CISSP test bank. Exam Question Review, revision guide, Full Coverage. Verified.
4 views 0 purchase
Course
CISSP
Institution
CISSP
CISSP test bank. Exam Question Review, revision guide, Full Coverage. Verified.
"Bad" Blocks/Clusters/sectors - -Good disk blocks marked as bad
4GL - -Fourth-generation programming language designed to increase programmers efficiency by automating the creation of computer programming code
...
full coverage verified bad blocksclusterssectors good disk blocks marked as bad 4gl fourth generation programming language d
Written for
CISSP
All documents for this subject (307)
Seller
Follow
QuickPass
Reviews received
Content preview
CISSP test bank. Exam Question Review,
revision guide, Full Coverage. Verified.
"Bad" Blocks/Clusters/sectors - ✔✔-Good disk blocks marked as bad
4GL - ✔✔-Fourth-generation programming language designed to increase programmers efficiency by
automating the creation of computer programming code
4GL / Fourth-generation programming language - ✔✔-Designed to increase programmer's efficiency by
automating the creation of computer programming code
802.1X - ✔✔-Port-based Network Access Control layer 2 authentication
802.11 - ✔✔-Wireless networking standard
802.11-1997 - ✔✔-The original mode of 802.11 operated at 2mbs using the 2.4 GHz frequency
802.11a - ✔✔-802.11 mode that operates at 54 mbps using the 5 GHz frequency
802.11b - ✔✔-802.11 mode that operates at 11 mbps using the 2.4 GHz frequency
802.11g - ✔✔-802.11 mode that operates at 54 mbps using the 2.4 GHz frequency
802.11i - ✔✔-The first 802.11 wireless security standard that provides reasonable security
802.11n - ✔✔-802.11 mode that uses both 2.4 and 5 GHz frequencies and allows speeds of 144 mbps
and beyond
,ABM - ✔✔-Asynchronous Mode HDLC combined mode where nodes may act as primary or secondary,
initiating transmission without receiving permission
Abstraction - ✔✔-Hides unnecessary details from the user
Acceptance Testing - ✔✔-Testing to ensure the software meets the customers operational requirements
Access - ✔✔-A subject's ability to view, modify, or communicate with an object. Access enables the flow
of information between the subject and the object.
Access aggregation - ✔✔-The collective entitlements granted by multiple systems to one user. Can lead
to authorization creep
Access Control - ✔✔-Mechanisms, controls, and methods of limiting access to resources to authorized
subjects only.
Access Control list (ACL) - ✔✔-A list of subjects that are authorized to access a particular object.
Typically, the types of access are read, write, execute, append, modify, delete, and create.
Access Control Lists/ACL - ✔✔-Access Control List
Access Control Matrix - ✔✔-Table defining what access permissions exist between specific subjects and
objects
Access Control Mechanism - ✔✔-Administrative, physical, or technical control that is designed to detect
and prevent unauthorized access to a resource or environment.
Account Lockout - ✔✔-Disables an account after a set number of failed logins, sometimes during a
specific time period
,Accountability - ✔✔-A security principle indicating that individuals must be identifiable and must be
held responsible for their actions.
Accountability - ✔✔-Holds individuals accountable for their actions
Accountability Principle - ✔✔-OECD Privacy Guideline principle which states individuals should have the
right to challenge the content of any personal data being held, and have a process for updating their
personal data if found to be inaccurate or incomplete
Accreditation - ✔✔-The data owners acceptance of the risk represented by a system
Accredited - ✔✔-A computer system or network that has received official authorization and approval to
process sensitive data in a specific operational environment. There must be a security evaluation of the
system's hardware, software, configurations, and controls by technical personnel.
ACK - ✔✔-TCP flag, acknowledge received data
Act honorably, justly, responsibly, and legally - ✔✔-Second canon of the (ISC)2 Code of ethics
Active RFID - ✔✔-Powered RFID tags that can operate via larger distances
Active-active Cluster - ✔✔-Involves multiple systems all of which are online and actively processing
traffic or data
Active-passive Cluster - ✔✔-Involves devices or systems that are already in place, configured, powered
on and ready to begin processing network traffic should a failure occur on the primary system
ActiveX controls - ✔✔-The functional equivalent of Java applets. They use digital certificates instead of a
sandbox to provide security
Ad hoc mode - ✔✔-802.11 peer-to-peer mode with no central AP
, Add-on Security - ✔✔-Security protection mechanisms that are hardware or software retrofitted to a
system to increase that system's protection level.
Address Space Layout Randomization/ASLR - ✔✔-Address Space Layout Randomization, seeks to
decrease the likelihood of successful exploitation by making memory address employed by the system
less predictable
Administrative Controls - ✔✔-Implemented by creating and following organizational policy, procedures,
or regulation. Also called directive controls
Administrative Controls - ✔✔-Security mechanisms that are management's responsibility and referred
to as "soft" controls. These controls include the development and publication of policies, standards,
procedures, and guidelines; the screening of personnel; security-awareness training; the monitoring of
system activity; and change control procedures.
Administrative Law - ✔✔-Law enacted by government agencies, aka regulatory law
ADSL - ✔✔-Asymmetric Digital Subscriber Line, DSL featuring faster download speeds than upload
Advance and protect the profession - ✔✔-Fourth canon of the (ISC)2 Code of Ethics
Advanced Encryption Standard/AES - ✔✔-Advanced Encryption Standard, a block cipher using 128 bit,
192 bit, or 256 bit keys to encrypt 128-bit blocks of data
Agents of law enforcement - ✔✔-Private citizens carrying out actions on the behalf of law enforcement
Aggregation - ✔✔-Mathematical attack where a user is able to use lower-level access to learn restricted
information
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller QuickPass. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.49. You're not tied to anything after your purchase.