Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

CISSP Flash Cards

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
PSEUDO FLAW   APPARENT LOOPHOLE DELIBERATELY IMPLANTED  
🗑
NETWORK ASSESSMENT TOOLS   ISS, SATAN, BALLISTA  
🗑
HDSL   1.55MBPS UPSTREAM 1.55MBPS DOWNSTREAM  
🗑
CONSTRAINED DATA ITEM   CLARK-WILSON  
🗑
SLIP, CSLIP, PPP   LINK LAYER  
🗑
SET   APPLICATION LAYER  
🗑
LEAST UPPER/GREATEST LOWER   LATTICE MODEL  
🗑
WATER   COOLS, ALPHA, PRE-ACTION FOR COMPUTER, DRY-PIPE DELAYS WATER  
🗑
CO2   ELECTRICAL, DISPLACES O2  
🗑
HALON   INTERRUPTS CHEMICAL REACTION MONTREAL PROTOCOL HARMFUL TO OZONE, HALON BANK  
🗑
SODA ACID   SUPPRESSES FUEL SUPPLY  
🗑
MAC   LABELS  
🗑
TIME TO SWITCH AND TIME PRESSING KEY   FLIGHT TIME AND DWELL TIME  
🗑
SOCKS   SOCKS-et-S CIRCUIT LEVEL  
🗑
TCP/UPD PORT NUMBER LENGTH   16 BITS  
🗑
ORANGE BOOK   TCSEC, BELL-LAPADULA, MAC, CONFIDENTIALITY  
🗑
RED BOOK   NETWORK  
🗑
GREEN BOOK   PASSWORD MANAGEMENT  
🗑
TEMPERATURE THAT DAMAGES MAGNETIC MEDIA   100 DEGREES  
🗑
FAR   FALSE ACCEPTANCE RATE/TYPE II  
🗑
FRR   FALSE REJECTION RATE/TYPE I  
🗑
PROLONGED HIGH VOLTAGE   SURGE  
🗑
VERIFIED DESIGN   A1  
🗑
RED BOX   SOUND OF COINS  
🗑
BLUE BOX   TONE, FREQ FOR LONG DISTANCE  
🗑
BLACK BOX   LINE VOLTAGE, RECEIVER'S END  
🗑
FRAGMENTATION   TEAR DROP  
🗑
UNIX SYSTEM PASSWORDS   ETC/SHADOW OR ETC/PASSWORD  
🗑
ABSTRACT MACHINE THAT MEDIATES ALL ACCESS BETWEEN SUBJECTS AND OBJECTS   REFERENCE MONITOR  
🗑
DISCOURAGE   DETER  
🗑
RSA   ASYMMETRIC ENCRYPTION USED FOR AUTHENTICATION, DIGITAL SIGNATURES, ENCRYPTION. BASED ON DIFFICULTY IN FACTORING LARGE PRIME NUMBERS  
🗑
BIOMETRIC SYSTEM THAT IS GOOD OVER A LONG PERIOD OF TIME   IRIS  
🗑
KERCHOFF   KEY IS SECRET,ALGORITHM IS KNOWN  
🗑
NUMBER OF COLUMNS IN TABLE   DEGREE  
🗑
FINGERPRINT   MINUTIA MATCHING  
🗑
THRESHOLD OR MANAGEABLE LEVEL   CLIPPING LEVEL  
🗑
APPLICATION LAYER, 2 ASYMMETRICAL KEYS -or- 2 DIGITAL CERTIFICATES   SET  
🗑
CLARK WILSON, BIBA   INTEGRITY  
🗑
MD5 SIZE OF DIGEST   128 BITS  
🗑
SHA-1 SIZE OF DIGEST   160 BITS  
🗑
FIRST LEVEL TO REQUIRE LABELS   B1  
🗑
COVERT CHANNEL   BYPASSES REFERENCE MODEL  
🗑
PSEUDO FLAW   APPARENT LOOPHOLE DELIBERATELY IMPLANTED  
🗑
NETWORK ASSESSMENT TOOLS   ISS, SATAN, BALLISTA  
🗑
HDSL   1.55MBPS UPSTREAM 1.55MBPS DOWNSTREAM  
🗑
CONSTRAINED DATA ITEM   CLARK-WILSON  
🗑
SLIP, CSLIP, PPP   LINK LAYER  
🗑
SET   APPLICATION LAYER  
🗑
LEAST UPPER/GREATEST LOWER   LATTICE MODEL  
🗑
WATER   COOLS, ALPHA, PRE-ACTION FOR COMPUTER, DRY-PIPE DELAYS WATER  
🗑
CO2   ELECTRICAL, DISPLACES O2  
🗑
HALON   INTERRUPTS CHEMICAL REACTION MONTREAL PROTOCOL HARMFUL TO OZONE, HALON BANK  
🗑
SODA ACID   SUPPRESSES FUEL SUPPLY  
🗑
MAC   LABELS  
🗑
TIME TO SWITCH AND TIME PRESSING KEY   FLIGHT TIME AND DWELL TIME  
🗑
SOCKS   SOCKS-et-S CIRCUIT LEVEL  
🗑
TCP/UPD PORT NUMBER LENGTH   16 BITS  
🗑
ORANGE BOOK   TCSEC, BELL-LAPADULA, MAC, CONFIDENTIALITY  
🗑
RED BOOK   NETWORK  
🗑
GREEN BOOK   PASSWORD MANAGEMENT  
🗑
TEMPERATURE THAT DAMAGES MAGNETIC MEDIA   100 DEGREES  
🗑
FAR   FALSE ACCEPTANCE RATE/TYPE II  
🗑
FRR   FALSE REJECTION RATE/TYPE I  
🗑
PROLONGED HIGH VOLTAGE   SURGE  
🗑
VERIFIED DESIGN   A1  
🗑
RED BOX   SOUND OF COINS  
🗑
BLUE BOX   TONE, FREQ FOR LONG DISTANCE  
🗑
BLACK BOX   LINE VOLTAGE, RECEIVER'S END  
🗑
FRAGMENTATION   TEAR DROP  
🗑
UNIX SYSTEM PASSWORDS   ETC/SHADOW OR ETC/PASSWORD  
🗑
ABSTRACT MACHINE THAT MEDIATES ALL ACCESS BETWEEN SUBJECTS AND OBJECTS   REFERENCE MONITOR  
🗑
DISCOURAGE   DETER  
🗑
RSA   ASYMMETRIC ENCRYPTION USED FOR AUTHENTICATION, DIGITAL SIGNATURES, ENCRYPTION. BASED ON DIFFICULTY IN FACTORING LARGE PRIME NUMBERS  
🗑
BIOMETRIC SYSTEM THAT IS GOOD OVER A LONG PERIOD OF TIME   IRIS  
🗑
KERCHOFF   KEY IS SECRET,ALGORITHM IS KNOWN  
🗑
NUMBER OF COLUMNS IN TABLE   DEGREE  
🗑
FINGERPRINT   MINUTIA MATCHING  
🗑
THRESHOLD OR MANAGEABLE LEVEL   CLIPPING LEVEL  
🗑
APPLICATION LAYER, 2 ASYMMETRICAL KEYS -or- 2 DIGITAL CERTIFICATES   SET  
🗑
CLARK WILSON, BIBA   INTEGRITY  
🗑
MD5 SIZE OF DIGEST   128 BITS  
🗑
SHA-1 SIZE OF DIGEST   160 BITS  
🗑
FIRST LEVEL TO REQUIRE LABELS   B1  
🗑
COVERT CHANNEL   BYPASSES REFERENCE MODEL  
🗑
DATA LEFT AFTER MEDIA HAS BEEN ERASED   REMANENCE  
🗑
16 Bits Equals   65536  
🗑
STOP OR DETER   PREVENTATIVE  
🗑
PPP, RARP, ARP   LAYER 2, LINK/DATA LINK  
🗑
A1   VERIFIED  
🗑
B1   LABELED  
🗑
B2   STRUCTURED, SEPARATION OF DUTIES  
🗑
B3   SECURITY DOMAIN  
🗑
WEB OF TRUST   PGP  
🗑
DISCOURAGE   DETER  
🗑
PREVENT   AVOID  
🗑
DETECTIVE   IDENTIFY  
🗑
DIFFIE-HELLMAN   KEY MANAGEMENT/EXCHANGE ONLY, FIRST ASYMMETRIC  
🗑
ECC   MORE EFFICIENT, BETTER FOR SMALL/MOBILE DEVICES, REQUIRES SHORTER KEY LENGTHS  
🗑
COVERT CHANNELS TWO TYPES   STORAGE, TIMING  
🗑
PASSWORD-TWO UNRELATED WORDS   COMPOSITION  
🗑
CONTROLS OBJECTS THROUGH PROGRAMS   CLARK-WILSON  
🗑
ICMP, IGMP, IPX, IPSEC, WHAT LAYER   NETWORK, LAYER 3  
🗑
SATISFY REAL WORLD REQUIREMENTS   VALIDATION  
🗑
COUNTRY FAILS TO LEGALLY PROTECT PERSONAL DATA   DATA HAVEN, DATA HARBOR  
🗑
DECISION SUPPORT SYSTEM (DSS) PROVIDES   FLEXIBILITY  
🗑
BEST PROGRAMMING HAS   HIGH COHESION AND LOW COUPLING  
🗑
COHESION   ONLY ONE PROCESS OR ONLY RELATED PROCESSES  
🗑
COUPLING   INTERACTION REQUIRED  
🗑
RISK   LIKELIHOOD  
🗑
IP HEADER-TCP NUMBER   6  
🗑
IP HEADER-ICMP NUMBER   1  
🗑
IP HEADER-IGMP NUMBER   2  
🗑
IP HEADER-UDP NUMBER   17  
🗑
IMPORTANT FOR EVIDENCE   CHAIN OF CUSTODY  
🗑
DATABASE ROWS   TUPLE  
🗑
NETWORK REDUNDANCY   DUAL BACKBONE  
🗑
DRAW CONCLUSIONS   INFERENCE  
🗑
SUSTAINING-DURING AND AFTER   BUSINESS CONTINUITY PLAN  
🗑
FIRST STEP   POLICY  
🗑
STEP-BY-STEP   PROCEDURE  
🗑
RECOMMENDED   GUIDELINES  
🗑
CONTENT DEPENDENT-ADVANTAGE   MORE GRANULAR  
🗑
CONTENT DEPENDENT-DISADVANTAGE   OVERHEAD  
🗑
PROTECT ONLY WITHIN A FEW INCHES   CAPACITANCE DETECTOR  
🗑
TRANSMIT ONLINE TRANSACTIONS TO REMOTE FACILITY   ELECTRONIC VAULTING  
🗑
CELL PHONE-PREVENT MONITORING   TIME DIVISION MULTIPLEXING  
🗑
CCTV IS MAINLY   DETECTIVE  
🗑
LINUX, PREVENTS USERS FROM SEEING DATA   SHADOW  
🗑
ORANGE BOOK   TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC)  
🗑
RADIUS-ACT AS CLIENT   NETWORK ACCESS SERVER (NAS)  
🗑
LOCK PICKING TECHNIQUE FOR COMBINATION LOCKS   SHIMMING  
🗑
DES NUMBER OF ROUNDS   16  
🗑
FLEXIBLE SUPPORT FOR O/S   FLASK FLUX ADVANCED SECURITY KERNEL  
🗑
ID PICTURE, VERIFY AUTHENTICITY ON A DOCUMENT   WATERMARK  
🗑
PROPER LIFECYCLE OF EVIDENCE   COLLECTION, ANALYSIS, STORAGE, PRESENT IN COURT, RETURN TO OWNER  
🗑
ALGORITHMS BASED ON DISCRETE LOGARITHMS   EL GAMAL, DIFFIE-HELLMAN, ECC  
🗑
24 HOURS A DAY PROCESSING, GOOD ALTERNATIVE TO TAPE BACKUP   BACKUP TO JUKEBOX  
🗑
NUMBER OF COMBINATIONS FOR A NUMERIC PASSWORD THAT IS 1-4 DIGITS   10,000 COMBOS  
🗑
SSO BENEFIT   MORE EFFICIENT LOG-ON  
🗑
ACCOUNTABILITY=TRACED BACK TO   INDIVIDUAL  
🗑
IPSEC LAYER AND PROTOCOLS USED   L3, AH AND ESP, ESP=INTEGRITY AND CONFIDENTIALITY  
🗑
REASONABLE MEASURES TO ENSURE   DUE CARE  
🗑
LIABILITY   DUE CARE, DUE DILIGENCE  
🗑
SINGLE UNIT OF ETHERNET DATA   FRAME  
🗑
1ST STEP IN A PENETRATION TEST   FORMULATION OF SPECIFIC MANAGEMENT OBJECTIVES  
🗑
COVERT CHANNEL   1 PROCESS SIGNALS ANOTHER BY MODIFYING ITS OWN USE OF SYSTEM RESOURCES  
🗑
QUALITATIVE   PRIORITIZES RISK  
🗑
REGISTERED PORTS   1024-49151  
🗑
WELL KNOWN PORTS   1-1023  
🗑
DYNAMIC AND OR PRIVATE PORTS   49152-65535  
🗑
ISDN BRI   2B AND 1D  
🗑
WITH PUBLIC KEY CRYPTOGRAPHY, FOR CONFIDENTIALITY, WHICH KEY IS USED FIRST   RECEIVER'S PUBLIC KEY  
🗑
WITH PUBLIC KEY CRYPTOGRAPHY, FOR AUTHENTICATION, WHICH KEY IS USED FIRST   SENDER'S PRIVATE KEY  
🗑
INTEGRITY   HASHING  
🗑
GUARDS   DISCRIMINATING JUDGMENT  
🗑
SSO-TYPES   KERBEROS, SESAME, KRYPTOKNIGHT  
🗑
KERBEROS   TICKETS, MIT, PROJECT ATHENA, SYMMETRIC, CONFIDENTIAL & INTEGRITY, 3-HEADED DOG, GREEK MYTHOLOGY  
🗑
EVIDENCE MUST BE   RELEVANT  
🗑
PACKET FILTERING FIREWALL (GENERATION)   1  
🗑
APPLICATION LEVEL FIREWALL (GENERATION)   2  
🗑
STATEFUL INSPECTION FIREWALL(GENERATION)   3  
🗑
DYNAMIC PACKET FILTERING FIREWALL (GENERATION)   4  
🗑
KERNEL PROXY FIREWALL (GENERATION)   5  
🗑
TRINOO/TRIN00   DDOS, TRIBAL FLOOD NETWORK  
🗑
AUTOMATICALLY LEAVES SYSTEM PROCESSES & COMPONENTS IN A SECURE STATE AFTER FAILURE   FAIL-SAFE  
🗑
MOST CRUCIAL LINK IN THE COMPUTER SECURITY CHAIN   MANAGEMENT  
🗑
RESPONSIBLE FOR ENSURING PROPER CONTROLS ARE IN-PLACE FOR DATA   DATA OWNER  
🗑
SCHEMA   STRUCTURE  
🗑
RELATION   HOW DATA & SCHEMA ARE RELATED (ASSOCIATED)  
🗑
DEGREE   NUMBER OF COLUMNS  
🗑
CARDINALITY   NUMBER OF ROWS IN A RELATION, HOW TABLES LINK TO ONE ANOTHER  
🗑
CONTINGENCY PLAN SHOULD ADDRESS   RESIDUAL RISK  
🗑
LEAST PRIVILEGE-MODEL   TCSEC  
🗑
RETROFITTING SECURITY FOR A DATABASE   TRUSTED FRONT-END  
🗑
SCRAMBLED   TRANSPOSITION  
🗑
REPLACED   SUBSTITUTION  
🗑
HIDE IN MEDIA (PICTURES)   STEGANOGRAPHY  
🗑
EVERY X NUMBER OF WORDS IS PART OF REAL MESSAGE   CONCEALMENT  
🗑
BOOK, PAGE, PARAGRAPH, ETC?..   RUNNING  
🗑
CERTIFICATION RULES & ENFORCEMENT RULES (MODEL)   CLARK-WILSON  
🗑
FORENSIC DISK BACK-UP   BIT LEVEL, BIT-BY-BIT  
🗑
ADDED TO PASSWORDS TO INCREASE RANDOMNESS   SALTS  
🗑
RPC OSI LAYER   5 (SESSION)  
🗑
LOWER CASE   IMPLEMENTATION  
🗑
MIDDLE CASE   ANALYSIS & DESIGN  
🗑
UPPER CASE   EXECUTIVES/PLANNING  
🗑
ICASE   COMBINED (L,M,U) ALSO CALLED INTEGRATED CASE  
🗑
ARTIFICIAL INTELLIGENCE/LEARN FROM EXPERIENCE   NEURAL NETWORK  
🗑
AUDIT TRAILS   DETECTIVE/TECHNICAL  
🗑
HIPPA   SECURITY & PRIVACY  
🗑
SOFTWARE TESTING (INTERNAL)   WHITE BOX  
🗑
SOFTWARE TESTING (EXTERNAL)   BLACK BOX  
🗑
FORMAL ACCEPTANCE   ACCREDITATION  
🗑
PROPRIETARY & IMPORTANT TO SURVIVAL   TRADE-SECRET  
🗑
INVALID TRANSACTIONS SHOULD BE   WRITTEN TO REPORT AND REVIEWED  
🗑
ATTRIBUTES IN A TABLE DEPEND ONLY ON PRIMARY KEY   DATA NORMALIZATION  
🗑
MAY RENDER TOKEN UNUSABLE   BATTERY LIFESPAN  
🗑
ACV   ACTUAL COST VALUE, VALUE OF ITEM ON THE DATE OF LOSS + 10 %  
🗑
SET   VISA, MASTERCARD, INTERNET, CREDIT CARD PROTOCOL, USED DIGITAL SIGNATURES  
🗑
WAP GAP   WTLS IS DECRYPTED AT THE CARRIERS WAP GATEWAY TO RE-ENCRYPT WITH SSL FOR WIRED NETWORKS  
🗑
PASSWORD CRACKERS USE   COMPARATIVE ANALYSIS  
🗑
CHAIN OF CUSTODY SHOWS   WHO: OBTAINED AND SECURED EVIDENCE  
🗑
DIGITAL SIGNATURE STANDARD(DSS) PROVIDES   INTEGRITY, DIGITAL SIGNATURE & AUTHENTICATION, NOT ENCRYPTION  
🗑
HIGH AVAILABILITY-SERVER   LOAD BALANCING, DISK REPLICATION  
🗑
ALL RECOVERY PLANS   BECOME OBSOLETE QUICKLY  
🗑
MAIN REASON FOR CCTV   INCREASE GUARD VISIBILITY  
🗑
PROTECT AGAINST BRUTE-FORCE ATTACK   ACCOUNT LOCK-OUT AFTER 3 UNSUCCESSFUL ATTEMPTS  
🗑
FORMAL DESCRIPTION OF SECURITY POLICY   ACCESS CONTROL MODULE  
🗑
ONE-WAY HASH   DIFFERENT DIGEST FOR DIFFERENT DATA, VARIABLE INPUT-FIXED OUTPUT GIVEN DIGEST, COMPUTATIONALLY INFEASIBLE TO FIND CORRESPONDING MESSAGE  
🗑
X.509   DIGITAL CERTIFICATES  
🗑
HOST-BASED IDS-DISADVANTAGE   COSTLY TO MANAGE  
🗑
SECURITY REQUIREMENT UNIQUE TO COMPARTMENTED WORKSTATION   INFORMATION LABELS  
🗑
ACT OF VALIDATING USER   AUTHENTICATION  
🗑
SALARY LEVELS-CLASSIFICATION IN PRIVATE SECTOR   PRIVATE  
🗑
PROTECTION PROFILE   COMMON CRITERIA (CC)  
🗑
ORANGE BOOK   SECURITY TESTING, DESIGN SPECIFICATION & TESTING, TRUSTED DISTRIBUTION, NOT SYSTEM INTEGRITY  
🗑
MOST SECURE FORM OF 3DES   DES-EDE3  
🗑
MAC ADDRESS SIZE   48-BIT, ALSO CALLED HARDWARE ADDRESS  
🗑
IPV4 ADDRESS SIZE IN BITS   32-BIT  
🗑
MTO   MAXIMUM TOLERABLE DOWNTIME, MAX DELAY BUSINESS CAN TOLERATE & STILL BE VIABLE  
🗑
ATM   FIXED CELL SIZE  
🗑
CONFLICT OF INTEREST, SUBJECT, COMPANY DATASETS = WHAT MODEL   CHINESE WALL  
🗑
FACIAL IDENTIFICATION   EIGEN FEATURES OF EIGEN FACES  
🗑
MAC CATEGORY OF A RESOURCE CAN BE ONLY BE CHANGED BY   ADMINISTRATORS  
🗑
STATE MACHINE MODEL IS BEST FOR   CONFIDENTIALITY  
🗑
BELL-LAPADULA (BLP) SECURITY MODE WITH HIGHEST RISK   MULTI-LEVEL  
🗑
DATA DICTIONARY   CONTROL & MANAGE DATA FROM A CENTRAL LOCATION  
🗑
TECHNIQUE FOR ARTIFICIAL INTELLIGENCE   CYCLIC-BASED REASONING STATEMENT  
🗑
NOT EFFECTIVE DETERRENT AGAINST DATABASE INFERENCE ATTACKS   SMALL QUERY SETS  
🗑
BUSINESS CONTINUITY PLAN DEVELOPMENT DEPENDS ON   BIA  
🗑
CONTROL TECHNIQUE REQUIRES SEPARATE ENTITIES OPERATING IN CONCERT   DUAL CONTROL  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: Bob Smythe
Popular Computers sets