Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

CISSP Flash Cards

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
PSEUDO FLAW   show
🗑
NETWORK ASSESSMENT TOOLS   show
🗑
show 1.55MBPS UPSTREAM 1.55MBPS DOWNSTREAM  
🗑
show CLARK-WILSON  
🗑
show LINK LAYER  
🗑
SET   show
🗑
show LATTICE MODEL  
🗑
WATER   show
🗑
CO2   show
🗑
HALON   show
🗑
SODA ACID   show
🗑
show LABELS  
🗑
show FLIGHT TIME AND DWELL TIME  
🗑
show SOCKS-et-S CIRCUIT LEVEL  
🗑
show 16 BITS  
🗑
show TCSEC, BELL-LAPADULA, MAC, CONFIDENTIALITY  
🗑
RED BOOK   show
🗑
GREEN BOOK   show
🗑
TEMPERATURE THAT DAMAGES MAGNETIC MEDIA   show
🗑
FAR   show
🗑
FRR   show
🗑
PROLONGED HIGH VOLTAGE   show
🗑
show A1  
🗑
RED BOX   show
🗑
BLUE BOX   show
🗑
BLACK BOX   show
🗑
FRAGMENTATION   show
🗑
UNIX SYSTEM PASSWORDS   show
🗑
ABSTRACT MACHINE THAT MEDIATES ALL ACCESS BETWEEN SUBJECTS AND OBJECTS   show
🗑
DISCOURAGE   show
🗑
show ASYMMETRIC ENCRYPTION USED FOR AUTHENTICATION, DIGITAL SIGNATURES, ENCRYPTION. BASED ON DIFFICULTY IN FACTORING LARGE PRIME NUMBERS  
🗑
show IRIS  
🗑
show KEY IS SECRET,ALGORITHM IS KNOWN  
🗑
show DEGREE  
🗑
show MINUTIA MATCHING  
🗑
show CLIPPING LEVEL  
🗑
show SET  
🗑
CLARK WILSON, BIBA   show
🗑
show 128 BITS  
🗑
SHA-1 SIZE OF DIGEST   show
🗑
show B1  
🗑
show BYPASSES REFERENCE MODEL  
🗑
show APPARENT LOOPHOLE DELIBERATELY IMPLANTED  
🗑
show ISS, SATAN, BALLISTA  
🗑
show 1.55MBPS UPSTREAM 1.55MBPS DOWNSTREAM  
🗑
CONSTRAINED DATA ITEM   show
🗑
show LINK LAYER  
🗑
show APPLICATION LAYER  
🗑
LEAST UPPER/GREATEST LOWER   show
🗑
WATER   show
🗑
CO2   show
🗑
HALON   show
🗑
SODA ACID   show
🗑
MAC   show
🗑
TIME TO SWITCH AND TIME PRESSING KEY   show
🗑
show SOCKS-et-S CIRCUIT LEVEL  
🗑
show 16 BITS  
🗑
ORANGE BOOK   show
🗑
RED BOOK   show
🗑
show PASSWORD MANAGEMENT  
🗑
TEMPERATURE THAT DAMAGES MAGNETIC MEDIA   show
🗑
show FALSE ACCEPTANCE RATE/TYPE II  
🗑
FRR   show
🗑
PROLONGED HIGH VOLTAGE   show
🗑
VERIFIED DESIGN   show
🗑
RED BOX   show
🗑
show TONE, FREQ FOR LONG DISTANCE  
🗑
BLACK BOX   show
🗑
FRAGMENTATION   show
🗑
UNIX SYSTEM PASSWORDS   show
🗑
ABSTRACT MACHINE THAT MEDIATES ALL ACCESS BETWEEN SUBJECTS AND OBJECTS   show
🗑
show DETER  
🗑
RSA   show
🗑
BIOMETRIC SYSTEM THAT IS GOOD OVER A LONG PERIOD OF TIME   show
🗑
show KEY IS SECRET,ALGORITHM IS KNOWN  
🗑
NUMBER OF COLUMNS IN TABLE   show
🗑
FINGERPRINT   show
🗑
THRESHOLD OR MANAGEABLE LEVEL   show
🗑
show SET  
🗑
show INTEGRITY  
🗑
MD5 SIZE OF DIGEST   show
🗑
show 160 BITS  
🗑
show B1  
🗑
COVERT CHANNEL   show
🗑
show REMANENCE  
🗑
show 65536  
🗑
STOP OR DETER   show
🗑
show LAYER 2, LINK/DATA LINK  
🗑
A1   show
🗑
show LABELED  
🗑
show STRUCTURED, SEPARATION OF DUTIES  
🗑
B3   show
🗑
WEB OF TRUST   show
🗑
show DETER  
🗑
show AVOID  
🗑
DETECTIVE   show
🗑
DIFFIE-HELLMAN   show
🗑
ECC   show
🗑
show STORAGE, TIMING  
🗑
PASSWORD-TWO UNRELATED WORDS   show
🗑
show CLARK-WILSON  
🗑
ICMP, IGMP, IPX, IPSEC, WHAT LAYER   show
🗑
SATISFY REAL WORLD REQUIREMENTS   show
🗑
COUNTRY FAILS TO LEGALLY PROTECT PERSONAL DATA   show
🗑
show FLEXIBILITY  
🗑
show HIGH COHESION AND LOW COUPLING  
🗑
COHESION   show
🗑
show INTERACTION REQUIRED  
🗑
show LIKELIHOOD  
🗑
show 6  
🗑
IP HEADER-ICMP NUMBER   show
🗑
show 2  
🗑
show 17  
🗑
IMPORTANT FOR EVIDENCE   show
🗑
show TUPLE  
🗑
show DUAL BACKBONE  
🗑
DRAW CONCLUSIONS   show
🗑
SUSTAINING-DURING AND AFTER   show
🗑
FIRST STEP   show
🗑
show PROCEDURE  
🗑
show GUIDELINES  
🗑
show MORE GRANULAR  
🗑
CONTENT DEPENDENT-DISADVANTAGE   show
🗑
show CAPACITANCE DETECTOR  
🗑
show ELECTRONIC VAULTING  
🗑
CELL PHONE-PREVENT MONITORING   show
🗑
show DETECTIVE  
🗑
LINUX, PREVENTS USERS FROM SEEING DATA   show
🗑
show TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC)  
🗑
show NETWORK ACCESS SERVER (NAS)  
🗑
show SHIMMING  
🗑
show 16  
🗑
show FLASK FLUX ADVANCED SECURITY KERNEL  
🗑
show WATERMARK  
🗑
PROPER LIFECYCLE OF EVIDENCE   show
🗑
ALGORITHMS BASED ON DISCRETE LOGARITHMS   show
🗑
show BACKUP TO JUKEBOX  
🗑
NUMBER OF COMBINATIONS FOR A NUMERIC PASSWORD THAT IS 1-4 DIGITS   show
🗑
show MORE EFFICIENT LOG-ON  
🗑
ACCOUNTABILITY=TRACED BACK TO   show
🗑
IPSEC LAYER AND PROTOCOLS USED   show
🗑
REASONABLE MEASURES TO ENSURE   show
🗑
show DUE CARE, DUE DILIGENCE  
🗑
SINGLE UNIT OF ETHERNET DATA   show
🗑
show FORMULATION OF SPECIFIC MANAGEMENT OBJECTIVES  
🗑
show 1 PROCESS SIGNALS ANOTHER BY MODIFYING ITS OWN USE OF SYSTEM RESOURCES  
🗑
show PRIORITIZES RISK  
🗑
show 1024-49151  
🗑
show 1-1023  
🗑
show 49152-65535  
🗑
show 2B AND 1D  
🗑
WITH PUBLIC KEY CRYPTOGRAPHY, FOR CONFIDENTIALITY, WHICH KEY IS USED FIRST   show
🗑
show SENDER'S PRIVATE KEY  
🗑
INTEGRITY   show
🗑
GUARDS   show
🗑
show KERBEROS, SESAME, KRYPTOKNIGHT  
🗑
KERBEROS   show
🗑
EVIDENCE MUST BE   show
🗑
PACKET FILTERING FIREWALL (GENERATION)   show
🗑
show 2  
🗑
show 3  
🗑
DYNAMIC PACKET FILTERING FIREWALL (GENERATION)   show
🗑
show 5  
🗑
TRINOO/TRIN00   show
🗑
AUTOMATICALLY LEAVES SYSTEM PROCESSES & COMPONENTS IN A SECURE STATE AFTER FAILURE   show
🗑
MOST CRUCIAL LINK IN THE COMPUTER SECURITY CHAIN   show
🗑
show DATA OWNER  
🗑
SCHEMA   show
🗑
RELATION   show
🗑
show NUMBER OF COLUMNS  
🗑
show NUMBER OF ROWS IN A RELATION, HOW TABLES LINK TO ONE ANOTHER  
🗑
CONTINGENCY PLAN SHOULD ADDRESS   show
🗑
show TCSEC  
🗑
show TRUSTED FRONT-END  
🗑
SCRAMBLED   show
🗑
REPLACED   show
🗑
show STEGANOGRAPHY  
🗑
show CONCEALMENT  
🗑
BOOK, PAGE, PARAGRAPH, ETC?..   show
🗑
show CLARK-WILSON  
🗑
show BIT LEVEL, BIT-BY-BIT  
🗑
ADDED TO PASSWORDS TO INCREASE RANDOMNESS   show
🗑
show 5 (SESSION)  
🗑
show IMPLEMENTATION  
🗑
MIDDLE CASE   show
🗑
show EXECUTIVES/PLANNING  
🗑
ICASE   show
🗑
show NEURAL NETWORK  
🗑
AUDIT TRAILS   show
🗑
HIPPA   show
🗑
show WHITE BOX  
🗑
SOFTWARE TESTING (EXTERNAL)   show
🗑
show ACCREDITATION  
🗑
show TRADE-SECRET  
🗑
show WRITTEN TO REPORT AND REVIEWED  
🗑
show DATA NORMALIZATION  
🗑
MAY RENDER TOKEN UNUSABLE   show
🗑
ACV   show
🗑
SET   show
🗑
show WTLS IS DECRYPTED AT THE CARRIERS WAP GATEWAY TO RE-ENCRYPT WITH SSL FOR WIRED NETWORKS  
🗑
PASSWORD CRACKERS USE   show
🗑
CHAIN OF CUSTODY SHOWS   show
🗑
show INTEGRITY, DIGITAL SIGNATURE & AUTHENTICATION, NOT ENCRYPTION  
🗑
show LOAD BALANCING, DISK REPLICATION  
🗑
ALL RECOVERY PLANS   show
🗑
MAIN REASON FOR CCTV   show
🗑
PROTECT AGAINST BRUTE-FORCE ATTACK   show
🗑
FORMAL DESCRIPTION OF SECURITY POLICY   show
🗑
ONE-WAY HASH   show
🗑
X.509   show
🗑
show COSTLY TO MANAGE  
🗑
show INFORMATION LABELS  
🗑
ACT OF VALIDATING USER   show
🗑
SALARY LEVELS-CLASSIFICATION IN PRIVATE SECTOR   show
🗑
PROTECTION PROFILE   show
🗑
ORANGE BOOK   show
🗑
show DES-EDE3  
🗑
show 48-BIT, ALSO CALLED HARDWARE ADDRESS  
🗑
show 32-BIT  
🗑
MTO   show
🗑
show FIXED CELL SIZE  
🗑
CONFLICT OF INTEREST, SUBJECT, COMPANY DATASETS = WHAT MODEL   show
🗑
show EIGEN FEATURES OF EIGEN FACES  
🗑
show ADMINISTRATORS  
🗑
show CONFIDENTIALITY  
🗑
show MULTI-LEVEL  
🗑
DATA DICTIONARY   show
🗑
TECHNIQUE FOR ARTIFICIAL INTELLIGENCE   show
🗑
show SMALL QUERY SETS  
🗑
show BIA  
🗑
CONTROL TECHNIQUE REQUIRES SEPARATE ENTITIES OPERATING IN CONCERT   show
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: Bob Smythe
Popular Computers sets