Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CISSP

CISSP Flash Cards

QuestionAnswer
No Read Up/No Write Down Bell LaPadula
No Read Down/No Write Up Biba
Well Formed Transactions (Access Control Triple - User, Transformation Procedure, Constrained Data Item) Clark-Wilson
Chinese Wall: Avoid Conflicts of Interest Brewer-Nash
Table of access control permissions that exist between subjects and objects. The columns of the table show the ACL for each object or application. Access Control Matrix
Separates hardware and software functionality into modular tiers. Layering
Layer 3 (Ring Model) Users
Layer 2 (Ring Model) Device Drivers
Layer 1 (Ring Model) Operating System
Layer 0 (Ring Model) Kernel
Hides unnecessary details from the user Abstraction
The list of objects a subject is allowed to access (e.g. Top Secret, Secret, Confidential, etc.) Security Domain
Uses open hardware and standards from a variety of vendors Open System Architecture
Uses proprietary hardware and software Closed System Architecture
Makes source code publicly available Open Source
A CPU is rated by the number of ___________ ___________ per second Clock Cycles
The ALU (arithmetic logic unit) performs ______________ ____________. Mathematical Calculations
Fetch and Executes Steps are: 1.) Fetch 2.) Decode 3.) Execute 4.) Write
Combining multiple CPU (FDX and write) steps into one process Pipelining
An executable program and its associated data loaded and running in memory A Process
Another name for a (HWP) heavyweight process A Task
A (LWP) lightweight process (spawned from a parent process) A Thread
Allows multiple tasks (HWP) to run simultaneously on one CPU Multitasking
Runs multiple processes on multiple CPUs Multiprocessing
A logical control that attempts to prevent one from interfering with another Process Isolation
Contains code in firmware that execute when a system is powered on (BIOS) Basic Input/Output System
A chip/processor that can provide additional security capabilities at the hardware level (TPM) Trusted Platform Module
Provides the interface between the hardware and the rest of the operating system, including applications Kernel
Mediates all access between subjects and objects and enforces the system's security policy Reference Monitor
Allows multiple "guest" operating systems to run on one physical "host" computer Virtualization
Controls access between virtual guests and host hardware Hypervisor
Cloud solution providing entire virtualized operating system that the customer configures from the OS up IaaS - Infrastructure as a Service
Cloud solution providing a pre-configured operating system in which the customer configures the applications PaaS - Platform as a Service
Cloud solution providing a completely configured system from the operating system to the applications SaaS - Software as a Service
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards