Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CISSP

CISSP Flash Cards

QuestionAnswer
PSEUDO FLAW APPARENT LOOPHOLE DELIBERATELY IMPLANTED
NETWORK ASSESSMENT TOOLS ISS, SATAN, BALLISTA
HDSL 1.55MBPS UPSTREAM 1.55MBPS DOWNSTREAM
CONSTRAINED DATA ITEM CLARK-WILSON
SLIP, CSLIP, PPP LINK LAYER
SET APPLICATION LAYER
LEAST UPPER/GREATEST LOWER LATTICE MODEL
WATER COOLS, ALPHA, PRE-ACTION FOR COMPUTER, DRY-PIPE DELAYS WATER
CO2 ELECTRICAL, DISPLACES O2
HALON INTERRUPTS CHEMICAL REACTION MONTREAL PROTOCOL HARMFUL TO OZONE, HALON BANK
SODA ACID SUPPRESSES FUEL SUPPLY
MAC LABELS
TIME TO SWITCH AND TIME PRESSING KEY FLIGHT TIME AND DWELL TIME
SOCKS SOCKS-et-S CIRCUIT LEVEL
TCP/UPD PORT NUMBER LENGTH 16 BITS
ORANGE BOOK TCSEC, BELL-LAPADULA, MAC, CONFIDENTIALITY
RED BOOK NETWORK
GREEN BOOK PASSWORD MANAGEMENT
TEMPERATURE THAT DAMAGES MAGNETIC MEDIA 100 DEGREES
FAR FALSE ACCEPTANCE RATE/TYPE II
FRR FALSE REJECTION RATE/TYPE I
PROLONGED HIGH VOLTAGE SURGE
VERIFIED DESIGN A1
RED BOX SOUND OF COINS
BLUE BOX TONE, FREQ FOR LONG DISTANCE
BLACK BOX LINE VOLTAGE, RECEIVER'S END
FRAGMENTATION TEAR DROP
UNIX SYSTEM PASSWORDS ETC/SHADOW OR ETC/PASSWORD
ABSTRACT MACHINE THAT MEDIATES ALL ACCESS BETWEEN SUBJECTS AND OBJECTS REFERENCE MONITOR
DISCOURAGE DETER
RSA ASYMMETRIC ENCRYPTION USED FOR AUTHENTICATION, DIGITAL SIGNATURES, ENCRYPTION. BASED ON DIFFICULTY IN FACTORING LARGE PRIME NUMBERS
BIOMETRIC SYSTEM THAT IS GOOD OVER A LONG PERIOD OF TIME IRIS
KERCHOFF KEY IS SECRET,ALGORITHM IS KNOWN
NUMBER OF COLUMNS IN TABLE DEGREE
FINGERPRINT MINUTIA MATCHING
THRESHOLD OR MANAGEABLE LEVEL CLIPPING LEVEL
APPLICATION LAYER, 2 ASYMMETRICAL KEYS -or- 2 DIGITAL CERTIFICATES SET
CLARK WILSON, BIBA INTEGRITY
MD5 SIZE OF DIGEST 128 BITS
SHA-1 SIZE OF DIGEST 160 BITS
FIRST LEVEL TO REQUIRE LABELS B1
COVERT CHANNEL BYPASSES REFERENCE MODEL
PSEUDO FLAW APPARENT LOOPHOLE DELIBERATELY IMPLANTED
NETWORK ASSESSMENT TOOLS ISS, SATAN, BALLISTA
HDSL 1.55MBPS UPSTREAM 1.55MBPS DOWNSTREAM
CONSTRAINED DATA ITEM CLARK-WILSON
SLIP, CSLIP, PPP LINK LAYER
SET APPLICATION LAYER
LEAST UPPER/GREATEST LOWER LATTICE MODEL
WATER COOLS, ALPHA, PRE-ACTION FOR COMPUTER, DRY-PIPE DELAYS WATER
CO2 ELECTRICAL, DISPLACES O2
HALON INTERRUPTS CHEMICAL REACTION MONTREAL PROTOCOL HARMFUL TO OZONE, HALON BANK
SODA ACID SUPPRESSES FUEL SUPPLY
MAC LABELS
TIME TO SWITCH AND TIME PRESSING KEY FLIGHT TIME AND DWELL TIME
SOCKS SOCKS-et-S CIRCUIT LEVEL
TCP/UPD PORT NUMBER LENGTH 16 BITS
ORANGE BOOK TCSEC, BELL-LAPADULA, MAC, CONFIDENTIALITY
RED BOOK NETWORK
GREEN BOOK PASSWORD MANAGEMENT
TEMPERATURE THAT DAMAGES MAGNETIC MEDIA 100 DEGREES
FAR FALSE ACCEPTANCE RATE/TYPE II
FRR FALSE REJECTION RATE/TYPE I
PROLONGED HIGH VOLTAGE SURGE
VERIFIED DESIGN A1
RED BOX SOUND OF COINS
BLUE BOX TONE, FREQ FOR LONG DISTANCE
BLACK BOX LINE VOLTAGE, RECEIVER'S END
FRAGMENTATION TEAR DROP
UNIX SYSTEM PASSWORDS ETC/SHADOW OR ETC/PASSWORD
ABSTRACT MACHINE THAT MEDIATES ALL ACCESS BETWEEN SUBJECTS AND OBJECTS REFERENCE MONITOR
DISCOURAGE DETER
RSA ASYMMETRIC ENCRYPTION USED FOR AUTHENTICATION, DIGITAL SIGNATURES, ENCRYPTION. BASED ON DIFFICULTY IN FACTORING LARGE PRIME NUMBERS
BIOMETRIC SYSTEM THAT IS GOOD OVER A LONG PERIOD OF TIME IRIS
KERCHOFF KEY IS SECRET,ALGORITHM IS KNOWN
NUMBER OF COLUMNS IN TABLE DEGREE
FINGERPRINT MINUTIA MATCHING
THRESHOLD OR MANAGEABLE LEVEL CLIPPING LEVEL
APPLICATION LAYER, 2 ASYMMETRICAL KEYS -or- 2 DIGITAL CERTIFICATES SET
CLARK WILSON, BIBA INTEGRITY
MD5 SIZE OF DIGEST 128 BITS
SHA-1 SIZE OF DIGEST 160 BITS
FIRST LEVEL TO REQUIRE LABELS B1
COVERT CHANNEL BYPASSES REFERENCE MODEL
DATA LEFT AFTER MEDIA HAS BEEN ERASED REMANENCE
16 Bits Equals 65536
STOP OR DETER PREVENTATIVE
PPP, RARP, ARP LAYER 2, LINK/DATA LINK
A1 VERIFIED
B1 LABELED
B2 STRUCTURED, SEPARATION OF DUTIES
B3 SECURITY DOMAIN
WEB OF TRUST PGP
DISCOURAGE DETER
PREVENT AVOID
DETECTIVE IDENTIFY
DIFFIE-HELLMAN KEY MANAGEMENT/EXCHANGE ONLY, FIRST ASYMMETRIC
ECC MORE EFFICIENT, BETTER FOR SMALL/MOBILE DEVICES, REQUIRES SHORTER KEY LENGTHS
COVERT CHANNELS TWO TYPES STORAGE, TIMING
PASSWORD-TWO UNRELATED WORDS COMPOSITION
CONTROLS OBJECTS THROUGH PROGRAMS CLARK-WILSON
ICMP, IGMP, IPX, IPSEC, WHAT LAYER NETWORK, LAYER 3
SATISFY REAL WORLD REQUIREMENTS VALIDATION
COUNTRY FAILS TO LEGALLY PROTECT PERSONAL DATA DATA HAVEN, DATA HARBOR
DECISION SUPPORT SYSTEM (DSS) PROVIDES FLEXIBILITY
BEST PROGRAMMING HAS HIGH COHESION AND LOW COUPLING
COHESION ONLY ONE PROCESS OR ONLY RELATED PROCESSES
COUPLING INTERACTION REQUIRED
RISK LIKELIHOOD
IP HEADER-TCP NUMBER 6
IP HEADER-ICMP NUMBER 1
IP HEADER-IGMP NUMBER 2
IP HEADER-UDP NUMBER 17
IMPORTANT FOR EVIDENCE CHAIN OF CUSTODY
DATABASE ROWS TUPLE
NETWORK REDUNDANCY DUAL BACKBONE
DRAW CONCLUSIONS INFERENCE
SUSTAINING-DURING AND AFTER BUSINESS CONTINUITY PLAN
FIRST STEP POLICY
STEP-BY-STEP PROCEDURE
RECOMMENDED GUIDELINES
CONTENT DEPENDENT-ADVANTAGE MORE GRANULAR
CONTENT DEPENDENT-DISADVANTAGE OVERHEAD
PROTECT ONLY WITHIN A FEW INCHES CAPACITANCE DETECTOR
TRANSMIT ONLINE TRANSACTIONS TO REMOTE FACILITY ELECTRONIC VAULTING
CELL PHONE-PREVENT MONITORING TIME DIVISION MULTIPLEXING
CCTV IS MAINLY DETECTIVE
LINUX, PREVENTS USERS FROM SEEING DATA SHADOW
ORANGE BOOK TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC)
RADIUS-ACT AS CLIENT NETWORK ACCESS SERVER (NAS)
LOCK PICKING TECHNIQUE FOR COMBINATION LOCKS SHIMMING
DES NUMBER OF ROUNDS 16
FLEXIBLE SUPPORT FOR O/S FLASK FLUX ADVANCED SECURITY KERNEL
ID PICTURE, VERIFY AUTHENTICITY ON A DOCUMENT WATERMARK
PROPER LIFECYCLE OF EVIDENCE COLLECTION, ANALYSIS, STORAGE, PRESENT IN COURT, RETURN TO OWNER
ALGORITHMS BASED ON DISCRETE LOGARITHMS EL GAMAL, DIFFIE-HELLMAN, ECC
24 HOURS A DAY PROCESSING, GOOD ALTERNATIVE TO TAPE BACKUP BACKUP TO JUKEBOX
NUMBER OF COMBINATIONS FOR A NUMERIC PASSWORD THAT IS 1-4 DIGITS 10,000 COMBOS
SSO BENEFIT MORE EFFICIENT LOG-ON
ACCOUNTABILITY=TRACED BACK TO INDIVIDUAL
IPSEC LAYER AND PROTOCOLS USED L3, AH AND ESP, ESP=INTEGRITY AND CONFIDENTIALITY
REASONABLE MEASURES TO ENSURE DUE CARE
LIABILITY DUE CARE, DUE DILIGENCE
SINGLE UNIT OF ETHERNET DATA FRAME
1ST STEP IN A PENETRATION TEST FORMULATION OF SPECIFIC MANAGEMENT OBJECTIVES
COVERT CHANNEL 1 PROCESS SIGNALS ANOTHER BY MODIFYING ITS OWN USE OF SYSTEM RESOURCES
QUALITATIVE PRIORITIZES RISK
REGISTERED PORTS 1024-49151
WELL KNOWN PORTS 1-1023
DYNAMIC AND OR PRIVATE PORTS 49152-65535
ISDN BRI 2B AND 1D
WITH PUBLIC KEY CRYPTOGRAPHY, FOR CONFIDENTIALITY, WHICH KEY IS USED FIRST RECEIVER'S PUBLIC KEY
WITH PUBLIC KEY CRYPTOGRAPHY, FOR AUTHENTICATION, WHICH KEY IS USED FIRST SENDER'S PRIVATE KEY
INTEGRITY HASHING
GUARDS DISCRIMINATING JUDGMENT
SSO-TYPES KERBEROS, SESAME, KRYPTOKNIGHT
KERBEROS TICKETS, MIT, PROJECT ATHENA, SYMMETRIC, CONFIDENTIAL & INTEGRITY, 3-HEADED DOG, GREEK MYTHOLOGY
EVIDENCE MUST BE RELEVANT
PACKET FILTERING FIREWALL (GENERATION) 1
APPLICATION LEVEL FIREWALL (GENERATION) 2
STATEFUL INSPECTION FIREWALL(GENERATION) 3
DYNAMIC PACKET FILTERING FIREWALL (GENERATION) 4
KERNEL PROXY FIREWALL (GENERATION) 5
TRINOO/TRIN00 DDOS, TRIBAL FLOOD NETWORK
AUTOMATICALLY LEAVES SYSTEM PROCESSES & COMPONENTS IN A SECURE STATE AFTER FAILURE FAIL-SAFE
MOST CRUCIAL LINK IN THE COMPUTER SECURITY CHAIN MANAGEMENT
RESPONSIBLE FOR ENSURING PROPER CONTROLS ARE IN-PLACE FOR DATA DATA OWNER
SCHEMA STRUCTURE
RELATION HOW DATA & SCHEMA ARE RELATED (ASSOCIATED)
DEGREE NUMBER OF COLUMNS
CARDINALITY NUMBER OF ROWS IN A RELATION, HOW TABLES LINK TO ONE ANOTHER
CONTINGENCY PLAN SHOULD ADDRESS RESIDUAL RISK
LEAST PRIVILEGE-MODEL TCSEC
RETROFITTING SECURITY FOR A DATABASE TRUSTED FRONT-END
SCRAMBLED TRANSPOSITION
REPLACED SUBSTITUTION
HIDE IN MEDIA (PICTURES) STEGANOGRAPHY
EVERY X NUMBER OF WORDS IS PART OF REAL MESSAGE CONCEALMENT
BOOK, PAGE, PARAGRAPH, ETC?.. RUNNING
CERTIFICATION RULES & ENFORCEMENT RULES (MODEL) CLARK-WILSON
FORENSIC DISK BACK-UP BIT LEVEL, BIT-BY-BIT
ADDED TO PASSWORDS TO INCREASE RANDOMNESS SALTS
RPC OSI LAYER 5 (SESSION)
LOWER CASE IMPLEMENTATION
MIDDLE CASE ANALYSIS & DESIGN
UPPER CASE EXECUTIVES/PLANNING
ICASE COMBINED (L,M,U) ALSO CALLED INTEGRATED CASE
ARTIFICIAL INTELLIGENCE/LEARN FROM EXPERIENCE NEURAL NETWORK
AUDIT TRAILS DETECTIVE/TECHNICAL
HIPPA SECURITY & PRIVACY
SOFTWARE TESTING (INTERNAL) WHITE BOX
SOFTWARE TESTING (EXTERNAL) BLACK BOX
FORMAL ACCEPTANCE ACCREDITATION
PROPRIETARY & IMPORTANT TO SURVIVAL TRADE-SECRET
INVALID TRANSACTIONS SHOULD BE WRITTEN TO REPORT AND REVIEWED
ATTRIBUTES IN A TABLE DEPEND ONLY ON PRIMARY KEY DATA NORMALIZATION
MAY RENDER TOKEN UNUSABLE BATTERY LIFESPAN
ACV ACTUAL COST VALUE, VALUE OF ITEM ON THE DATE OF LOSS + 10 %
SET VISA, MASTERCARD, INTERNET, CREDIT CARD PROTOCOL, USED DIGITAL SIGNATURES
WAP GAP WTLS IS DECRYPTED AT THE CARRIERS WAP GATEWAY TO RE-ENCRYPT WITH SSL FOR WIRED NETWORKS
PASSWORD CRACKERS USE COMPARATIVE ANALYSIS
CHAIN OF CUSTODY SHOWS WHO: OBTAINED AND SECURED EVIDENCE
DIGITAL SIGNATURE STANDARD(DSS) PROVIDES INTEGRITY, DIGITAL SIGNATURE & AUTHENTICATION, NOT ENCRYPTION
HIGH AVAILABILITY-SERVER LOAD BALANCING, DISK REPLICATION
ALL RECOVERY PLANS BECOME OBSOLETE QUICKLY
MAIN REASON FOR CCTV INCREASE GUARD VISIBILITY
PROTECT AGAINST BRUTE-FORCE ATTACK ACCOUNT LOCK-OUT AFTER 3 UNSUCCESSFUL ATTEMPTS
FORMAL DESCRIPTION OF SECURITY POLICY ACCESS CONTROL MODULE
ONE-WAY HASH DIFFERENT DIGEST FOR DIFFERENT DATA, VARIABLE INPUT-FIXED OUTPUT GIVEN DIGEST, COMPUTATIONALLY INFEASIBLE TO FIND CORRESPONDING MESSAGE
X.509 DIGITAL CERTIFICATES
HOST-BASED IDS-DISADVANTAGE COSTLY TO MANAGE
SECURITY REQUIREMENT UNIQUE TO COMPARTMENTED WORKSTATION INFORMATION LABELS
ACT OF VALIDATING USER AUTHENTICATION
SALARY LEVELS-CLASSIFICATION IN PRIVATE SECTOR PRIVATE
PROTECTION PROFILE COMMON CRITERIA (CC)
ORANGE BOOK SECURITY TESTING, DESIGN SPECIFICATION & TESTING, TRUSTED DISTRIBUTION, NOT SYSTEM INTEGRITY
MOST SECURE FORM OF 3DES DES-EDE3
MAC ADDRESS SIZE 48-BIT, ALSO CALLED HARDWARE ADDRESS
IPV4 ADDRESS SIZE IN BITS 32-BIT
MTO MAXIMUM TOLERABLE DOWNTIME, MAX DELAY BUSINESS CAN TOLERATE & STILL BE VIABLE
ATM FIXED CELL SIZE
CONFLICT OF INTEREST, SUBJECT, COMPANY DATASETS = WHAT MODEL CHINESE WALL
FACIAL IDENTIFICATION EIGEN FEATURES OF EIGEN FACES
MAC CATEGORY OF A RESOURCE CAN BE ONLY BE CHANGED BY ADMINISTRATORS
STATE MACHINE MODEL IS BEST FOR CONFIDENTIALITY
BELL-LAPADULA (BLP) SECURITY MODE WITH HIGHEST RISK MULTI-LEVEL
DATA DICTIONARY CONTROL & MANAGE DATA FROM A CENTRAL LOCATION
TECHNIQUE FOR ARTIFICIAL INTELLIGENCE CYCLIC-BASED REASONING STATEMENT
NOT EFFECTIVE DETERRENT AGAINST DATABASE INFERENCE ATTACKS SMALL QUERY SETS
BUSINESS CONTINUITY PLAN DEVELOPMENT DEPENDS ON BIA
CONTROL TECHNIQUE REQUIRES SEPARATE ENTITIES OPERATING IN CONCERT DUAL CONTROL
Created by: Bob Smythe
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards