CREST CPSA 4, CPSA 5 COMPLETE STUDY GUIDE 2023
1. 100: Continue 2. 101: Switching Protocols 3. 102: Processing 4. Internet Protocol Security (IPsec): a secure network protocol suite that authenticates and encrypts the packets of data sent over an Internet Protocol network 5. Internet Protocol Security (IPsec): used in virtual private networks (VPNs) 6. number of possible TCP ports: 65535 7. number of possible UDP ports: 65535 8. RFC1918 24-bit block: 10.0.0.0/8 9. RFC1918 20-bit block: 172.16.0.0/12 10. RFC1918 16-bit block: 192.168.0.0/16 11. Common Vulnerabilities and Exposures (CVE): provides a reference-method for publicly known information-security vulnerabilities and exposures 12. Common Vulnerability Scoring System (CVSS): an open industry standard for assessing the severity of computer system security vulnerabilities 13. DREAD: part of a system for risk-assessing computer security threats 14. Common Weakness Enumeration (CWE): a category system for software weaknesses and vulnerabilities 15. National Vulnerability Database (NVD): the U.S. government repository of standards-based vulnerability management data represented using the Security Content Automation Protocol (SCAP) 16. 500: Internal Server Error 17. 501: Not Implemented 18. 502: Bad Gateway 19. 503: Service Unavailable 20. 504: Gateway Timeout 21. 505: HTTP Version Not Supported 22. 511: Network Authentication Required 23. CHANGE_ON_INSTALL: SYS 24. MANAGER: SYSTEM 25. TIGER: SCOTT 1 / 19 CREST CPSA 4, CPSA 5 26. WOOD: ADAMS 27. STEEL: JONES 28. CLOTH: CLARK 29. PAPER: BLAKE 30. TRACE: TRACESVR 31. MANAGER: OLAPSYS 32. CHANGE_ON_INSTALL: XDB 33. 400: Bad Request 34. 401: Unauthorized 35. 402: Payment Required 36. 403: Forbidden 37. 404: Not Found 38. 405: Method Not Allowed 39. 406: Not Acceptable 40. 407: Proxy Authentication Required 41. 408: Request Timeout 42. 409: Conflict 43. 410: Gone 44. 411: Length Required 45. 413: Payload Too Large 46. 426: Upgrade Required 47. 429: Too Many Requests 48. threat: a source of potential disruption, which has the potential to cause a risk 49. risk: the combination of consequences of a threat occurring and the likelihood of it doing so 50. inherent risk: the risk that an event will occur which may negatively affect the achievement of organisation's objectives, assuming there are no controls in place 51. residual risk: the risk which remains after taking controls in to account 2 / 19 CREST CPSA 4, C
Written for
- Institution
-
Liberty University
- Course
-
CREST
Document information
- Uploaded on
- April 19, 2023
- Number of pages
- 19
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
- crest cpsa 4
-
cpsa 5 complete study guide 2023