100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CISSP test bank. Exam Question Review, revision guide, Full Coverage. Verified. CA$18.14   Add to cart

Exam (elaborations)

CISSP test bank. Exam Question Review, revision guide, Full Coverage. Verified.

 4 views  0 purchase

CISSP test bank. Exam Question Review, revision guide, Full Coverage. Verified. "Bad" Blocks/Clusters/sectors - -Good disk blocks marked as bad 4GL - -Fourth-generation programming language designed to increase programmers efficiency by automating the creation of computer programming code ...

[Show more]

Preview 4 out of 116  pages

  • February 21, 2023
  • 116
  • 2022/2023
  • Exam (elaborations)
  • Questions & answers
  • revision guide
All documents for this subject (308)
avatar-seller
QuickPass
CISSP test bank. Exam Question Review,
revision guide, Full Coverage. Verified.

"Bad" Blocks/Clusters/sectors - ✔✔-Good disk blocks marked as bad



4GL - ✔✔-Fourth-generation programming language designed to increase programmers efficiency by
automating the creation of computer programming code



4GL / Fourth-generation programming language - ✔✔-Designed to increase programmer's efficiency by
automating the creation of computer programming code



802.1X - ✔✔-Port-based Network Access Control layer 2 authentication



802.11 - ✔✔-Wireless networking standard



802.11-1997 - ✔✔-The original mode of 802.11 operated at 2mbs using the 2.4 GHz frequency



802.11a - ✔✔-802.11 mode that operates at 54 mbps using the 5 GHz frequency



802.11b - ✔✔-802.11 mode that operates at 11 mbps using the 2.4 GHz frequency



802.11g - ✔✔-802.11 mode that operates at 54 mbps using the 2.4 GHz frequency



802.11i - ✔✔-The first 802.11 wireless security standard that provides reasonable security



802.11n - ✔✔-802.11 mode that uses both 2.4 and 5 GHz frequencies and allows speeds of 144 mbps
and beyond

,ABM - ✔✔-Asynchronous Mode HDLC combined mode where nodes may act as primary or secondary,
initiating transmission without receiving permission



Abstraction - ✔✔-Hides unnecessary details from the user



Acceptance Testing - ✔✔-Testing to ensure the software meets the customers operational requirements



Access - ✔✔-A subject's ability to view, modify, or communicate with an object. Access enables the flow
of information between the subject and the object.



Access aggregation - ✔✔-The collective entitlements granted by multiple systems to one user. Can lead
to authorization creep



Access Control - ✔✔-Mechanisms, controls, and methods of limiting access to resources to authorized
subjects only.



Access Control list (ACL) - ✔✔-A list of subjects that are authorized to access a particular object.
Typically, the types of access are read, write, execute, append, modify, delete, and create.



Access Control Lists/ACL - ✔✔-Access Control List



Access Control Matrix - ✔✔-Table defining what access permissions exist between specific subjects and
objects



Access Control Mechanism - ✔✔-Administrative, physical, or technical control that is designed to detect
and prevent unauthorized access to a resource or environment.



Account Lockout - ✔✔-Disables an account after a set number of failed logins, sometimes during a
specific time period

,Accountability - ✔✔-A security principle indicating that individuals must be identifiable and must be
held responsible for their actions.



Accountability - ✔✔-Holds individuals accountable for their actions



Accountability Principle - ✔✔-OECD Privacy Guideline principle which states individuals should have the
right to challenge the content of any personal data being held, and have a process for updating their
personal data if found to be inaccurate or incomplete



Accreditation - ✔✔-The data owners acceptance of the risk represented by a system



Accredited - ✔✔-A computer system or network that has received official authorization and approval to
process sensitive data in a specific operational environment. There must be a security evaluation of the
system's hardware, software, configurations, and controls by technical personnel.



ACK - ✔✔-TCP flag, acknowledge received data



Act honorably, justly, responsibly, and legally - ✔✔-Second canon of the (ISC)2 Code of ethics



Active RFID - ✔✔-Powered RFID tags that can operate via larger distances



Active-active Cluster - ✔✔-Involves multiple systems all of which are online and actively processing
traffic or data



Active-passive Cluster - ✔✔-Involves devices or systems that are already in place, configured, powered
on and ready to begin processing network traffic should a failure occur on the primary system



ActiveX controls - ✔✔-The functional equivalent of Java applets. They use digital certificates instead of a
sandbox to provide security



Ad hoc mode - ✔✔-802.11 peer-to-peer mode with no central AP

, Add-on Security - ✔✔-Security protection mechanisms that are hardware or software retrofitted to a
system to increase that system's protection level.



Address Space Layout Randomization/ASLR - ✔✔-Address Space Layout Randomization, seeks to
decrease the likelihood of successful exploitation by making memory address employed by the system
less predictable



Administrative Controls - ✔✔-Implemented by creating and following organizational policy, procedures,
or regulation. Also called directive controls



Administrative Controls - ✔✔-Security mechanisms that are management's responsibility and referred
to as "soft" controls. These controls include the development and publication of policies, standards,
procedures, and guidelines; the screening of personnel; security-awareness training; the monitoring of
system activity; and change control procedures.



Administrative Law - ✔✔-Law enacted by government agencies, aka regulatory law



ADSL - ✔✔-Asymmetric Digital Subscriber Line, DSL featuring faster download speeds than upload



Advance and protect the profession - ✔✔-Fourth canon of the (ISC)2 Code of Ethics



Advanced Encryption Standard/AES - ✔✔-Advanced Encryption Standard, a block cipher using 128 bit,
192 bit, or 256 bit keys to encrypt 128-bit blocks of data



Agents of law enforcement - ✔✔-Private citizens carrying out actions on the behalf of law enforcement



Aggregation - ✔✔-Mathematical attack where a user is able to use lower-level access to learn restricted
information

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller QuickPass. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for CA$18.14. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79223 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
CA$18.14
  • (0)
  Add to cart