exists.
295024979Monitoring an outsourced provider's performance.The MOST important function to be performed by IS management when a service has been outsourced. This is critical to ensure that services are delivered to the company as required.
295024980Parallel RunThe system and data conversion strategy that provides the GREATEST redundancy. The safest and the most expensive approach.
295024981Adequate and most appropriate compensating control to track after-hours database changes.Use the DBA user account to make changes. Log the changes and review the change log the following day.
295024982Intrusion Detection System (IDS)Gathers evidence on intrusive attack or penetration attempt activity.
295024983Business Continuity Plan (BCP) covers only critical processes. The IT auditor should:Revisit and/or update the Business Impact Analysis (BIA) to assess the risk of not covering all processes in the plan.
295024984Audit Planning : Assessment of RiskShould be made to provide REASONABLE ASSURANCE that the audit will cover MATERIAL items.
295024985Training provided on a regular basis to all current and new employees.The MOST LIKELY element of a security awareness program.
295024986Function Point AnalysisAn indirect method of measuring the size of an application by considering the number and complexity of its inputs, outputs, and files. Is useful for evaluating complex applications.
295024987PERT (Program evaluation review technique)A project management technique that helps with both planning and control.
295024988SLOC (Counting source lines of code)A direct measure of program size. Does NOT allow for the complexity that may be caused by having multiple, linked modules and a variety of inputs and outputs.
295024989White Box TestingInvolves a detailed review of the behavior of program code, and is a quality assurance technique suited to simpler applications during the design and build stage of development.
295024990Security patch installationsShould always be part of a good change management process.
295024991Degaussing obsolete magnetic tapesThe best way to remove data from magnetic tapes. Leaves a very low residue of magnetic induction. Overwriting or erasing tapes may cause magnetic errors but may not remove the data completely. Tape label initialization does not remove the data that follows the label.
295024992The MOST important concern when auditing backup, recovery, and the offsite storage vaultThat the data files stored in the vault are synchronized.
295024993When evaluating the collective effort of preventive, detective, or corrective controls within a process, an IS auditor should be aware of:The point at which controls are EXERCISED as data flow through the system.
295024994The BEST audit technique to use to determine whether there have been unauthorized program changes since the last authorized program updateAutomated code comparision: automated, efficient technique to determine whether the two versions correspond. Test data runs only allow for processing verification. Code review will only detect potential errors or inefficient statements.
295024995IT Control ObjectivesThe statement of the desired result or purpose to be achieved by implementing control procedures in a particular IT activity.
295024996The PRIMARY purpose for conducting parallel testing is:To ensure that the implementation of a new system will meet user requirements.
295024997An analysis of peaking/saturated WAN links should result in:Analysis to establish whether this is a regular pattern and what causes this behavior before expenditure on a larger line capacity is recomended.
295024998ImmunizersDefends against viruses by appending sections of themselves to files. They continuously check the file for changes and report changes as possible viral behavior.
295024999Behavior blockersFocus on detecting potentially abnormal behavior, such as writing to the boot sector or MBR, or making changes to EXEs.
295025000CRCs (Cyclical Redundancy Checkers)Compute a binary number on a known virus-free program that is then stored in a database file. When that program is subsequently called to be executed, the checkers look for changes to the files, compare them to the database, and report possible infection if changes have occurred.
295025001Active MonitorsInterpret DOS and ROM BIOS calls, looking for virus-like actions.
295025002The DR/Continuity Plan component that provides the GREATEST assurance of post-disaster recovery:That an alternate facility will be available until the original information processing facility is restored.
295025003Email systems have become a useful source of litigation evidence BECAUSE:Multiple cycles of backup files remain available, and documents that have been deleted could potentially be recovered from these files.
295025004By evaluating application development projects against the Capability Maturity Model (CMM), an IS auditor should be able to verify that:Stable, predictable software processes are being followed. However, CMM does NOT guarantee a reliable product, nor does it evaluate technical processes, security requirements, or other application controls.
295025005The MOST IMPORTANT element for the successful implementation of IT governance is:The identification of organizational strategies. This is necessary to ensure the alignment between IT and corporate governance. The KEY objective of IT governance is to support the business.
295025006Stress testingIs carried out to ensure that a system can cope with production workloads. A test environment should always be used to avoid damaging the production environment - testing should never take place in a production enviroment. Live workloads should always be used, however, to ensure that the system was stress tested adequately.
295025007Periodic checking of hard drives.The MOST effective way to detect and identify the loading of illegal software packages onto a network.
295025008Which control best mitigates the risk of undetected and unauthorized program changes being made in the production environment by developers?Hash key generation. The matching of hash keys over time would allow detection of changes to files.
295025009Naming conventions for system resources are important for access control because they:Reduce the number of rules required to adequately protect resources. This facilitates security administration and maintenance efforts, and allows for the grouping of resources and files by application.
295025010When faced with multiple minor control weaknesses, the IS auditor's audit report should:Record the observations and the risk arising from the COLLECTIVE effect of the weaknesses.
295025011It IS appropriate for an IT auditor to request and review a copy of a BCP from each vendor that provides outsourced services.TRUE: An IS auditor will evaluate the adequacy of the service bureau's BCP and assist their company in implementing a complementary plan. The primary responsibility of an IS auditor is to assure that the company assets are being safeguarded, even if the assets do not reside on the immediate premises.
295025012The PRIMARY concern with using RFID (radio frequency identification) is:Issues of privacy. The purchaser (P) may not be aware of the tags, and credit card purchases may be able to be tied back to the identity of P. Because RFID can carry unique identifers, it could be possible for a firm to track Ps who purchase items containing RFIDs.
295025013A proprietary software application purchase contract SHOULD provide for:A source code agreement that provides for the placement of the source code into escrow, ensuring that the purchaser will have the opportunity to modify the software should the vendor cease to be in business.
295025014When faced with control weaknesses, the IS auditor should stress that:A comprehensive system control framework is necessary. Ex. effective access controls may not sufficiently compensate for other detective control weaknesses. The IS auditor has a FUNDAMENTAL obligation to point out control weaknesses that give rise to unacceptable risks to the organization, and work with management to have these corrected.
295025015Simultaneous duplication of logs onto a write-once disk, helps to:Detect changes made by unauthorized intruders to systems/platforms.
295025016Application-level GatewayProvides the BEST protection against hacking attempts. It can define with detail rules that describe the type of user or connection that is or is not permitted. Analyzes ALL layers of the OSI. Remote Access servers require a user name/password, but can still be mapped or scanned. Proxy servers provide protection based on an IP adresses and ports, and can be complex or difficult to configure for multiple applications. Port scanning doesn't help with controlling Internet content, or when all ports need to be controlled.
295025017Which is the MOST effective and environmentally friendly method of supressing a fire in a data center?Dry-pipe water sprinkers, with an automatic power shut-off system. The pipes must be dry-pipe so as to avoid leakage. Halon is efficient and doesn't threaten human life, but it is environmentally damaging and very expensive. Carbon Dioxide threatens human life (but is safe for the environment), and therefore cannot be set to automatic release.
295025018Which finding would be MOST critical during an audit of a BCP?Absence of a backup for the network backbone. This failure will impact the ability of all users to access information on the network.
295025019The SUCCESS of control self-assessment (CSA) depends highly on:Having line managers assume a portion of the responsibility for control monitoring. The primary objective of a CSA program is to leverage the internal audit function by shifting some of the control monitoring responsibilities to the functional area line managers.
2950250201. Non-existent 2. Initial 3. Repeatable 4. Defined 5. Managed 6.OptimizedThese are rankings used by the Information Security Governance Maturity Model. When responsibilites for IT security are clearly assigned and enforced, and an IT Security Risk and Impact Analysis is consistently performed, it is said to be managed and measurable.
295025021Which type of testing would confirm that a new or modified system can operate in its target environment without adversely impacting EXISTING systems?SOCIABILITY testing. PARALLEL testing is the process of feeding data into 2 systems and comparing the results. PILOT testing takes place first at one location and then is extended to other locations. INTERFACE/INTEGRATION testing is a HW or SW test that evaluates the connection of 2 or more components that pass info from one area to another.
295025022Documentation of a business case used in an IT development project should be retained until:The end of the system's life cycle.
295025023Which type of firewall provides the GREATEST degree and granularity of control?The APPLICATION GATEWAY firewall - it has specific proxies for each TCP/IP service, and filters traffic across OSI L3-L7. A Screening Router and a Packet Filter works at the protocol, service and/or port level (L3-L4). A Circuit Gateway is based on a proxy or program that acts as an intermediary between external and internal accesses (L3/L4).
295025024To ensure message integrity, confidentiality, and nonrepudiation between 2 parties, the MOST effective method would be to create a message digest by applying a cryptographic hashing algorithm against:The ENTIRE message, enciphering the MESSAGE DIGEST using the SENDER'S PRIVATE KEY (nonrepudiation), enciphering the MESSAGE with a SYMMETRIC KEY, and enciphering the KEY by using the RECEIVER'S PUBLIC KEY (confidentiality and receiver nonrepudiation).
295025025What is the initial step in creating a firewall policy?Identification of network applications to be externally accessed.
295025026In a BCP, the MAJOR risk with not defining the point at which a situation could be declared a crisis is:That execution of the DRP/BCP could be impacted.
295025027A top-down approach to the development of operational policies will help ensure:That they are consistent across the organization. A bottom-up approach would be derived as a result of risk assessment.
295025028Which approach will BEST ensure the successful offshore development of business applications?Detailed and correctly applied specifications.
295025029The FIRST step in managing the risk of a cyberattack is to:Identify critical information assets. After this, the next steps include identifying the threats and vulnerabilities, and calculating potential damages.
295025030Which component of network architecture acts as a decoy to detect active Internet attacks?HONEYPOTS - these are computer systems that are expressly set up to attract and trap individuals who attempt to penetrate others individuals' computer systems. They can provide data on methods used to attack systems. FIREWALLS are basically preventative measures. TRAPDOORS create a vulnerability that provides an opportunity for the insertion of unauthorized code into a system. TRAFFIC ANALYSIS is a type of passive attack.
295025031NEURAL networks are effective in detecting FRAUD because they can:Attack problems that require consideration of a large number of input variables. They can capture relationships and patterns, BUT NOT new trends. Neural networks will not work well at solving problems for which sufficiently large and general sets of training data are not obtainable.
295025032Which computers would be of the MOST concern to an IS auditor reviewing a VPN implementation?The at-home computers of employees who connect via VPN. These are least subject to corporate security policies, and are, therefore, high-risk.
295025033When developing a risk-based audit strategy, an IS auditor should conduct a risk assessment to ENSURE that:Vulnerabilities and threats are indentified. This will determine the areas to be audited and the extent of coverage.
295025034AFTER a review applications (assets) and making a vulnerability assessment, the next task(s) would be to:(1) Identify threats, and (2) estimate the liklihood of a threat's occurrence.
295025035Which of the following backup techniques is the MOST appropriate where an organization requires extremely granular data restore points, as defined by the recovery point objective (RPO)?Continuous data backup - this process happens online, and in real-time.
295025036An organization is using an enterprise resource management (ERP) application. Which type of controls would be the MOST effective?Role-based access controls (RBAC). RBAC controls the system access by defining roles for a group of users. Users are assigned to the various roles and the access is granted based on the user's role. User-level permissions would create larger administrative overhead. Fine-grained access control is difficult to implement and maintain in large enterprises. Discretionary access control may create inconsistencies in the access control management.
295025037When reviewing an implementation of a VoIP system over a corporate WAN, an IS auditor should expect to find:Traffic engineering. This is a statistical technique that helps to ensure that quality of service requirements are achieved by minimizing packet loss, latency, and/or jitter.
295025038An IS auditor doing penetration testing during an audit of Internet connections would:Use tools and techniques available to a hacker.
295025039The GREATEST advantage of using web services for the exchange of information between two systems is:Efficient interfacing. Web services facilitate the exchange of information between two systems regardless of the OS or progamming language used. Communication, however, will not necessarily securer or faster, and there is no documentation benefit in using web services.
295025040What reduces the potential impact of social engineering attacks?Security awareness programs.
295025041Which of the following should an IS auditor review to gain an understanding of the effectiveness of controls over the management of multiple projects?A project portfolio database. This is the basis for project portfolio management, and includes detailed project data. Project portfolio management requires specific project portfolio reports.
295025042Which of the following online auditing techniques is MOST effective for the early detection of errors or irregularities?AUDIT HOOKS. The audit hook technique involves embedding code in application systems for the examination of selected transactions. This helps the IS auditor to act before an error or an irregularity gets out of hand. An EMBEDDED AUDIT MODULE involves embedding specially-written software in the organization's host application system so that application systems are monitored on a selective basis. An INTEGRATED TEST FACILITY is used when it is not practical to use test data. SNAPSHOTS are used when an audit trail is required.
295025043If coding standards are not enforced and code reviews are rarely carried out, this will MOST increase the likelihood of a successful:BUFFER OVERFLOW ATTACK (especially in web-based applications). BRUTE FORCE attacks are used to crack passwords. DDOS attacks are used to flood and overwhelm its targets, preventing them from responding to legitimate requests. WAR DIALING uses modem-scanning tools to hack PBXs.
295025044A BENEFIT of open system architecture is that it:Facilitates operability between systems made by different vendors. Closed system components are, in contrast, built to proprietary standards and cannot (or will not) interface with existing systems.
295025045Web and email filtering tools are PRIMARILY valuable to an organization because they:Protect the organization from viruses, spam, mail chains, recreational surfing and email, and other nonbusiness materials.
295025046The PRIMARY objective of service-level management (SLM) is to:Define, negotiate, agree, document and record, and manage the required levels of service in the manner in which the customer requires those services. This doesn't necessarily ensure high availability, or that costs will be minimized.
295025047An IS auditor performing a telecommunications access control review should be concerned PRIMARILY with the:Preventative control of authorization and authentication of a user prior to granting access to system resources. Weak controls at this level can affect all other aspects of the system.
295025048Which IT governance best practice IMPROVES strategic alignment?Top management mediating between the imperatives of business and technology. Managing supplier and partner risks is a RISK MANAGEMENT best practice. A knowledge base on customers, products, markets and processes is an IT VALUE DELIVERY best practice. An infrastructure being provided to facilitate the creation and sharing of business information is an IT VALUE DELIVERY and a RISK MANAGEMENT best practice.
295025049At the completion of a system development project, a postproject review SHOULD include:Identifying LESSONS LEARNED that may be applicable to future projects.
295025050If no project risks have been identified during the early stages of a development project, the IS auditor SHOULD:Stress the importance of spending time at THIS point in the project to consider and document risks, and to develop contingency plans. The IS auditor has an obligation to the project sponsor and the organization to advise on appropriate project management practices.
295025051An IS auditor reviewing an organization's data file control procedures finds that transactions are applied to the most current data files, while restart procedures use earlier versions. The IS auditor should recommend the implementation of:VERSION USAGE CONTROL when it is essential that the proper version of a file is used.
295025052If an IS auditor finds that the risk of data being intercepted to and from remote sites is very high, the MOST effective and secure control that he can recommend to reduce this exposure is:ENCRYPTION
295025053If an IS auditor finds that conference rooms have active network ports, it is MOST important to ensure that:That part of the network is ISOLATED from the corporate network.
295025054Which represents the GREATEST risk created by a reciprocal agreement for disaster recovery between two companies?That future developments may result in hardware and software incompatibility.
295025055An Internet-based attack using password sniffing CAN:Be used to gain access to systems containing proprietary information. SPOOFING attacks can be used to enable one party to act as if they are by another party. DATA MODIFICATION attacks can be used to modify the contents of certain transactions. REPUDIATION OF TRANSACTIONS can cause major problems with billing systems and transaction processing agreements.
295025056What type of controls would an IS auditor look for in an environment where duties cannot be appropriately segregated?COMPENSATING controls are internal controls that are intended to reduce the risk of an existing or potential control weakness that may arise when duties cannot be appropriately segregated. OVERLAPPING controls are two controls addressing the same control objective or exposure. BOUNDARY controls establish the interface between the would-be user of a computer system and the computer system itself, and are individual-based
295025057Which of the following is a concern when data are transmitted through Secure Socket Layer (SSL) encryption, implemented on a trading partner's server?That the organization doesn't have control over encryption. The SSL security protocol provides data encryption, server authentication, message integrity, and optional client authentication. Simply installing a digital certificate turns on SSL capabilities, and SSL encrypts the datum whicle it is being transmitted over the Internet - there is no PW to remember b/c the encryption is done in the background.
295025058Where a business system accesses a corporate database using a single ID and PW embedded in a program, what would provide efficient access control over the organization's data?The best compensating control would be role-based permissions within the application system to ensure that access to data is granted based on a user's role. The issue is with permissions, not authentication.
295025059What would have the HIGHEST priority in a business continuity plan (BCP)?The resumption of critical processes has the highest priority since it enables business processes to begin immediately after the interruption and not later than the declared mean time between failure (MTBF).
295025060A company has decided to implement an electronic signature scheme based on PKI. The user's private key will be stored on the computer's HDD and protected by a PW. The MOST significant risk of this approach is:That a compromise of the PW would enable access to the signature, which could result in the impersonation of the user by substitution of the user's public key with another person's public key.
295025061If an IS auditor notes that an organization has adequate BCPs for each individual process, but not a comprehensive BCP for the entire organization, the IS auditor should:Determine whether the BCPs are consistent with one another in order to provide a viable BCP strategy.
295025062To protect a VoIP infrastructure against a DoS attack, it is MOST important to secure the:SESSION BORDER CONTROLLERS. SBCs enhance the security in the access network (AN) and in the core. In the AN, they hide a user's real addressand provide a managed public address. SBCs permit access to clients behind FWs while maintaining the FW's effectiveness. In the core, SBCs protect the users and the network.They hide network topology and user's real addresses. They can also monitor bandwidth and QoS.
295025063A web server is attacked and compromised. What should be performed FIRST to handle the incident?Disconnect the web server from the network to contain the damage and prevent more actions by the attacker.
295025064When developing a BCP, which tools shoud be used to gain an understanding of the organization's business processes?RISK ASSESSMENT (RA) and BUSINESS IMPACT ASSESSMENT (BIA) are tools for understanding business-for-business continuity planning. BUSINESS CONTINUITY SELF-AUDIT is a tool for evaluating the adequacy of a BCP. RESOURCE RECOVERY ANALYSIS is a tool for identifying a business resumption strategy. GAP ANALYSIS can be used to identify deficiencies in a BCP plan.
295025065What would be a considered a weakness, with regard to an organzation that uses PKI with digital certificates?If the organization is also the owner of the certificate authority (CA), this could potentially create a perceived conflict of interest if customers wanted to allege fraud during a transaction repudiation.
295025066The PRIMARY role of the certificate authority (CA) as a third party is to:Confirm the identity of an entity owning a certificate issued by that CA. The primary activity of a CA is to issue certificates. The CA can contribute to authenticating communicating partners, but is not involved in the communication stream itself.
295025067An IS auditor reviewing wireless network security determines that DHCP is disabled at all WAPs. This practice:Reduces the risk of unauthorized access to the network.
295025068The PRIMARY objective of testing a BCP is to:Identify and provide evidence of any limitations of the current BCP.
295025069What method might an IS auditor use to test wireless security at branch office locations?WAR DRIVING - this is a technique for locating and gaining access to wireless networks by driving or walking with a wireless equipped computer around a building. WAR DIALING is a technique for gaining access to a computer or network through the dialing of defined blocks of telephone numbers, with the hope of getting an answer from a modem. SOCIAL ENGINEERING is a techniqueused to gather info that can assist an attacker in gaining logical or physical access to data or resources. PASSWORD CRACKERS are tools used to guess users' PWs by trying combinations and dictionary words.
295025070Confidentiality of data transmitted in a WLAN is BEST protected if the session is:Encrypted using DYNAMIC KEYS. With dynamic keys, the encryption key is changed frequently, thus reducing the risk of key compromise and unauthorized message decryption.
295025071DDoS attacks on Internet sites are typically evoked by hackers by using:TROJAN HORSES - these are malicious or damaging code hidden within an authorized computer program. Hackers use Trojans to mastermind DDoS attacks from multiple ccomputers simultaneously. LOGIC BOMBS are programs designed to destroy or modify data at a specific time in the future. PHISHING is an attack, normally via email, pretending to be an authorized person or organization requesting information. SPYWARE is a program that picks up information from PC drives by making copies of their contents.
295025072Which anti-spam filtering technique would BEST prevent a valid, variable-length email message containing a heavily-weighted spam keyword from being labeled as spam?BAYESIAN (STATISTICAL) FILTERING - BF applies statistical modeling to messages by performing a frequency analysis on each word within the message and then evaluating the message as a whole. It can ignore a suspicious keyword if the entire message is within normal bounds. HEURISTIC FILTERING is less effective since new exception rules may need to be defined when a valid message is labeled as spam. SIGNATURE-BASED FILTERING is useless against variable-length messages because the calculated MD5 hash changes all the time. PATTERN MATCHING is actually a degraded rule-based technique where the rules operate at the word level using wildcards, and not at higher levels.
295025073When determining the ACCEPTABLE time period for the RESUMPTION of critical business processes:BOTH downtime AND recovery costs need to be evaluated. The outcome of a BIA should be a recovery strategy that represents the optimal balance,
295025074Where a mix of access points cannot be upgraded to stronger or more advanced wireless security, a recommendation to replace the access points is BEST justified by the argument that:The organization's security would only be as strong as its weakest points. Affordability, performance, and product manageability is NOT the IS auditor's concern in this situation.
295025075From a control perspective, the PRIMARY objective of classifying information assets is to:Establish guidelines for the level of access controls that should be assigned. Information has varying degrees of sensitivity and criticality in meeting business objectives. By assigning classes or levels of sensitivity and criticality to information resources, management can establish guidelines for the level of access controls that should be assigned. End user management and the security administrator will use these classifications in their risk assessment (RA) process to assign a given class to each asset.
295025076Which biometric has the HIGHEST RELIABILITY and the LOWEST FALSE-ACCEPTANCE RATE (FAR)?RETINA SCAN. Retina scan uses optical technology to map the capillary pattern of an eye's retina. This is highly reliable and has the lowest FAR among the current biometric methods. PALM SCANNING entails placing a hand on a scanner where the palm's physical characteristics are captured. HAND GEOMETRY measures the physical characteristics of the user's hands and fingers from a 3-D perspective. Both the palm and hand biometric techniques lack uniqueness in the geometry data. With FACE RECOGNITION, a reader analyzes the images captured for general facial characteristics. Though natural and friendly, face biometrics lack uniqueness which means that people who look alike can fool the device.

CISA Flashcards

Terms : Hide Images
453049877administrative controladminisztratív irányítás
453049878audit evidencekönyvvizsgálati bizonyítékot
453049879audit objectiveellenőrzés célja
453049880audit riskellenőrzési kockázat
453049881comparison programösszehasonlítása programot
453049882compensating controlösszehasonlító program
453049883compliance testingmegfelelőségi vizsgálat
453049884comprehensive unitteljes körű egység
453049885continuous auditing approachfolyamatos ellenőrzési megközelítés
453049886control riskellenőrzési kockázat
453049887corrective controljavító ellenőrzés
453049888detection riskészlelési kockázat
453049889detective controlnyomozó ellenőrzés
453049890discovery samplingfelfedezés mintavétel?
453049891forensic audittörvényszéki audit
453049892inherent riskeredendő kockázat
453049893test facilitiesvizsgáló intézmények
453049894judgmental samplingbecslési mintavétel
453049895reasonable assuranceésszerű bizonyosságot
453049896substantive testingtételes vizsgálata

The Enduring Vision Chap. 9 Flashcards

The enduring vision Chapter 9 terms and names

Terms : Hide Images
496754453Old Northwest/Old SouthwestArea between the Appalachians and the Mississippi River. By 1840 one-third of the non-Indian population of just over 17 million were living here.
496754454Four statesVermont, Kentucky, Tennessee, and Ohio
496754455Six statesIndiana, Mississippi, Illinois, Alabama, Maine, and Missouri.
496754456VermontvilleTown establised
496754457ButternutsThe name of the emigrants from Upland south to the Old northwest, because of the color of their homespun clothing.
496754458Five Civilized Tribescollective name for the Creeks, Choctaws, Cherokees, Chickasaws and Seminoles
496754459Cherokee PhoenixThe first Native American Newspaper, founded in Echota, GA in 1828. -bilingual -existed for 6 years.
496754460Indian Removal ActPassed in 1830, authorized Andrew Jackson to negotiate land-exchange treaties with tribes living east of the Mississippi. The treaties enacted under this act's provisions paved the way for the reluctant—and often forcible—emigration of tens of thousands of American Indians to the West.
496754461Trail of TearsThe tragic journey of the cherokee people from their home land to indian territory between 1838 and 1839, thousands of cherokees died.
496754462Market Economyan economy that relies chiefly on market forces to allocate goods and resources and to determine prices
496754463squatterspeople who settle on another's land without title or right
496754464Panic of 1819Bank tightened loan policies, depression rose throughout the country, hurt western farmers greatly
496754465Transportation Revolutiona period of rapid growth in the speed and convenience of travel because of new methods of transportation
496754466Gibbons v. Odgen1824 Supreme Court ruling in which they upheld the power of the federal government to regulate trade between states
496754467Erie Canalartificial waterway opened in 1825 linking Lake Erie to the Hudson River
496754468Eli WhitneyUnited States inventor of the mechanical cotton gin (1765-1825)
496754469Watlham and Loxwell textile millsA mill in Rhode Island
496754470Outworksome aspects of industrial work which are done inside individual homes (Cotton industry)
496754471Richard Allenan african american preacher who helped start the free african society and the african methodist episcopal church
496754472African Methodist Episcopal ChurchUnited States church that is in communication with the see of Canterbury, the first black run Protestant Denomination.
496754473Catharine BeecherEncouraged other women to work as nurses, school teachers, and maids
496754474Seperate SpheresNineteenth-century idea in Western societies that men and women, especially of the middle class, should have different roles in society
496754475Horizontal AllegiancesAllegiances that linked those in a similar position, not the subordinates with the authority figure.
496754476Vertical AllegiancesWhere authority flows from the top down. Subordinates identify their interests with those of their superiors rather than with others in the same subordinate role.
496754477Voluntary Associationsa group of individuals who voluntarily enter into an agreement to form a body to accomplish a purpose
496754478Alexis de TocquevilleFrench political writer noted for his analysis of American institutions (1805-1859)

Pages

Subscribe to CourseNotes RSS

Need Help?

We hope your visit has been a productive one. If you're having any problems, or would like to give some feedback, we'd love to hear from you.

For general help, questions, and suggestions, try our dedicated support forums.

If you need to contact the Course-Notes.Org web experience team, please use our contact form.

Need Notes?

While we strive to provide the most comprehensive notes for as many high school textbooks as possible, there are certainly going to be some that we miss. Drop us a note and let us know which textbooks you need. Be sure to include which edition of the textbook you are using! If we see enough demand, we'll do whatever we can to get those notes up on the site for you!