click below
click below
Normal Size Small Size show me how
CISSP
CISSP Flash Cards
Question | Answer |
---|---|
PSEUDO FLAW | APPARENT LOOPHOLE DELIBERATELY IMPLANTED |
NETWORK ASSESSMENT TOOLS | ISS, SATAN, BALLISTA |
HDSL | 1.55MBPS UPSTREAM 1.55MBPS DOWNSTREAM |
CONSTRAINED DATA ITEM | CLARK-WILSON |
SLIP, CSLIP, PPP | LINK LAYER |
SET | APPLICATION LAYER |
LEAST UPPER/GREATEST LOWER | LATTICE MODEL |
WATER | COOLS, ALPHA, PRE-ACTION FOR COMPUTER, DRY-PIPE DELAYS WATER |
CO2 | ELECTRICAL, DISPLACES O2 |
HALON | INTERRUPTS CHEMICAL REACTION MONTREAL PROTOCOL HARMFUL TO OZONE, HALON BANK |
SODA ACID | SUPPRESSES FUEL SUPPLY |
MAC | LABELS |
TIME TO SWITCH AND TIME PRESSING KEY | FLIGHT TIME AND DWELL TIME |
SOCKS | SOCKS-et-S CIRCUIT LEVEL |
TCP/UPD PORT NUMBER LENGTH | 16 BITS |
ORANGE BOOK | TCSEC, BELL-LAPADULA, MAC, CONFIDENTIALITY |
RED BOOK | NETWORK |
GREEN BOOK | PASSWORD MANAGEMENT |
TEMPERATURE THAT DAMAGES MAGNETIC MEDIA | 100 DEGREES |
FAR | FALSE ACCEPTANCE RATE/TYPE II |
FRR | FALSE REJECTION RATE/TYPE I |
PROLONGED HIGH VOLTAGE | SURGE |
VERIFIED DESIGN | A1 |
RED BOX | SOUND OF COINS |
BLUE BOX | TONE, FREQ FOR LONG DISTANCE |
BLACK BOX | LINE VOLTAGE, RECEIVER'S END |
FRAGMENTATION | TEAR DROP |
UNIX SYSTEM PASSWORDS | ETC/SHADOW OR ETC/PASSWORD |
ABSTRACT MACHINE THAT MEDIATES ALL ACCESS BETWEEN SUBJECTS AND OBJECTS | REFERENCE MONITOR |
DISCOURAGE | DETER |
RSA | ASYMMETRIC ENCRYPTION USED FOR AUTHENTICATION, DIGITAL SIGNATURES, ENCRYPTION. BASED ON DIFFICULTY IN FACTORING LARGE PRIME NUMBERS |
BIOMETRIC SYSTEM THAT IS GOOD OVER A LONG PERIOD OF TIME | IRIS |
KERCHOFF | KEY IS SECRET,ALGORITHM IS KNOWN |
NUMBER OF COLUMNS IN TABLE | DEGREE |
FINGERPRINT | MINUTIA MATCHING |
THRESHOLD OR MANAGEABLE LEVEL | CLIPPING LEVEL |
APPLICATION LAYER, 2 ASYMMETRICAL KEYS -or- 2 DIGITAL CERTIFICATES | SET |
CLARK WILSON, BIBA | INTEGRITY |
MD5 SIZE OF DIGEST | 128 BITS |
SHA-1 SIZE OF DIGEST | 160 BITS |
FIRST LEVEL TO REQUIRE LABELS | B1 |
COVERT CHANNEL | BYPASSES REFERENCE MODEL |
PSEUDO FLAW | APPARENT LOOPHOLE DELIBERATELY IMPLANTED |
NETWORK ASSESSMENT TOOLS | ISS, SATAN, BALLISTA |
HDSL | 1.55MBPS UPSTREAM 1.55MBPS DOWNSTREAM |
CONSTRAINED DATA ITEM | CLARK-WILSON |
SLIP, CSLIP, PPP | LINK LAYER |
SET | APPLICATION LAYER |
LEAST UPPER/GREATEST LOWER | LATTICE MODEL |
WATER | COOLS, ALPHA, PRE-ACTION FOR COMPUTER, DRY-PIPE DELAYS WATER |
CO2 | ELECTRICAL, DISPLACES O2 |
HALON | INTERRUPTS CHEMICAL REACTION MONTREAL PROTOCOL HARMFUL TO OZONE, HALON BANK |
SODA ACID | SUPPRESSES FUEL SUPPLY |
MAC | LABELS |
TIME TO SWITCH AND TIME PRESSING KEY | FLIGHT TIME AND DWELL TIME |
SOCKS | SOCKS-et-S CIRCUIT LEVEL |
TCP/UPD PORT NUMBER LENGTH | 16 BITS |
ORANGE BOOK | TCSEC, BELL-LAPADULA, MAC, CONFIDENTIALITY |
RED BOOK | NETWORK |
GREEN BOOK | PASSWORD MANAGEMENT |
TEMPERATURE THAT DAMAGES MAGNETIC MEDIA | 100 DEGREES |
FAR | FALSE ACCEPTANCE RATE/TYPE II |
FRR | FALSE REJECTION RATE/TYPE I |
PROLONGED HIGH VOLTAGE | SURGE |
VERIFIED DESIGN | A1 |
RED BOX | SOUND OF COINS |
BLUE BOX | TONE, FREQ FOR LONG DISTANCE |
BLACK BOX | LINE VOLTAGE, RECEIVER'S END |
FRAGMENTATION | TEAR DROP |
UNIX SYSTEM PASSWORDS | ETC/SHADOW OR ETC/PASSWORD |
ABSTRACT MACHINE THAT MEDIATES ALL ACCESS BETWEEN SUBJECTS AND OBJECTS | REFERENCE MONITOR |
DISCOURAGE | DETER |
RSA | ASYMMETRIC ENCRYPTION USED FOR AUTHENTICATION, DIGITAL SIGNATURES, ENCRYPTION. BASED ON DIFFICULTY IN FACTORING LARGE PRIME NUMBERS |
BIOMETRIC SYSTEM THAT IS GOOD OVER A LONG PERIOD OF TIME | IRIS |
KERCHOFF | KEY IS SECRET,ALGORITHM IS KNOWN |
NUMBER OF COLUMNS IN TABLE | DEGREE |
FINGERPRINT | MINUTIA MATCHING |
THRESHOLD OR MANAGEABLE LEVEL | CLIPPING LEVEL |
APPLICATION LAYER, 2 ASYMMETRICAL KEYS -or- 2 DIGITAL CERTIFICATES | SET |
CLARK WILSON, BIBA | INTEGRITY |
MD5 SIZE OF DIGEST | 128 BITS |
SHA-1 SIZE OF DIGEST | 160 BITS |
FIRST LEVEL TO REQUIRE LABELS | B1 |
COVERT CHANNEL | BYPASSES REFERENCE MODEL |
DATA LEFT AFTER MEDIA HAS BEEN ERASED | REMANENCE |
16 Bits Equals | 65536 |
STOP OR DETER | PREVENTATIVE |
PPP, RARP, ARP | LAYER 2, LINK/DATA LINK |
A1 | VERIFIED |
B1 | LABELED |
B2 | STRUCTURED, SEPARATION OF DUTIES |
B3 | SECURITY DOMAIN |
WEB OF TRUST | PGP |
DISCOURAGE | DETER |
PREVENT | AVOID |
DETECTIVE | IDENTIFY |
DIFFIE-HELLMAN | KEY MANAGEMENT/EXCHANGE ONLY, FIRST ASYMMETRIC |
ECC | MORE EFFICIENT, BETTER FOR SMALL/MOBILE DEVICES, REQUIRES SHORTER KEY LENGTHS |
COVERT CHANNELS TWO TYPES | STORAGE, TIMING |
PASSWORD-TWO UNRELATED WORDS | COMPOSITION |
CONTROLS OBJECTS THROUGH PROGRAMS | CLARK-WILSON |
ICMP, IGMP, IPX, IPSEC, WHAT LAYER | NETWORK, LAYER 3 |
SATISFY REAL WORLD REQUIREMENTS | VALIDATION |
COUNTRY FAILS TO LEGALLY PROTECT PERSONAL DATA | DATA HAVEN, DATA HARBOR |
DECISION SUPPORT SYSTEM (DSS) PROVIDES | FLEXIBILITY |
BEST PROGRAMMING HAS | HIGH COHESION AND LOW COUPLING |
COHESION | ONLY ONE PROCESS OR ONLY RELATED PROCESSES |
COUPLING | INTERACTION REQUIRED |
RISK | LIKELIHOOD |
IP HEADER-TCP NUMBER | 6 |
IP HEADER-ICMP NUMBER | 1 |
IP HEADER-IGMP NUMBER | 2 |
IP HEADER-UDP NUMBER | 17 |
IMPORTANT FOR EVIDENCE | CHAIN OF CUSTODY |
DATABASE ROWS | TUPLE |
NETWORK REDUNDANCY | DUAL BACKBONE |
DRAW CONCLUSIONS | INFERENCE |
SUSTAINING-DURING AND AFTER | BUSINESS CONTINUITY PLAN |
FIRST STEP | POLICY |
STEP-BY-STEP | PROCEDURE |
RECOMMENDED | GUIDELINES |
CONTENT DEPENDENT-ADVANTAGE | MORE GRANULAR |
CONTENT DEPENDENT-DISADVANTAGE | OVERHEAD |
PROTECT ONLY WITHIN A FEW INCHES | CAPACITANCE DETECTOR |
TRANSMIT ONLINE TRANSACTIONS TO REMOTE FACILITY | ELECTRONIC VAULTING |
CELL PHONE-PREVENT MONITORING | TIME DIVISION MULTIPLEXING |
CCTV IS MAINLY | DETECTIVE |
LINUX, PREVENTS USERS FROM SEEING DATA | SHADOW |
ORANGE BOOK | TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC) |
RADIUS-ACT AS CLIENT | NETWORK ACCESS SERVER (NAS) |
LOCK PICKING TECHNIQUE FOR COMBINATION LOCKS | SHIMMING |
DES NUMBER OF ROUNDS | 16 |
FLEXIBLE SUPPORT FOR O/S | FLASK FLUX ADVANCED SECURITY KERNEL |
ID PICTURE, VERIFY AUTHENTICITY ON A DOCUMENT | WATERMARK |
PROPER LIFECYCLE OF EVIDENCE | COLLECTION, ANALYSIS, STORAGE, PRESENT IN COURT, RETURN TO OWNER |
ALGORITHMS BASED ON DISCRETE LOGARITHMS | EL GAMAL, DIFFIE-HELLMAN, ECC |
24 HOURS A DAY PROCESSING, GOOD ALTERNATIVE TO TAPE BACKUP | BACKUP TO JUKEBOX |
NUMBER OF COMBINATIONS FOR A NUMERIC PASSWORD THAT IS 1-4 DIGITS | 10,000 COMBOS |
SSO BENEFIT | MORE EFFICIENT LOG-ON |
ACCOUNTABILITY=TRACED BACK TO | INDIVIDUAL |
IPSEC LAYER AND PROTOCOLS USED | L3, AH AND ESP, ESP=INTEGRITY AND CONFIDENTIALITY |
REASONABLE MEASURES TO ENSURE | DUE CARE |
LIABILITY | DUE CARE, DUE DILIGENCE |
SINGLE UNIT OF ETHERNET DATA | FRAME |
1ST STEP IN A PENETRATION TEST | FORMULATION OF SPECIFIC MANAGEMENT OBJECTIVES |
COVERT CHANNEL | 1 PROCESS SIGNALS ANOTHER BY MODIFYING ITS OWN USE OF SYSTEM RESOURCES |
QUALITATIVE | PRIORITIZES RISK |
REGISTERED PORTS | 1024-49151 |
WELL KNOWN PORTS | 1-1023 |
DYNAMIC AND OR PRIVATE PORTS | 49152-65535 |
ISDN BRI | 2B AND 1D |
WITH PUBLIC KEY CRYPTOGRAPHY, FOR CONFIDENTIALITY, WHICH KEY IS USED FIRST | RECEIVER'S PUBLIC KEY |
WITH PUBLIC KEY CRYPTOGRAPHY, FOR AUTHENTICATION, WHICH KEY IS USED FIRST | SENDER'S PRIVATE KEY |
INTEGRITY | HASHING |
GUARDS | DISCRIMINATING JUDGMENT |
SSO-TYPES | KERBEROS, SESAME, KRYPTOKNIGHT |
KERBEROS | TICKETS, MIT, PROJECT ATHENA, SYMMETRIC, CONFIDENTIAL & INTEGRITY, 3-HEADED DOG, GREEK MYTHOLOGY |
EVIDENCE MUST BE | RELEVANT |
PACKET FILTERING FIREWALL (GENERATION) | 1 |
APPLICATION LEVEL FIREWALL (GENERATION) | 2 |
STATEFUL INSPECTION FIREWALL(GENERATION) | 3 |
DYNAMIC PACKET FILTERING FIREWALL (GENERATION) | 4 |
KERNEL PROXY FIREWALL (GENERATION) | 5 |
TRINOO/TRIN00 | DDOS, TRIBAL FLOOD NETWORK |
AUTOMATICALLY LEAVES SYSTEM PROCESSES & COMPONENTS IN A SECURE STATE AFTER FAILURE | FAIL-SAFE |
MOST CRUCIAL LINK IN THE COMPUTER SECURITY CHAIN | MANAGEMENT |
RESPONSIBLE FOR ENSURING PROPER CONTROLS ARE IN-PLACE FOR DATA | DATA OWNER |
SCHEMA | STRUCTURE |
RELATION | HOW DATA & SCHEMA ARE RELATED (ASSOCIATED) |
DEGREE | NUMBER OF COLUMNS |
CARDINALITY | NUMBER OF ROWS IN A RELATION, HOW TABLES LINK TO ONE ANOTHER |
CONTINGENCY PLAN SHOULD ADDRESS | RESIDUAL RISK |
LEAST PRIVILEGE-MODEL | TCSEC |
RETROFITTING SECURITY FOR A DATABASE | TRUSTED FRONT-END |
SCRAMBLED | TRANSPOSITION |
REPLACED | SUBSTITUTION |
HIDE IN MEDIA (PICTURES) | STEGANOGRAPHY |
EVERY X NUMBER OF WORDS IS PART OF REAL MESSAGE | CONCEALMENT |
BOOK, PAGE, PARAGRAPH, ETC?.. | RUNNING |
CERTIFICATION RULES & ENFORCEMENT RULES (MODEL) | CLARK-WILSON |
FORENSIC DISK BACK-UP | BIT LEVEL, BIT-BY-BIT |
ADDED TO PASSWORDS TO INCREASE RANDOMNESS | SALTS |
RPC OSI LAYER | 5 (SESSION) |
LOWER CASE | IMPLEMENTATION |
MIDDLE CASE | ANALYSIS & DESIGN |
UPPER CASE | EXECUTIVES/PLANNING |
ICASE | COMBINED (L,M,U) ALSO CALLED INTEGRATED CASE |
ARTIFICIAL INTELLIGENCE/LEARN FROM EXPERIENCE | NEURAL NETWORK |
AUDIT TRAILS | DETECTIVE/TECHNICAL |
HIPPA | SECURITY & PRIVACY |
SOFTWARE TESTING (INTERNAL) | WHITE BOX |
SOFTWARE TESTING (EXTERNAL) | BLACK BOX |
FORMAL ACCEPTANCE | ACCREDITATION |
PROPRIETARY & IMPORTANT TO SURVIVAL | TRADE-SECRET |
INVALID TRANSACTIONS SHOULD BE | WRITTEN TO REPORT AND REVIEWED |
ATTRIBUTES IN A TABLE DEPEND ONLY ON PRIMARY KEY | DATA NORMALIZATION |
MAY RENDER TOKEN UNUSABLE | BATTERY LIFESPAN |
ACV | ACTUAL COST VALUE, VALUE OF ITEM ON THE DATE OF LOSS + 10 % |
SET | VISA, MASTERCARD, INTERNET, CREDIT CARD PROTOCOL, USED DIGITAL SIGNATURES |
WAP GAP | WTLS IS DECRYPTED AT THE CARRIERS WAP GATEWAY TO RE-ENCRYPT WITH SSL FOR WIRED NETWORKS |
PASSWORD CRACKERS USE | COMPARATIVE ANALYSIS |
CHAIN OF CUSTODY SHOWS | WHO: OBTAINED AND SECURED EVIDENCE |
DIGITAL SIGNATURE STANDARD(DSS) PROVIDES | INTEGRITY, DIGITAL SIGNATURE & AUTHENTICATION, NOT ENCRYPTION |
HIGH AVAILABILITY-SERVER | LOAD BALANCING, DISK REPLICATION |
ALL RECOVERY PLANS | BECOME OBSOLETE QUICKLY |
MAIN REASON FOR CCTV | INCREASE GUARD VISIBILITY |
PROTECT AGAINST BRUTE-FORCE ATTACK | ACCOUNT LOCK-OUT AFTER 3 UNSUCCESSFUL ATTEMPTS |
FORMAL DESCRIPTION OF SECURITY POLICY | ACCESS CONTROL MODULE |
ONE-WAY HASH | DIFFERENT DIGEST FOR DIFFERENT DATA, VARIABLE INPUT-FIXED OUTPUT GIVEN DIGEST, COMPUTATIONALLY INFEASIBLE TO FIND CORRESPONDING MESSAGE |
X.509 | DIGITAL CERTIFICATES |
HOST-BASED IDS-DISADVANTAGE | COSTLY TO MANAGE |
SECURITY REQUIREMENT UNIQUE TO COMPARTMENTED WORKSTATION | INFORMATION LABELS |
ACT OF VALIDATING USER | AUTHENTICATION |
SALARY LEVELS-CLASSIFICATION IN PRIVATE SECTOR | PRIVATE |
PROTECTION PROFILE | COMMON CRITERIA (CC) |
ORANGE BOOK | SECURITY TESTING, DESIGN SPECIFICATION & TESTING, TRUSTED DISTRIBUTION, NOT SYSTEM INTEGRITY |
MOST SECURE FORM OF 3DES | DES-EDE3 |
MAC ADDRESS SIZE | 48-BIT, ALSO CALLED HARDWARE ADDRESS |
IPV4 ADDRESS SIZE IN BITS | 32-BIT |
MTO | MAXIMUM TOLERABLE DOWNTIME, MAX DELAY BUSINESS CAN TOLERATE & STILL BE VIABLE |
ATM | FIXED CELL SIZE |
CONFLICT OF INTEREST, SUBJECT, COMPANY DATASETS = WHAT MODEL | CHINESE WALL |
FACIAL IDENTIFICATION | EIGEN FEATURES OF EIGEN FACES |
MAC CATEGORY OF A RESOURCE CAN BE ONLY BE CHANGED BY | ADMINISTRATORS |
STATE MACHINE MODEL IS BEST FOR | CONFIDENTIALITY |
BELL-LAPADULA (BLP) SECURITY MODE WITH HIGHEST RISK | MULTI-LEVEL |
DATA DICTIONARY | CONTROL & MANAGE DATA FROM A CENTRAL LOCATION |
TECHNIQUE FOR ARTIFICIAL INTELLIGENCE | CYCLIC-BASED REASONING STATEMENT |
NOT EFFECTIVE DETERRENT AGAINST DATABASE INFERENCE ATTACKS | SMALL QUERY SETS |
BUSINESS CONTINUITY PLAN DEVELOPMENT DEPENDS ON | BIA |
CONTROL TECHNIQUE REQUIRES SEPARATE ENTITIES OPERATING IN CONCERT | DUAL CONTROL |