免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 3435 | 回复: 8
打印 上一主题 下一主题

140元拥有会员资格和Knet密码 [复制链接]

论坛徽章:
0
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2003-03-27 13:24 |只看该作者 |倒序浏览
为降低考试成本,特向考友低价转让正版的官方资料。\r\n\r\n\r\n1、出售CISA的官方模拟题600道(全是以前年度的考题,也就是500道加100道补充复习资料的合集,电子版),价格120元\r\n\r\n2、出售Knet的登陆密码(只有CISA会员才知道密码),价格140元。我花了150美元才换回一年的会员资格。拥有密码,将享受与ISACA会员相同的服务,包括察看以前年度的journals(电子版),和配套的习题。\r\n\r\n有意了解Knet者,请到http://www.isaca.org/下察看\r\n为安全起见,我只挑选2人转让会员密码(因为现在还不清楚泄漏密码的后果如何,所以接受我密码的考友,必须签署书面的责任书,与我共同承担责任)!\r\n\r\n交易快捷,在我确认收款后,10分钟内就可拿到资料!\r\n\r\n私下转让,请勿在此续贴。\r\n\r\n若有意,请询问astrpm@yahoo.com.cn\r\n\r\n\r\n\r\n\r\n另有CRM,上面有我的复习笔记,以及翻译,如有兴趣我可代为复印,价格:全部复印费用(440页)+50元分摊购书款+邮资。\r\n\r\n若需要,可能要多等几天,因为我是业余售书的,没有存货。
hsbd 该用户已被删除
2 [报告]
发表于 2003-03-27 16:40 |只看该作者
提示: 作者被禁止或删除 内容自动屏蔽

论坛徽章:
0
3 [报告]
发表于 2003-03-27 18:47 |只看该作者

我是一个学生,确实很穷

其实大家从我报的低价就可发现,我并不是想靠卖书赚钱。\r\n\r\n只是希望没有资料的考友同我一起分担高昂的考试费用(我要买书早在年前就买了)。\r\n\r\n因为找工作和报考CISA,借了不少钱,我需要在毕业之前还给同学,只好通过各种途径筹款。\r\n\r\n而且,我需要花500块钱到CISA-EXAM.COM购买Micromash的题目,如果有考友有兴趣,我愿同他一起购书。最好是由考友低价转给我。\r\n\r\n我并不是自私自利的人,我承偌在6月底(考试结束后),把手头上的电子版的资料全部上传。\r\n\r\n而且,各位其实可以在最近的帖子中发现我解答过许多问题。\r\n\r\n即使不买书,我也欢迎各位考友与我交流

论坛徽章:
0
4 [报告]
发表于 2003-03-27 18:52 |只看该作者
学生的话可以获取学生的会员资格\r\n只需要60USD

论坛徽章:
0
5 [报告]
发表于 2003-03-27 18:54 |只看该作者
希望你的投资有所回报

论坛徽章:
0
6 [报告]
发表于 2003-03-27 18:57 |只看该作者

学生的会员资格确实很便宜

正如你所说,但我花了150美元,你找到为什么吗?\r\n\r\n因为必须是美国学生。\r\n\r\n而且还有提供正式的全日制学生证明,很麻烦,我就多花了这么多钱!

论坛徽章:
0
7 [报告]
发表于 2003-03-27 19:15 |只看该作者

也许大家看到买书的广告很烦,但如果是isaca的测试题呢?

CE Quiz # 87 \r\n节选自Information Systems Control Journal Volume 6, 2002 (双月刊)\r\n我手头还有2003年第1期的杂志和Quiz#88,有时间再贴上来。\r\n\r\n顺便再做一下广告,有Knet密码,可以看到 1995第5期到 2002 年第6期的测试题(如果需要今年的,我可以代为录入)。\r\n\r\n\r\n\r\n\r\nCE Quiz # 87 \r\nBased on Information Systems Control Journal Volume 6, 2002 \r\nA passing score of 75 percent qualifies for one (1) hour of CISA continuing education credit.\r\nThis quiz requires a JavaScript-enabled browser.\r\nYour results will appear in a new window.\r\n\r\nSarup Article\r\n1. Reasons cited by the author for failure of transformation change efforts include overcommunicating to the troops and ineffective leadership in driving change.\r\nTrue  False \r\n\r\n2. Control principles important in a governance framework for a change program include a project plan and charter, a tracking mechanism for monitoring the progress against plan, and a process to solicit feedback and address changes, among others.\r\nTrue  False \r\n\r\n3. Information technology generally is not germane to a transformational change effort.\r\nTrue  False \r\n\r\nGuldentops and De Haes Article\r\n4. COBIT is more likely to be used by smaller enterprises than larger ones, according to a survey conducted by ISACA and the IT Governance Institute.™\r\nTrue  False \r\n\r\n5. After COBIT, the most popular control methodologies in use among survey participants include COSO and ISO 9000.\r\nTrue  False \r\n\r\nGuldentops, Van Grembergen and De Haes Article\r\n6. Among industries, organizations responding to the ISACA and IT Governance Institute survey cited by the authors that had the most mature controls and governance program were in the retail and financial services industries.\r\nTrue  False \r\n\r\n7. Among geographies, organizations responding to the ISACA and IT Governance Institute survey cited by the authors that had the most mature controls and governance program were in the Americas and Europe.\r\nTrue  False \r\n\r\nCaldwell Article\r\n8. Security event management software is designed to correlate security event log data across multiple types of security devices. \r\nTrue  False \r\n\r\n9. To create a security event chain and correlate security event log data, systems must move security data to a consolidation point, they must be normalized to a common log format, and they must be reduced so they can be correlated more efficiently. \r\nTrue  False \r\n\r\n10. The following basic fields are among those most likely to be used for data correlation by security event management software: geography of device, device type and time threshold.\r\nTrue  False \r\n\r\nHasan Article\r\n11. Benford\'s Law is based on certain assumptions about numbers that result from the same phenomenon. It states that the digits 1 through 9 are not equally likely to appear as a leading digit in multidigit numbers resulting from the phenomenon.\r\nTrue  False \r\n\r\n12. Examples of Benford\'s Law occurring in population statistics are that the number 9 is twice as likely to occur as a leading digit than the number 2 or 3. \r\nTrue  False \r\n\r\n13. Datasets must satisfy several conditions before applying Benford\'s Law. Some of these conditions include: the numbers must not be affected by minimum or maximum values, the numbers must occur naturally but not be assigned and the numbers must be related in some way.\r\nTrue  False \r\n\r\nStasiak Article\r\n14. The first phase of a web application review is the crawl state, where the reviewer gathers information about the application under review.\r\nTrue  False \r\n\r\n15. Tools identified by the author for the attack phase of a web application review include AppScan, WebInspect and ScanDo.\r\nTrue  False \r\n\r\nGreene Article\r\n16. Standard-setting bodies that have published standards for application security include ISO, AICPA, ISACA and NIST. \r\nTrue  False \r\n\r\n============================================================================\r\n\r\n\r\n\r\n结果分析\r\n\r\n\r\nCPE Quiz #87 Results\r\nPrint this page to save your results.\r\n\r\nSarup Article\r\n1. Reasons cited by the author for failure of transformation change efforts include overcommunicating to the troops and ineffective leadership in driving change.\r\n\r\nThe correct answer is False. Question not answered.\r\n\r\n2. Control principles important in a governance framework for a change program include a project plan and charter, a tracking mechanism for monitoring the progress against plan, and a process to solicit feedback and address changes, among others.\r\n\r\nThe correct answer is True. Question not answered.\r\n\r\n3. Information technology generally is not germane to a transformational change effort.\r\n\r\nThe correct answer is False. Question not answered.\r\n\r\nGuldentops and De Haes Article\r\n4. COBIT is more likely to be used by smaller enterprises than larger ones, according to a survey conducted by ISACA and the IT Governance Institute.™\r\n\r\nThe correct answer is False. Question not answered.\r\n\r\n5. After COBIT, the most popular control methodologies in use among survey participants include COSO and ISO 9000.\r\n\r\nThe correct answer is True. Question not answered.\r\n\r\nGuldentops, Van Grembergen and De Haes Article\r\n6. Among industries, organizations responding to the ISACA and IT Governance Institute survey cited by the authors that had the most mature controls and governance program were in the retail and financial services industries.\r\n\r\nThe correct answer is False. Question not answered.\r\n\r\n7. Among geographies, organizations responding to the ISACA and IT Governance Institute survey cited by the authors that had the most mature controls and governance program were in the Americas and Europe.\r\n\r\nThe correct answer is False. Question not answered.\r\n\r\nCaldwell Article\r\n8. Security event management software is designed to correlate security event log data across multiple types of security devices. \r\n\r\nThe correct answer is True. Question not answered.\r\n\r\n9. To create a security event chain and correlate security event log data, systems must move security data to a consolidation point, they must be normalized to a common log format, and they must be reduced so they can be correlated more efficiently. \r\n\r\nThe correct answer is True. Question not answered.\r\n\r\n10. The following basic fields are among those most likely to be used for data correlation by security event management software: geography of device, device type and time threshold.\r\n\r\nThe correct answer is True. Question not answered.\r\n\r\nHasan Article\r\n11. Benford\'s Law is based on certain assumptions about numbers that result from the same phenomenon. It states that the digits 1 through 9 are not equally likely to appear as a leading digit in multidigit numbers resulting from the phenomenon.\r\n\r\nThe correct answer is True. Question not answered.\r\n\r\n12. Examples of Benford\'s Law occurring in population statistics are that the number 9 is twice as likely to occur as a leading digit than the number 2 or 3. \r\n\r\nThe correct answer is False. Question not answered.\r\n\r\n13. Datasets must satisfy several conditions before applying Benford\'s Law. Some of these conditions include: the numbers must not be affected by minimum or maximum values, the numbers must occur naturally but not be assigned and the numbers must be related in some way.\r\n\r\nThe correct answer is True. Question not answered.\r\n\r\nStasiak Article\r\n14. The first phase of a web application review is the crawl state, where the reviewer gathers information about the application under review.\r\n\r\nThe correct answer is False. Question not answered.\r\n\r\n15. Tools identified by the author for the attack phase of a web application review include AppScan, WebInspect and ScanDo.\r\n\r\nThe correct answer is True. Question not answered.\r\n\r\nGreene Article\r\n16. Standard-setting bodies that have published standards for application security include ISO, AICPA, ISACA and NIST. \r\n\r\nThe correct answer is True. Question not answered.\r\n\r\nYour score is 0%. (0/16)\r\nA passing score of 75 percent qualifies for one (1) hour of CISA continuing education credit. Please confirm with other designation-granting professional bodies for their CPE qualification acceptance criteria.

论坛徽章:
0
8 [报告]
发表于 2003-03-27 22:49 |只看该作者
我也是学生\r\n中国学生\r\n照样是60USD

论坛徽章:
0
9 [报告]
发表于 2003-03-28 09:22 |只看该作者
那你利害,我写了一封信给ISACA,回信说不能,我就掏了150美元
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP