CISSP Word Scramble
|
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Question | Answer |
PSEUDO FLAW | APPARENT LOOPHOLE DELIBERATELY IMPLANTED |
NETWORK ASSESSMENT TOOLS | ISS, SATAN, BALLISTA |
HDSL | 1.55MBPS UPSTREAM 1.55MBPS DOWNSTREAM |
CONSTRAINED DATA ITEM | CLARK-WILSON |
SLIP, CSLIP, PPP | LINK LAYER |
SET | APPLICATION LAYER |
LEAST UPPER/GREATEST LOWER | LATTICE MODEL |
WATER | COOLS, ALPHA, PRE-ACTION FOR COMPUTER, DRY-PIPE DELAYS WATER |
CO2 | ELECTRICAL, DISPLACES O2 |
HALON | INTERRUPTS CHEMICAL REACTION MONTREAL PROTOCOL HARMFUL TO OZONE, HALON BANK |
SODA ACID | SUPPRESSES FUEL SUPPLY |
MAC | LABELS |
TIME TO SWITCH AND TIME PRESSING KEY | FLIGHT TIME AND DWELL TIME |
SOCKS | SOCKS-et-S CIRCUIT LEVEL |
TCP/UPD PORT NUMBER LENGTH | 16 BITS |
ORANGE BOOK | TCSEC, BELL-LAPADULA, MAC, CONFIDENTIALITY |
RED BOOK | NETWORK |
GREEN BOOK | PASSWORD MANAGEMENT |
TEMPERATURE THAT DAMAGES MAGNETIC MEDIA | 100 DEGREES |
FAR | FALSE ACCEPTANCE RATE/TYPE II |
FRR | FALSE REJECTION RATE/TYPE I |
PROLONGED HIGH VOLTAGE | SURGE |
VERIFIED DESIGN | A1 |
RED BOX | SOUND OF COINS |
BLUE BOX | TONE, FREQ FOR LONG DISTANCE |
BLACK BOX | LINE VOLTAGE, RECEIVER'S END |
FRAGMENTATION | TEAR DROP |
UNIX SYSTEM PASSWORDS | ETC/SHADOW OR ETC/PASSWORD |
ABSTRACT MACHINE THAT MEDIATES ALL ACCESS BETWEEN SUBJECTS AND OBJECTS | REFERENCE MONITOR |
DISCOURAGE | DETER |
RSA | ASYMMETRIC ENCRYPTION USED FOR AUTHENTICATION, DIGITAL SIGNATURES, ENCRYPTION. BASED ON DIFFICULTY IN FACTORING LARGE PRIME NUMBERS |
BIOMETRIC SYSTEM THAT IS GOOD OVER A LONG PERIOD OF TIME | IRIS |
KERCHOFF | KEY IS SECRET,ALGORITHM IS KNOWN |
NUMBER OF COLUMNS IN TABLE | DEGREE |
FINGERPRINT | MINUTIA MATCHING |
THRESHOLD OR MANAGEABLE LEVEL | CLIPPING LEVEL |
APPLICATION LAYER, 2 ASYMMETRICAL KEYS -or- 2 DIGITAL CERTIFICATES | SET |
CLARK WILSON, BIBA | INTEGRITY |
MD5 SIZE OF DIGEST | 128 BITS |
SHA-1 SIZE OF DIGEST | 160 BITS |
FIRST LEVEL TO REQUIRE LABELS | B1 |
COVERT CHANNEL | BYPASSES REFERENCE MODEL |
PSEUDO FLAW | APPARENT LOOPHOLE DELIBERATELY IMPLANTED |
NETWORK ASSESSMENT TOOLS | ISS, SATAN, BALLISTA |
HDSL | 1.55MBPS UPSTREAM 1.55MBPS DOWNSTREAM |
CONSTRAINED DATA ITEM | CLARK-WILSON |
SLIP, CSLIP, PPP | LINK LAYER |
SET | APPLICATION LAYER |
LEAST UPPER/GREATEST LOWER | LATTICE MODEL |
WATER | COOLS, ALPHA, PRE-ACTION FOR COMPUTER, DRY-PIPE DELAYS WATER |
CO2 | ELECTRICAL, DISPLACES O2 |
HALON | INTERRUPTS CHEMICAL REACTION MONTREAL PROTOCOL HARMFUL TO OZONE, HALON BANK |
SODA ACID | SUPPRESSES FUEL SUPPLY |
MAC | LABELS |
TIME TO SWITCH AND TIME PRESSING KEY | FLIGHT TIME AND DWELL TIME |
SOCKS | SOCKS-et-S CIRCUIT LEVEL |
TCP/UPD PORT NUMBER LENGTH | 16 BITS |
ORANGE BOOK | TCSEC, BELL-LAPADULA, MAC, CONFIDENTIALITY |
RED BOOK | NETWORK |
GREEN BOOK | PASSWORD MANAGEMENT |
TEMPERATURE THAT DAMAGES MAGNETIC MEDIA | 100 DEGREES |
FAR | FALSE ACCEPTANCE RATE/TYPE II |
FRR | FALSE REJECTION RATE/TYPE I |
PROLONGED HIGH VOLTAGE | SURGE |
VERIFIED DESIGN | A1 |
RED BOX | SOUND OF COINS |
BLUE BOX | TONE, FREQ FOR LONG DISTANCE |
BLACK BOX | LINE VOLTAGE, RECEIVER'S END |
FRAGMENTATION | TEAR DROP |
UNIX SYSTEM PASSWORDS | ETC/SHADOW OR ETC/PASSWORD |
ABSTRACT MACHINE THAT MEDIATES ALL ACCESS BETWEEN SUBJECTS AND OBJECTS | REFERENCE MONITOR |
DISCOURAGE | DETER |
RSA | ASYMMETRIC ENCRYPTION USED FOR AUTHENTICATION, DIGITAL SIGNATURES, ENCRYPTION. BASED ON DIFFICULTY IN FACTORING LARGE PRIME NUMBERS |
BIOMETRIC SYSTEM THAT IS GOOD OVER A LONG PERIOD OF TIME | IRIS |
KERCHOFF | KEY IS SECRET,ALGORITHM IS KNOWN |
NUMBER OF COLUMNS IN TABLE | DEGREE |
FINGERPRINT | MINUTIA MATCHING |
THRESHOLD OR MANAGEABLE LEVEL | CLIPPING LEVEL |
APPLICATION LAYER, 2 ASYMMETRICAL KEYS -or- 2 DIGITAL CERTIFICATES | SET |
CLARK WILSON, BIBA | INTEGRITY |
MD5 SIZE OF DIGEST | 128 BITS |
SHA-1 SIZE OF DIGEST | 160 BITS |
FIRST LEVEL TO REQUIRE LABELS | B1 |
COVERT CHANNEL | BYPASSES REFERENCE MODEL |
DATA LEFT AFTER MEDIA HAS BEEN ERASED | REMANENCE |
16 Bits Equals | 65536 |
STOP OR DETER | PREVENTATIVE |
PPP, RARP, ARP | LAYER 2, LINK/DATA LINK |
A1 | VERIFIED |
B1 | LABELED |
B2 | STRUCTURED, SEPARATION OF DUTIES |
B3 | SECURITY DOMAIN |
WEB OF TRUST | PGP |
DISCOURAGE | DETER |
PREVENT | AVOID |
DETECTIVE | IDENTIFY |
DIFFIE-HELLMAN | KEY MANAGEMENT/EXCHANGE ONLY, FIRST ASYMMETRIC |
ECC | MORE EFFICIENT, BETTER FOR SMALL/MOBILE DEVICES, REQUIRES SHORTER KEY LENGTHS |
COVERT CHANNELS TWO TYPES | STORAGE, TIMING |
PASSWORD-TWO UNRELATED WORDS | COMPOSITION |
CONTROLS OBJECTS THROUGH PROGRAMS | CLARK-WILSON |
ICMP, IGMP, IPX, IPSEC, WHAT LAYER | NETWORK, LAYER 3 |
SATISFY REAL WORLD REQUIREMENTS | VALIDATION |
COUNTRY FAILS TO LEGALLY PROTECT PERSONAL DATA | DATA HAVEN, DATA HARBOR |
DECISION SUPPORT SYSTEM (DSS) PROVIDES | FLEXIBILITY |
BEST PROGRAMMING HAS | HIGH COHESION AND LOW COUPLING |
COHESION | ONLY ONE PROCESS OR ONLY RELATED PROCESSES |
COUPLING | INTERACTION REQUIRED |
RISK | LIKELIHOOD |
IP HEADER-TCP NUMBER | 6 |
IP HEADER-ICMP NUMBER | 1 |
IP HEADER-IGMP NUMBER | 2 |
IP HEADER-UDP NUMBER | 17 |
IMPORTANT FOR EVIDENCE | CHAIN OF CUSTODY |
DATABASE ROWS | TUPLE |
NETWORK REDUNDANCY | DUAL BACKBONE |
DRAW CONCLUSIONS | INFERENCE |
SUSTAINING-DURING AND AFTER | BUSINESS CONTINUITY PLAN |
FIRST STEP | POLICY |
STEP-BY-STEP | PROCEDURE |
RECOMMENDED | GUIDELINES |
CONTENT DEPENDENT-ADVANTAGE | MORE GRANULAR |
CONTENT DEPENDENT-DISADVANTAGE | OVERHEAD |
PROTECT ONLY WITHIN A FEW INCHES | CAPACITANCE DETECTOR |
TRANSMIT ONLINE TRANSACTIONS TO REMOTE FACILITY | ELECTRONIC VAULTING |
CELL PHONE-PREVENT MONITORING | TIME DIVISION MULTIPLEXING |
CCTV IS MAINLY | DETECTIVE |
LINUX, PREVENTS USERS FROM SEEING DATA | SHADOW |
ORANGE BOOK | TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC) |
RADIUS-ACT AS CLIENT | NETWORK ACCESS SERVER (NAS) |
LOCK PICKING TECHNIQUE FOR COMBINATION LOCKS | SHIMMING |
DES NUMBER OF ROUNDS | 16 |
FLEXIBLE SUPPORT FOR O/S | FLASK FLUX ADVANCED SECURITY KERNEL |
ID PICTURE, VERIFY AUTHENTICITY ON A DOCUMENT | WATERMARK |
PROPER LIFECYCLE OF EVIDENCE | COLLECTION, ANALYSIS, STORAGE, PRESENT IN COURT, RETURN TO OWNER |
ALGORITHMS BASED ON DISCRETE LOGARITHMS | EL GAMAL, DIFFIE-HELLMAN, ECC |
24 HOURS A DAY PROCESSING, GOOD ALTERNATIVE TO TAPE BACKUP | BACKUP TO JUKEBOX |
NUMBER OF COMBINATIONS FOR A NUMERIC PASSWORD THAT IS 1-4 DIGITS | 10,000 COMBOS |
SSO BENEFIT | MORE EFFICIENT LOG-ON |
ACCOUNTABILITY=TRACED BACK TO | INDIVIDUAL |
IPSEC LAYER AND PROTOCOLS USED | L3, AH AND ESP, ESP=INTEGRITY AND CONFIDENTIALITY |
REASONABLE MEASURES TO ENSURE | DUE CARE |
LIABILITY | DUE CARE, DUE DILIGENCE |
SINGLE UNIT OF ETHERNET DATA | FRAME |
1ST STEP IN A PENETRATION TEST | FORMULATION OF SPECIFIC MANAGEMENT OBJECTIVES |
COVERT CHANNEL | 1 PROCESS SIGNALS ANOTHER BY MODIFYING ITS OWN USE OF SYSTEM RESOURCES |
QUALITATIVE | PRIORITIZES RISK |
REGISTERED PORTS | 1024-49151 |
WELL KNOWN PORTS | 1-1023 |
DYNAMIC AND OR PRIVATE PORTS | 49152-65535 |
ISDN BRI | 2B AND 1D |
WITH PUBLIC KEY CRYPTOGRAPHY, FOR CONFIDENTIALITY, WHICH KEY IS USED FIRST | RECEIVER'S PUBLIC KEY |
WITH PUBLIC KEY CRYPTOGRAPHY, FOR AUTHENTICATION, WHICH KEY IS USED FIRST | SENDER'S PRIVATE KEY |
INTEGRITY | HASHING |
GUARDS | DISCRIMINATING JUDGMENT |
SSO-TYPES | KERBEROS, SESAME, KRYPTOKNIGHT |
KERBEROS | TICKETS, MIT, PROJECT ATHENA, SYMMETRIC, CONFIDENTIAL & INTEGRITY, 3-HEADED DOG, GREEK MYTHOLOGY |
EVIDENCE MUST BE | RELEVANT |
PACKET FILTERING FIREWALL (GENERATION) | 1 |
APPLICATION LEVEL FIREWALL (GENERATION) | 2 |
STATEFUL INSPECTION FIREWALL(GENERATION) | 3 |
DYNAMIC PACKET FILTERING FIREWALL (GENERATION) | 4 |
KERNEL PROXY FIREWALL (GENERATION) | 5 |
TRINOO/TRIN00 | DDOS, TRIBAL FLOOD NETWORK |
AUTOMATICALLY LEAVES SYSTEM PROCESSES & COMPONENTS IN A SECURE STATE AFTER FAILURE | FAIL-SAFE |
MOST CRUCIAL LINK IN THE COMPUTER SECURITY CHAIN | MANAGEMENT |
RESPONSIBLE FOR ENSURING PROPER CONTROLS ARE IN-PLACE FOR DATA | DATA OWNER |
SCHEMA | STRUCTURE |
RELATION | HOW DATA & SCHEMA ARE RELATED (ASSOCIATED) |
DEGREE | NUMBER OF COLUMNS |
CARDINALITY | NUMBER OF ROWS IN A RELATION, HOW TABLES LINK TO ONE ANOTHER |
CONTINGENCY PLAN SHOULD ADDRESS | RESIDUAL RISK |
LEAST PRIVILEGE-MODEL | TCSEC |
RETROFITTING SECURITY FOR A DATABASE | TRUSTED FRONT-END |
SCRAMBLED | TRANSPOSITION |
REPLACED | SUBSTITUTION |
HIDE IN MEDIA (PICTURES) | STEGANOGRAPHY |
EVERY X NUMBER OF WORDS IS PART OF REAL MESSAGE | CONCEALMENT |
BOOK, PAGE, PARAGRAPH, ETC?.. | RUNNING |
CERTIFICATION RULES & ENFORCEMENT RULES (MODEL) | CLARK-WILSON |
FORENSIC DISK BACK-UP | BIT LEVEL, BIT-BY-BIT |
ADDED TO PASSWORDS TO INCREASE RANDOMNESS | SALTS |
RPC OSI LAYER | 5 (SESSION) |
LOWER CASE | IMPLEMENTATION |
MIDDLE CASE | ANALYSIS & DESIGN |
UPPER CASE | EXECUTIVES/PLANNING |
ICASE | COMBINED (L,M,U) ALSO CALLED INTEGRATED CASE |
ARTIFICIAL INTELLIGENCE/LEARN FROM EXPERIENCE | NEURAL NETWORK |
AUDIT TRAILS | DETECTIVE/TECHNICAL |
HIPPA | SECURITY & PRIVACY |
SOFTWARE TESTING (INTERNAL) | WHITE BOX |
SOFTWARE TESTING (EXTERNAL) | BLACK BOX |
FORMAL ACCEPTANCE | ACCREDITATION |
PROPRIETARY & IMPORTANT TO SURVIVAL | TRADE-SECRET |
INVALID TRANSACTIONS SHOULD BE | WRITTEN TO REPORT AND REVIEWED |
ATTRIBUTES IN A TABLE DEPEND ONLY ON PRIMARY KEY | DATA NORMALIZATION |
MAY RENDER TOKEN UNUSABLE | BATTERY LIFESPAN |
ACV | ACTUAL COST VALUE, VALUE OF ITEM ON THE DATE OF LOSS + 10 % |
SET | VISA, MASTERCARD, INTERNET, CREDIT CARD PROTOCOL, USED DIGITAL SIGNATURES |
WAP GAP | WTLS IS DECRYPTED AT THE CARRIERS WAP GATEWAY TO RE-ENCRYPT WITH SSL FOR WIRED NETWORKS |
PASSWORD CRACKERS USE | COMPARATIVE ANALYSIS |
CHAIN OF CUSTODY SHOWS | WHO: OBTAINED AND SECURED EVIDENCE |
DIGITAL SIGNATURE STANDARD(DSS) PROVIDES | INTEGRITY, DIGITAL SIGNATURE & AUTHENTICATION, NOT ENCRYPTION |
HIGH AVAILABILITY-SERVER | LOAD BALANCING, DISK REPLICATION |
ALL RECOVERY PLANS | BECOME OBSOLETE QUICKLY |
MAIN REASON FOR CCTV | INCREASE GUARD VISIBILITY |
PROTECT AGAINST BRUTE-FORCE ATTACK | ACCOUNT LOCK-OUT AFTER 3 UNSUCCESSFUL ATTEMPTS |
FORMAL DESCRIPTION OF SECURITY POLICY | ACCESS CONTROL MODULE |
ONE-WAY HASH | DIFFERENT DIGEST FOR DIFFERENT DATA, VARIABLE INPUT-FIXED OUTPUT GIVEN DIGEST, COMPUTATIONALLY INFEASIBLE TO FIND CORRESPONDING MESSAGE |
X.509 | DIGITAL CERTIFICATES |
HOST-BASED IDS-DISADVANTAGE | COSTLY TO MANAGE |
SECURITY REQUIREMENT UNIQUE TO COMPARTMENTED WORKSTATION | INFORMATION LABELS |
ACT OF VALIDATING USER | AUTHENTICATION |
SALARY LEVELS-CLASSIFICATION IN PRIVATE SECTOR | PRIVATE |
PROTECTION PROFILE | COMMON CRITERIA (CC) |
ORANGE BOOK | SECURITY TESTING, DESIGN SPECIFICATION & TESTING, TRUSTED DISTRIBUTION, NOT SYSTEM INTEGRITY |
MOST SECURE FORM OF 3DES | DES-EDE3 |
MAC ADDRESS SIZE | 48-BIT, ALSO CALLED HARDWARE ADDRESS |
IPV4 ADDRESS SIZE IN BITS | 32-BIT |
MTO | MAXIMUM TOLERABLE DOWNTIME, MAX DELAY BUSINESS CAN TOLERATE & STILL BE VIABLE |
ATM | FIXED CELL SIZE |
CONFLICT OF INTEREST, SUBJECT, COMPANY DATASETS = WHAT MODEL | CHINESE WALL |
FACIAL IDENTIFICATION | EIGEN FEATURES OF EIGEN FACES |
MAC CATEGORY OF A RESOURCE CAN BE ONLY BE CHANGED BY | ADMINISTRATORS |
STATE MACHINE MODEL IS BEST FOR | CONFIDENTIALITY |
BELL-LAPADULA (BLP) SECURITY MODE WITH HIGHEST RISK | MULTI-LEVEL |
DATA DICTIONARY | CONTROL & MANAGE DATA FROM A CENTRAL LOCATION |
TECHNIQUE FOR ARTIFICIAL INTELLIGENCE | CYCLIC-BASED REASONING STATEMENT |
NOT EFFECTIVE DETERRENT AGAINST DATABASE INFERENCE ATTACKS | SMALL QUERY SETS |
BUSINESS CONTINUITY PLAN DEVELOPMENT DEPENDS ON | BIA |
CONTROL TECHNIQUE REQUIRES SEPARATE ENTITIES OPERATING IN CONCERT | DUAL CONTROL |
Created by:
Bob Smythe
Popular Computers sets