CISSP Flash Cards
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
PSEUDO FLAW | show 🗑
|
||||
NETWORK ASSESSMENT TOOLS | show 🗑
|
||||
show | 1.55MBPS UPSTREAM 1.55MBPS DOWNSTREAM
🗑
|
||||
show | CLARK-WILSON
🗑
|
||||
show | LINK LAYER
🗑
|
||||
SET | show 🗑
|
||||
show | LATTICE MODEL
🗑
|
||||
WATER | show 🗑
|
||||
CO2 | show 🗑
|
||||
HALON | show 🗑
|
||||
SODA ACID | show 🗑
|
||||
show | LABELS
🗑
|
||||
show | FLIGHT TIME AND DWELL TIME
🗑
|
||||
show | SOCKS-et-S CIRCUIT LEVEL
🗑
|
||||
show | 16 BITS
🗑
|
||||
show | TCSEC, BELL-LAPADULA, MAC, CONFIDENTIALITY
🗑
|
||||
RED BOOK | show 🗑
|
||||
GREEN BOOK | show 🗑
|
||||
TEMPERATURE THAT DAMAGES MAGNETIC MEDIA | show 🗑
|
||||
FAR | show 🗑
|
||||
FRR | show 🗑
|
||||
PROLONGED HIGH VOLTAGE | show 🗑
|
||||
show | A1
🗑
|
||||
RED BOX | show 🗑
|
||||
BLUE BOX | show 🗑
|
||||
BLACK BOX | show 🗑
|
||||
FRAGMENTATION | show 🗑
|
||||
UNIX SYSTEM PASSWORDS | show 🗑
|
||||
ABSTRACT MACHINE THAT MEDIATES ALL ACCESS BETWEEN SUBJECTS AND OBJECTS | show 🗑
|
||||
DISCOURAGE | show 🗑
|
||||
show | ASYMMETRIC ENCRYPTION USED FOR AUTHENTICATION, DIGITAL SIGNATURES, ENCRYPTION. BASED ON DIFFICULTY IN FACTORING LARGE PRIME NUMBERS
🗑
|
||||
show | IRIS
🗑
|
||||
show | KEY IS SECRET,ALGORITHM IS KNOWN
🗑
|
||||
show | DEGREE
🗑
|
||||
show | MINUTIA MATCHING
🗑
|
||||
show | CLIPPING LEVEL
🗑
|
||||
show | SET
🗑
|
||||
CLARK WILSON, BIBA | show 🗑
|
||||
show | 128 BITS
🗑
|
||||
SHA-1 SIZE OF DIGEST | show 🗑
|
||||
show | B1
🗑
|
||||
show | BYPASSES REFERENCE MODEL
🗑
|
||||
show | APPARENT LOOPHOLE DELIBERATELY IMPLANTED
🗑
|
||||
show | ISS, SATAN, BALLISTA
🗑
|
||||
show | 1.55MBPS UPSTREAM 1.55MBPS DOWNSTREAM
🗑
|
||||
CONSTRAINED DATA ITEM | show 🗑
|
||||
show | LINK LAYER
🗑
|
||||
show | APPLICATION LAYER
🗑
|
||||
LEAST UPPER/GREATEST LOWER | show 🗑
|
||||
WATER | show 🗑
|
||||
CO2 | show 🗑
|
||||
HALON | show 🗑
|
||||
SODA ACID | show 🗑
|
||||
MAC | show 🗑
|
||||
TIME TO SWITCH AND TIME PRESSING KEY | show 🗑
|
||||
show | SOCKS-et-S CIRCUIT LEVEL
🗑
|
||||
show | 16 BITS
🗑
|
||||
ORANGE BOOK | show 🗑
|
||||
RED BOOK | show 🗑
|
||||
show | PASSWORD MANAGEMENT
🗑
|
||||
TEMPERATURE THAT DAMAGES MAGNETIC MEDIA | show 🗑
|
||||
show | FALSE ACCEPTANCE RATE/TYPE II
🗑
|
||||
FRR | show 🗑
|
||||
PROLONGED HIGH VOLTAGE | show 🗑
|
||||
VERIFIED DESIGN | show 🗑
|
||||
RED BOX | show 🗑
|
||||
show | TONE, FREQ FOR LONG DISTANCE
🗑
|
||||
BLACK BOX | show 🗑
|
||||
FRAGMENTATION | show 🗑
|
||||
UNIX SYSTEM PASSWORDS | show 🗑
|
||||
ABSTRACT MACHINE THAT MEDIATES ALL ACCESS BETWEEN SUBJECTS AND OBJECTS | show 🗑
|
||||
show | DETER
🗑
|
||||
RSA | show 🗑
|
||||
BIOMETRIC SYSTEM THAT IS GOOD OVER A LONG PERIOD OF TIME | show 🗑
|
||||
show | KEY IS SECRET,ALGORITHM IS KNOWN
🗑
|
||||
NUMBER OF COLUMNS IN TABLE | show 🗑
|
||||
FINGERPRINT | show 🗑
|
||||
THRESHOLD OR MANAGEABLE LEVEL | show 🗑
|
||||
show | SET
🗑
|
||||
show | INTEGRITY
🗑
|
||||
MD5 SIZE OF DIGEST | show 🗑
|
||||
show | 160 BITS
🗑
|
||||
show | B1
🗑
|
||||
COVERT CHANNEL | show 🗑
|
||||
show | REMANENCE
🗑
|
||||
show | 65536
🗑
|
||||
STOP OR DETER | show 🗑
|
||||
show | LAYER 2, LINK/DATA LINK
🗑
|
||||
A1 | show 🗑
|
||||
show | LABELED
🗑
|
||||
show | STRUCTURED, SEPARATION OF DUTIES
🗑
|
||||
B3 | show 🗑
|
||||
WEB OF TRUST | show 🗑
|
||||
show | DETER
🗑
|
||||
show | AVOID
🗑
|
||||
DETECTIVE | show 🗑
|
||||
DIFFIE-HELLMAN | show 🗑
|
||||
ECC | show 🗑
|
||||
show | STORAGE, TIMING
🗑
|
||||
PASSWORD-TWO UNRELATED WORDS | show 🗑
|
||||
show | CLARK-WILSON
🗑
|
||||
ICMP, IGMP, IPX, IPSEC, WHAT LAYER | show 🗑
|
||||
SATISFY REAL WORLD REQUIREMENTS | show 🗑
|
||||
COUNTRY FAILS TO LEGALLY PROTECT PERSONAL DATA | show 🗑
|
||||
show | FLEXIBILITY
🗑
|
||||
show | HIGH COHESION AND LOW COUPLING
🗑
|
||||
COHESION | show 🗑
|
||||
show | INTERACTION REQUIRED
🗑
|
||||
show | LIKELIHOOD
🗑
|
||||
show | 6
🗑
|
||||
IP HEADER-ICMP NUMBER | show 🗑
|
||||
show | 2
🗑
|
||||
show | 17
🗑
|
||||
IMPORTANT FOR EVIDENCE | show 🗑
|
||||
show | TUPLE
🗑
|
||||
show | DUAL BACKBONE
🗑
|
||||
DRAW CONCLUSIONS | show 🗑
|
||||
SUSTAINING-DURING AND AFTER | show 🗑
|
||||
FIRST STEP | show 🗑
|
||||
show | PROCEDURE
🗑
|
||||
show | GUIDELINES
🗑
|
||||
show | MORE GRANULAR
🗑
|
||||
CONTENT DEPENDENT-DISADVANTAGE | show 🗑
|
||||
show | CAPACITANCE DETECTOR
🗑
|
||||
show | ELECTRONIC VAULTING
🗑
|
||||
CELL PHONE-PREVENT MONITORING | show 🗑
|
||||
show | DETECTIVE
🗑
|
||||
LINUX, PREVENTS USERS FROM SEEING DATA | show 🗑
|
||||
show | TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC)
🗑
|
||||
show | NETWORK ACCESS SERVER (NAS)
🗑
|
||||
show | SHIMMING
🗑
|
||||
show | 16
🗑
|
||||
show | FLASK FLUX ADVANCED SECURITY KERNEL
🗑
|
||||
show | WATERMARK
🗑
|
||||
PROPER LIFECYCLE OF EVIDENCE | show 🗑
|
||||
ALGORITHMS BASED ON DISCRETE LOGARITHMS | show 🗑
|
||||
show | BACKUP TO JUKEBOX
🗑
|
||||
NUMBER OF COMBINATIONS FOR A NUMERIC PASSWORD THAT IS 1-4 DIGITS | show 🗑
|
||||
show | MORE EFFICIENT LOG-ON
🗑
|
||||
ACCOUNTABILITY=TRACED BACK TO | show 🗑
|
||||
IPSEC LAYER AND PROTOCOLS USED | show 🗑
|
||||
REASONABLE MEASURES TO ENSURE | show 🗑
|
||||
show | DUE CARE, DUE DILIGENCE
🗑
|
||||
SINGLE UNIT OF ETHERNET DATA | show 🗑
|
||||
show | FORMULATION OF SPECIFIC MANAGEMENT OBJECTIVES
🗑
|
||||
show | 1 PROCESS SIGNALS ANOTHER BY MODIFYING ITS OWN USE OF SYSTEM RESOURCES
🗑
|
||||
show | PRIORITIZES RISK
🗑
|
||||
show | 1024-49151
🗑
|
||||
show | 1-1023
🗑
|
||||
show | 49152-65535
🗑
|
||||
show | 2B AND 1D
🗑
|
||||
WITH PUBLIC KEY CRYPTOGRAPHY, FOR CONFIDENTIALITY, WHICH KEY IS USED FIRST | show 🗑
|
||||
show | SENDER'S PRIVATE KEY
🗑
|
||||
INTEGRITY | show 🗑
|
||||
GUARDS | show 🗑
|
||||
show | KERBEROS, SESAME, KRYPTOKNIGHT
🗑
|
||||
KERBEROS | show 🗑
|
||||
EVIDENCE MUST BE | show 🗑
|
||||
PACKET FILTERING FIREWALL (GENERATION) | show 🗑
|
||||
show | 2
🗑
|
||||
show | 3
🗑
|
||||
DYNAMIC PACKET FILTERING FIREWALL (GENERATION) | show 🗑
|
||||
show | 5
🗑
|
||||
TRINOO/TRIN00 | show 🗑
|
||||
AUTOMATICALLY LEAVES SYSTEM PROCESSES & COMPONENTS IN A SECURE STATE AFTER FAILURE | show 🗑
|
||||
MOST CRUCIAL LINK IN THE COMPUTER SECURITY CHAIN | show 🗑
|
||||
show | DATA OWNER
🗑
|
||||
SCHEMA | show 🗑
|
||||
RELATION | show 🗑
|
||||
show | NUMBER OF COLUMNS
🗑
|
||||
show | NUMBER OF ROWS IN A RELATION, HOW TABLES LINK TO ONE ANOTHER
🗑
|
||||
CONTINGENCY PLAN SHOULD ADDRESS | show 🗑
|
||||
show | TCSEC
🗑
|
||||
show | TRUSTED FRONT-END
🗑
|
||||
SCRAMBLED | show 🗑
|
||||
REPLACED | show 🗑
|
||||
show | STEGANOGRAPHY
🗑
|
||||
show | CONCEALMENT
🗑
|
||||
BOOK, PAGE, PARAGRAPH, ETC?.. | show 🗑
|
||||
show | CLARK-WILSON
🗑
|
||||
show | BIT LEVEL, BIT-BY-BIT
🗑
|
||||
ADDED TO PASSWORDS TO INCREASE RANDOMNESS | show 🗑
|
||||
show | 5 (SESSION)
🗑
|
||||
show | IMPLEMENTATION
🗑
|
||||
MIDDLE CASE | show 🗑
|
||||
show | EXECUTIVES/PLANNING
🗑
|
||||
ICASE | show 🗑
|
||||
show | NEURAL NETWORK
🗑
|
||||
AUDIT TRAILS | show 🗑
|
||||
HIPPA | show 🗑
|
||||
show | WHITE BOX
🗑
|
||||
SOFTWARE TESTING (EXTERNAL) | show 🗑
|
||||
show | ACCREDITATION
🗑
|
||||
show | TRADE-SECRET
🗑
|
||||
show | WRITTEN TO REPORT AND REVIEWED
🗑
|
||||
show | DATA NORMALIZATION
🗑
|
||||
MAY RENDER TOKEN UNUSABLE | show 🗑
|
||||
ACV | show 🗑
|
||||
SET | show 🗑
|
||||
show | WTLS IS DECRYPTED AT THE CARRIERS WAP GATEWAY TO RE-ENCRYPT WITH SSL FOR WIRED NETWORKS
🗑
|
||||
PASSWORD CRACKERS USE | show 🗑
|
||||
CHAIN OF CUSTODY SHOWS | show 🗑
|
||||
show | INTEGRITY, DIGITAL SIGNATURE & AUTHENTICATION, NOT ENCRYPTION
🗑
|
||||
show | LOAD BALANCING, DISK REPLICATION
🗑
|
||||
ALL RECOVERY PLANS | show 🗑
|
||||
MAIN REASON FOR CCTV | show 🗑
|
||||
PROTECT AGAINST BRUTE-FORCE ATTACK | show 🗑
|
||||
FORMAL DESCRIPTION OF SECURITY POLICY | show 🗑
|
||||
ONE-WAY HASH | show 🗑
|
||||
X.509 | show 🗑
|
||||
show | COSTLY TO MANAGE
🗑
|
||||
show | INFORMATION LABELS
🗑
|
||||
ACT OF VALIDATING USER | show 🗑
|
||||
SALARY LEVELS-CLASSIFICATION IN PRIVATE SECTOR | show 🗑
|
||||
PROTECTION PROFILE | show 🗑
|
||||
ORANGE BOOK | show 🗑
|
||||
show | DES-EDE3
🗑
|
||||
show | 48-BIT, ALSO CALLED HARDWARE ADDRESS
🗑
|
||||
show | 32-BIT
🗑
|
||||
MTO | show 🗑
|
||||
show | FIXED CELL SIZE
🗑
|
||||
CONFLICT OF INTEREST, SUBJECT, COMPANY DATASETS = WHAT MODEL | show 🗑
|
||||
show | EIGEN FEATURES OF EIGEN FACES
🗑
|
||||
show | ADMINISTRATORS
🗑
|
||||
show | CONFIDENTIALITY
🗑
|
||||
show | MULTI-LEVEL
🗑
|
||||
DATA DICTIONARY | show 🗑
|
||||
TECHNIQUE FOR ARTIFICIAL INTELLIGENCE | show 🗑
|
||||
show | SMALL QUERY SETS
🗑
|
||||
show | BIA
🗑
|
||||
CONTROL TECHNIQUE REQUIRES SEPARATE ENTITIES OPERATING IN CONCERT | show 🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
Bob Smythe
Popular Computers sets