CISSP test bank. Exam Question Review, revision guide, Full Coverage. Verified.
4 keer bekeken 0 keer verkocht
Vak
CISSP
Instelling
CISSP
CISSP test bank. Exam Question Review, revision guide, Full Coverage. Verified.
"Bad" Blocks/Clusters/sectors - -Good disk blocks marked as bad
4GL - -Fourth-generation programming language designed to increase programmers efficiency by automating the creation of computer programming code
...
full coverage verified bad blocksclusterssectors good disk blocks marked as bad 4gl fourth generation programming language d
Geschreven voor
CISSP
Alle documenten voor dit vak (308)
Verkoper
Volgen
QuickPass
Ontvangen beoordelingen
Voorbeeld van de inhoud
CISSP test bank. Exam Question Review,
revision guide, Full Coverage. Verified.
"Bad" Blocks/Clusters/sectors - ✔✔-Good disk blocks marked as bad
4GL - ✔✔-Fourth-generation programming language designed to increase programmers efficiency by
automating the creation of computer programming code
4GL / Fourth-generation programming language - ✔✔-Designed to increase programmer's efficiency by
automating the creation of computer programming code
802.1X - ✔✔-Port-based Network Access Control layer 2 authentication
802.11 - ✔✔-Wireless networking standard
802.11-1997 - ✔✔-The original mode of 802.11 operated at 2mbs using the 2.4 GHz frequency
802.11a - ✔✔-802.11 mode that operates at 54 mbps using the 5 GHz frequency
802.11b - ✔✔-802.11 mode that operates at 11 mbps using the 2.4 GHz frequency
802.11g - ✔✔-802.11 mode that operates at 54 mbps using the 2.4 GHz frequency
802.11i - ✔✔-The first 802.11 wireless security standard that provides reasonable security
802.11n - ✔✔-802.11 mode that uses both 2.4 and 5 GHz frequencies and allows speeds of 144 mbps
and beyond
,ABM - ✔✔-Asynchronous Mode HDLC combined mode where nodes may act as primary or secondary,
initiating transmission without receiving permission
Abstraction - ✔✔-Hides unnecessary details from the user
Acceptance Testing - ✔✔-Testing to ensure the software meets the customers operational requirements
Access - ✔✔-A subject's ability to view, modify, or communicate with an object. Access enables the flow
of information between the subject and the object.
Access aggregation - ✔✔-The collective entitlements granted by multiple systems to one user. Can lead
to authorization creep
Access Control - ✔✔-Mechanisms, controls, and methods of limiting access to resources to authorized
subjects only.
Access Control list (ACL) - ✔✔-A list of subjects that are authorized to access a particular object.
Typically, the types of access are read, write, execute, append, modify, delete, and create.
Access Control Lists/ACL - ✔✔-Access Control List
Access Control Matrix - ✔✔-Table defining what access permissions exist between specific subjects and
objects
Access Control Mechanism - ✔✔-Administrative, physical, or technical control that is designed to detect
and prevent unauthorized access to a resource or environment.
Account Lockout - ✔✔-Disables an account after a set number of failed logins, sometimes during a
specific time period
,Accountability - ✔✔-A security principle indicating that individuals must be identifiable and must be
held responsible for their actions.
Accountability - ✔✔-Holds individuals accountable for their actions
Accountability Principle - ✔✔-OECD Privacy Guideline principle which states individuals should have the
right to challenge the content of any personal data being held, and have a process for updating their
personal data if found to be inaccurate or incomplete
Accreditation - ✔✔-The data owners acceptance of the risk represented by a system
Accredited - ✔✔-A computer system or network that has received official authorization and approval to
process sensitive data in a specific operational environment. There must be a security evaluation of the
system's hardware, software, configurations, and controls by technical personnel.
ACK - ✔✔-TCP flag, acknowledge received data
Act honorably, justly, responsibly, and legally - ✔✔-Second canon of the (ISC)2 Code of ethics
Active RFID - ✔✔-Powered RFID tags that can operate via larger distances
Active-active Cluster - ✔✔-Involves multiple systems all of which are online and actively processing
traffic or data
Active-passive Cluster - ✔✔-Involves devices or systems that are already in place, configured, powered
on and ready to begin processing network traffic should a failure occur on the primary system
ActiveX controls - ✔✔-The functional equivalent of Java applets. They use digital certificates instead of a
sandbox to provide security
Ad hoc mode - ✔✔-802.11 peer-to-peer mode with no central AP
, Add-on Security - ✔✔-Security protection mechanisms that are hardware or software retrofitted to a
system to increase that system's protection level.
Address Space Layout Randomization/ASLR - ✔✔-Address Space Layout Randomization, seeks to
decrease the likelihood of successful exploitation by making memory address employed by the system
less predictable
Administrative Controls - ✔✔-Implemented by creating and following organizational policy, procedures,
or regulation. Also called directive controls
Administrative Controls - ✔✔-Security mechanisms that are management's responsibility and referred
to as "soft" controls. These controls include the development and publication of policies, standards,
procedures, and guidelines; the screening of personnel; security-awareness training; the monitoring of
system activity; and change control procedures.
Administrative Law - ✔✔-Law enacted by government agencies, aka regulatory law
ADSL - ✔✔-Asymmetric Digital Subscriber Line, DSL featuring faster download speeds than upload
Advance and protect the profession - ✔✔-Fourth canon of the (ISC)2 Code of Ethics
Advanced Encryption Standard/AES - ✔✔-Advanced Encryption Standard, a block cipher using 128 bit,
192 bit, or 256 bit keys to encrypt 128-bit blocks of data
Agents of law enforcement - ✔✔-Private citizens carrying out actions on the behalf of law enforcement
Aggregation - ✔✔-Mathematical attack where a user is able to use lower-level access to learn restricted
information
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper QuickPass. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €12,21. Je zit daarna nergens aan vast.