click below
click below
Normal Size Small Size show me how
CISSP
CISSP Flash Cards
| Question | Answer |
|---|---|
| PSEUDO FLAW | APPARENT LOOPHOLE DELIBERATELY IMPLANTED |
| NETWORK ASSESSMENT TOOLS | ISS, SATAN, BALLISTA |
| HDSL | 1.55MBPS UPSTREAM 1.55MBPS DOWNSTREAM |
| CONSTRAINED DATA ITEM | CLARK-WILSON |
| SLIP, CSLIP, PPP | LINK LAYER |
| SET | APPLICATION LAYER |
| LEAST UPPER/GREATEST LOWER | LATTICE MODEL |
| WATER | COOLS, ALPHA, PRE-ACTION FOR COMPUTER, DRY-PIPE DELAYS WATER |
| CO2 | ELECTRICAL, DISPLACES O2 |
| HALON | INTERRUPTS CHEMICAL REACTION MONTREAL PROTOCOL HARMFUL TO OZONE, HALON BANK |
| SODA ACID | SUPPRESSES FUEL SUPPLY |
| MAC | LABELS |
| TIME TO SWITCH AND TIME PRESSING KEY | FLIGHT TIME AND DWELL TIME |
| SOCKS | SOCKS-et-S CIRCUIT LEVEL |
| TCP/UPD PORT NUMBER LENGTH | 16 BITS |
| ORANGE BOOK | TCSEC, BELL-LAPADULA, MAC, CONFIDENTIALITY |
| RED BOOK | NETWORK |
| GREEN BOOK | PASSWORD MANAGEMENT |
| TEMPERATURE THAT DAMAGES MAGNETIC MEDIA | 100 DEGREES |
| FAR | FALSE ACCEPTANCE RATE/TYPE II |
| FRR | FALSE REJECTION RATE/TYPE I |
| PROLONGED HIGH VOLTAGE | SURGE |
| VERIFIED DESIGN | A1 |
| RED BOX | SOUND OF COINS |
| BLUE BOX | TONE, FREQ FOR LONG DISTANCE |
| BLACK BOX | LINE VOLTAGE, RECEIVER'S END |
| FRAGMENTATION | TEAR DROP |
| UNIX SYSTEM PASSWORDS | ETC/SHADOW OR ETC/PASSWORD |
| ABSTRACT MACHINE THAT MEDIATES ALL ACCESS BETWEEN SUBJECTS AND OBJECTS | REFERENCE MONITOR |
| DISCOURAGE | DETER |
| RSA | ASYMMETRIC ENCRYPTION USED FOR AUTHENTICATION, DIGITAL SIGNATURES, ENCRYPTION. BASED ON DIFFICULTY IN FACTORING LARGE PRIME NUMBERS |
| BIOMETRIC SYSTEM THAT IS GOOD OVER A LONG PERIOD OF TIME | IRIS |
| KERCHOFF | KEY IS SECRET,ALGORITHM IS KNOWN |
| NUMBER OF COLUMNS IN TABLE | DEGREE |
| FINGERPRINT | MINUTIA MATCHING |
| THRESHOLD OR MANAGEABLE LEVEL | CLIPPING LEVEL |
| APPLICATION LAYER, 2 ASYMMETRICAL KEYS -or- 2 DIGITAL CERTIFICATES | SET |
| CLARK WILSON, BIBA | INTEGRITY |
| MD5 SIZE OF DIGEST | 128 BITS |
| SHA-1 SIZE OF DIGEST | 160 BITS |
| FIRST LEVEL TO REQUIRE LABELS | B1 |
| COVERT CHANNEL | BYPASSES REFERENCE MODEL |
| PSEUDO FLAW | APPARENT LOOPHOLE DELIBERATELY IMPLANTED |
| NETWORK ASSESSMENT TOOLS | ISS, SATAN, BALLISTA |
| HDSL | 1.55MBPS UPSTREAM 1.55MBPS DOWNSTREAM |
| CONSTRAINED DATA ITEM | CLARK-WILSON |
| SLIP, CSLIP, PPP | LINK LAYER |
| SET | APPLICATION LAYER |
| LEAST UPPER/GREATEST LOWER | LATTICE MODEL |
| WATER | COOLS, ALPHA, PRE-ACTION FOR COMPUTER, DRY-PIPE DELAYS WATER |
| CO2 | ELECTRICAL, DISPLACES O2 |
| HALON | INTERRUPTS CHEMICAL REACTION MONTREAL PROTOCOL HARMFUL TO OZONE, HALON BANK |
| SODA ACID | SUPPRESSES FUEL SUPPLY |
| MAC | LABELS |
| TIME TO SWITCH AND TIME PRESSING KEY | FLIGHT TIME AND DWELL TIME |
| SOCKS | SOCKS-et-S CIRCUIT LEVEL |
| TCP/UPD PORT NUMBER LENGTH | 16 BITS |
| ORANGE BOOK | TCSEC, BELL-LAPADULA, MAC, CONFIDENTIALITY |
| RED BOOK | NETWORK |
| GREEN BOOK | PASSWORD MANAGEMENT |
| TEMPERATURE THAT DAMAGES MAGNETIC MEDIA | 100 DEGREES |
| FAR | FALSE ACCEPTANCE RATE/TYPE II |
| FRR | FALSE REJECTION RATE/TYPE I |
| PROLONGED HIGH VOLTAGE | SURGE |
| VERIFIED DESIGN | A1 |
| RED BOX | SOUND OF COINS |
| BLUE BOX | TONE, FREQ FOR LONG DISTANCE |
| BLACK BOX | LINE VOLTAGE, RECEIVER'S END |
| FRAGMENTATION | TEAR DROP |
| UNIX SYSTEM PASSWORDS | ETC/SHADOW OR ETC/PASSWORD |
| ABSTRACT MACHINE THAT MEDIATES ALL ACCESS BETWEEN SUBJECTS AND OBJECTS | REFERENCE MONITOR |
| DISCOURAGE | DETER |
| RSA | ASYMMETRIC ENCRYPTION USED FOR AUTHENTICATION, DIGITAL SIGNATURES, ENCRYPTION. BASED ON DIFFICULTY IN FACTORING LARGE PRIME NUMBERS |
| BIOMETRIC SYSTEM THAT IS GOOD OVER A LONG PERIOD OF TIME | IRIS |
| KERCHOFF | KEY IS SECRET,ALGORITHM IS KNOWN |
| NUMBER OF COLUMNS IN TABLE | DEGREE |
| FINGERPRINT | MINUTIA MATCHING |
| THRESHOLD OR MANAGEABLE LEVEL | CLIPPING LEVEL |
| APPLICATION LAYER, 2 ASYMMETRICAL KEYS -or- 2 DIGITAL CERTIFICATES | SET |
| CLARK WILSON, BIBA | INTEGRITY |
| MD5 SIZE OF DIGEST | 128 BITS |
| SHA-1 SIZE OF DIGEST | 160 BITS |
| FIRST LEVEL TO REQUIRE LABELS | B1 |
| COVERT CHANNEL | BYPASSES REFERENCE MODEL |
| DATA LEFT AFTER MEDIA HAS BEEN ERASED | REMANENCE |
| 16 Bits Equals | 65536 |
| STOP OR DETER | PREVENTATIVE |
| PPP, RARP, ARP | LAYER 2, LINK/DATA LINK |
| A1 | VERIFIED |
| B1 | LABELED |
| B2 | STRUCTURED, SEPARATION OF DUTIES |
| B3 | SECURITY DOMAIN |
| WEB OF TRUST | PGP |
| DISCOURAGE | DETER |
| PREVENT | AVOID |
| DETECTIVE | IDENTIFY |
| DIFFIE-HELLMAN | KEY MANAGEMENT/EXCHANGE ONLY, FIRST ASYMMETRIC |
| ECC | MORE EFFICIENT, BETTER FOR SMALL/MOBILE DEVICES, REQUIRES SHORTER KEY LENGTHS |
| COVERT CHANNELS TWO TYPES | STORAGE, TIMING |
| PASSWORD-TWO UNRELATED WORDS | COMPOSITION |
| CONTROLS OBJECTS THROUGH PROGRAMS | CLARK-WILSON |
| ICMP, IGMP, IPX, IPSEC, WHAT LAYER | NETWORK, LAYER 3 |
| SATISFY REAL WORLD REQUIREMENTS | VALIDATION |
| COUNTRY FAILS TO LEGALLY PROTECT PERSONAL DATA | DATA HAVEN, DATA HARBOR |
| DECISION SUPPORT SYSTEM (DSS) PROVIDES | FLEXIBILITY |
| BEST PROGRAMMING HAS | HIGH COHESION AND LOW COUPLING |
| COHESION | ONLY ONE PROCESS OR ONLY RELATED PROCESSES |
| COUPLING | INTERACTION REQUIRED |
| RISK | LIKELIHOOD |
| IP HEADER-TCP NUMBER | 6 |
| IP HEADER-ICMP NUMBER | 1 |
| IP HEADER-IGMP NUMBER | 2 |
| IP HEADER-UDP NUMBER | 17 |
| IMPORTANT FOR EVIDENCE | CHAIN OF CUSTODY |
| DATABASE ROWS | TUPLE |
| NETWORK REDUNDANCY | DUAL BACKBONE |
| DRAW CONCLUSIONS | INFERENCE |
| SUSTAINING-DURING AND AFTER | BUSINESS CONTINUITY PLAN |
| FIRST STEP | POLICY |
| STEP-BY-STEP | PROCEDURE |
| RECOMMENDED | GUIDELINES |
| CONTENT DEPENDENT-ADVANTAGE | MORE GRANULAR |
| CONTENT DEPENDENT-DISADVANTAGE | OVERHEAD |
| PROTECT ONLY WITHIN A FEW INCHES | CAPACITANCE DETECTOR |
| TRANSMIT ONLINE TRANSACTIONS TO REMOTE FACILITY | ELECTRONIC VAULTING |
| CELL PHONE-PREVENT MONITORING | TIME DIVISION MULTIPLEXING |
| CCTV IS MAINLY | DETECTIVE |
| LINUX, PREVENTS USERS FROM SEEING DATA | SHADOW |
| ORANGE BOOK | TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC) |
| RADIUS-ACT AS CLIENT | NETWORK ACCESS SERVER (NAS) |
| LOCK PICKING TECHNIQUE FOR COMBINATION LOCKS | SHIMMING |
| DES NUMBER OF ROUNDS | 16 |
| FLEXIBLE SUPPORT FOR O/S | FLASK FLUX ADVANCED SECURITY KERNEL |
| ID PICTURE, VERIFY AUTHENTICITY ON A DOCUMENT | WATERMARK |
| PROPER LIFECYCLE OF EVIDENCE | COLLECTION, ANALYSIS, STORAGE, PRESENT IN COURT, RETURN TO OWNER |
| ALGORITHMS BASED ON DISCRETE LOGARITHMS | EL GAMAL, DIFFIE-HELLMAN, ECC |
| 24 HOURS A DAY PROCESSING, GOOD ALTERNATIVE TO TAPE BACKUP | BACKUP TO JUKEBOX |
| NUMBER OF COMBINATIONS FOR A NUMERIC PASSWORD THAT IS 1-4 DIGITS | 10,000 COMBOS |
| SSO BENEFIT | MORE EFFICIENT LOG-ON |
| ACCOUNTABILITY=TRACED BACK TO | INDIVIDUAL |
| IPSEC LAYER AND PROTOCOLS USED | L3, AH AND ESP, ESP=INTEGRITY AND CONFIDENTIALITY |
| REASONABLE MEASURES TO ENSURE | DUE CARE |
| LIABILITY | DUE CARE, DUE DILIGENCE |
| SINGLE UNIT OF ETHERNET DATA | FRAME |
| 1ST STEP IN A PENETRATION TEST | FORMULATION OF SPECIFIC MANAGEMENT OBJECTIVES |
| COVERT CHANNEL | 1 PROCESS SIGNALS ANOTHER BY MODIFYING ITS OWN USE OF SYSTEM RESOURCES |
| QUALITATIVE | PRIORITIZES RISK |
| REGISTERED PORTS | 1024-49151 |
| WELL KNOWN PORTS | 1-1023 |
| DYNAMIC AND OR PRIVATE PORTS | 49152-65535 |
| ISDN BRI | 2B AND 1D |
| WITH PUBLIC KEY CRYPTOGRAPHY, FOR CONFIDENTIALITY, WHICH KEY IS USED FIRST | RECEIVER'S PUBLIC KEY |
| WITH PUBLIC KEY CRYPTOGRAPHY, FOR AUTHENTICATION, WHICH KEY IS USED FIRST | SENDER'S PRIVATE KEY |
| INTEGRITY | HASHING |
| GUARDS | DISCRIMINATING JUDGMENT |
| SSO-TYPES | KERBEROS, SESAME, KRYPTOKNIGHT |
| KERBEROS | TICKETS, MIT, PROJECT ATHENA, SYMMETRIC, CONFIDENTIAL & INTEGRITY, 3-HEADED DOG, GREEK MYTHOLOGY |
| EVIDENCE MUST BE | RELEVANT |
| PACKET FILTERING FIREWALL (GENERATION) | 1 |
| APPLICATION LEVEL FIREWALL (GENERATION) | 2 |
| STATEFUL INSPECTION FIREWALL(GENERATION) | 3 |
| DYNAMIC PACKET FILTERING FIREWALL (GENERATION) | 4 |
| KERNEL PROXY FIREWALL (GENERATION) | 5 |
| TRINOO/TRIN00 | DDOS, TRIBAL FLOOD NETWORK |
| AUTOMATICALLY LEAVES SYSTEM PROCESSES & COMPONENTS IN A SECURE STATE AFTER FAILURE | FAIL-SAFE |
| MOST CRUCIAL LINK IN THE COMPUTER SECURITY CHAIN | MANAGEMENT |
| RESPONSIBLE FOR ENSURING PROPER CONTROLS ARE IN-PLACE FOR DATA | DATA OWNER |
| SCHEMA | STRUCTURE |
| RELATION | HOW DATA & SCHEMA ARE RELATED (ASSOCIATED) |
| DEGREE | NUMBER OF COLUMNS |
| CARDINALITY | NUMBER OF ROWS IN A RELATION, HOW TABLES LINK TO ONE ANOTHER |
| CONTINGENCY PLAN SHOULD ADDRESS | RESIDUAL RISK |
| LEAST PRIVILEGE-MODEL | TCSEC |
| RETROFITTING SECURITY FOR A DATABASE | TRUSTED FRONT-END |
| SCRAMBLED | TRANSPOSITION |
| REPLACED | SUBSTITUTION |
| HIDE IN MEDIA (PICTURES) | STEGANOGRAPHY |
| EVERY X NUMBER OF WORDS IS PART OF REAL MESSAGE | CONCEALMENT |
| BOOK, PAGE, PARAGRAPH, ETC?.. | RUNNING |
| CERTIFICATION RULES & ENFORCEMENT RULES (MODEL) | CLARK-WILSON |
| FORENSIC DISK BACK-UP | BIT LEVEL, BIT-BY-BIT |
| ADDED TO PASSWORDS TO INCREASE RANDOMNESS | SALTS |
| RPC OSI LAYER | 5 (SESSION) |
| LOWER CASE | IMPLEMENTATION |
| MIDDLE CASE | ANALYSIS & DESIGN |
| UPPER CASE | EXECUTIVES/PLANNING |
| ICASE | COMBINED (L,M,U) ALSO CALLED INTEGRATED CASE |
| ARTIFICIAL INTELLIGENCE/LEARN FROM EXPERIENCE | NEURAL NETWORK |
| AUDIT TRAILS | DETECTIVE/TECHNICAL |
| HIPPA | SECURITY & PRIVACY |
| SOFTWARE TESTING (INTERNAL) | WHITE BOX |
| SOFTWARE TESTING (EXTERNAL) | BLACK BOX |
| FORMAL ACCEPTANCE | ACCREDITATION |
| PROPRIETARY & IMPORTANT TO SURVIVAL | TRADE-SECRET |
| INVALID TRANSACTIONS SHOULD BE | WRITTEN TO REPORT AND REVIEWED |
| ATTRIBUTES IN A TABLE DEPEND ONLY ON PRIMARY KEY | DATA NORMALIZATION |
| MAY RENDER TOKEN UNUSABLE | BATTERY LIFESPAN |
| ACV | ACTUAL COST VALUE, VALUE OF ITEM ON THE DATE OF LOSS + 10 % |
| SET | VISA, MASTERCARD, INTERNET, CREDIT CARD PROTOCOL, USED DIGITAL SIGNATURES |
| WAP GAP | WTLS IS DECRYPTED AT THE CARRIERS WAP GATEWAY TO RE-ENCRYPT WITH SSL FOR WIRED NETWORKS |
| PASSWORD CRACKERS USE | COMPARATIVE ANALYSIS |
| CHAIN OF CUSTODY SHOWS | WHO: OBTAINED AND SECURED EVIDENCE |
| DIGITAL SIGNATURE STANDARD(DSS) PROVIDES | INTEGRITY, DIGITAL SIGNATURE & AUTHENTICATION, NOT ENCRYPTION |
| HIGH AVAILABILITY-SERVER | LOAD BALANCING, DISK REPLICATION |
| ALL RECOVERY PLANS | BECOME OBSOLETE QUICKLY |
| MAIN REASON FOR CCTV | INCREASE GUARD VISIBILITY |
| PROTECT AGAINST BRUTE-FORCE ATTACK | ACCOUNT LOCK-OUT AFTER 3 UNSUCCESSFUL ATTEMPTS |
| FORMAL DESCRIPTION OF SECURITY POLICY | ACCESS CONTROL MODULE |
| ONE-WAY HASH | DIFFERENT DIGEST FOR DIFFERENT DATA, VARIABLE INPUT-FIXED OUTPUT GIVEN DIGEST, COMPUTATIONALLY INFEASIBLE TO FIND CORRESPONDING MESSAGE |
| X.509 | DIGITAL CERTIFICATES |
| HOST-BASED IDS-DISADVANTAGE | COSTLY TO MANAGE |
| SECURITY REQUIREMENT UNIQUE TO COMPARTMENTED WORKSTATION | INFORMATION LABELS |
| ACT OF VALIDATING USER | AUTHENTICATION |
| SALARY LEVELS-CLASSIFICATION IN PRIVATE SECTOR | PRIVATE |
| PROTECTION PROFILE | COMMON CRITERIA (CC) |
| ORANGE BOOK | SECURITY TESTING, DESIGN SPECIFICATION & TESTING, TRUSTED DISTRIBUTION, NOT SYSTEM INTEGRITY |
| MOST SECURE FORM OF 3DES | DES-EDE3 |
| MAC ADDRESS SIZE | 48-BIT, ALSO CALLED HARDWARE ADDRESS |
| IPV4 ADDRESS SIZE IN BITS | 32-BIT |
| MTO | MAXIMUM TOLERABLE DOWNTIME, MAX DELAY BUSINESS CAN TOLERATE & STILL BE VIABLE |
| ATM | FIXED CELL SIZE |
| CONFLICT OF INTEREST, SUBJECT, COMPANY DATASETS = WHAT MODEL | CHINESE WALL |
| FACIAL IDENTIFICATION | EIGEN FEATURES OF EIGEN FACES |
| MAC CATEGORY OF A RESOURCE CAN BE ONLY BE CHANGED BY | ADMINISTRATORS |
| STATE MACHINE MODEL IS BEST FOR | CONFIDENTIALITY |
| BELL-LAPADULA (BLP) SECURITY MODE WITH HIGHEST RISK | MULTI-LEVEL |
| DATA DICTIONARY | CONTROL & MANAGE DATA FROM A CENTRAL LOCATION |
| TECHNIQUE FOR ARTIFICIAL INTELLIGENCE | CYCLIC-BASED REASONING STATEMENT |
| NOT EFFECTIVE DETERRENT AGAINST DATABASE INFERENCE ATTACKS | SMALL QUERY SETS |
| BUSINESS CONTINUITY PLAN DEVELOPMENT DEPENDS ON | BIA |
| CONTROL TECHNIQUE REQUIRES SEPARATE ENTITIES OPERATING IN CONCERT | DUAL CONTROL |