100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
CISSP test bank. Exam Question Review, revision guide, Full Coverage. Verified. €12,21   In winkelwagen

Tentamen (uitwerkingen)

CISSP test bank. Exam Question Review, revision guide, Full Coverage. Verified.

 4 keer bekeken  0 keer verkocht
  • Vak
  • Instelling

CISSP test bank. Exam Question Review, revision guide, Full Coverage. Verified. "Bad" Blocks/Clusters/sectors - -Good disk blocks marked as bad 4GL - -Fourth-generation programming language designed to increase programmers efficiency by automating the creation of computer programming code ...

[Meer zien]

Voorbeeld 4 van de 116  pagina's

  • 21 februari 2023
  • 116
  • 2022/2023
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
avatar-seller
CISSP test bank. Exam Question Review,
revision guide, Full Coverage. Verified.

"Bad" Blocks/Clusters/sectors - ✔✔-Good disk blocks marked as bad



4GL - ✔✔-Fourth-generation programming language designed to increase programmers efficiency by
automating the creation of computer programming code



4GL / Fourth-generation programming language - ✔✔-Designed to increase programmer's efficiency by
automating the creation of computer programming code



802.1X - ✔✔-Port-based Network Access Control layer 2 authentication



802.11 - ✔✔-Wireless networking standard



802.11-1997 - ✔✔-The original mode of 802.11 operated at 2mbs using the 2.4 GHz frequency



802.11a - ✔✔-802.11 mode that operates at 54 mbps using the 5 GHz frequency



802.11b - ✔✔-802.11 mode that operates at 11 mbps using the 2.4 GHz frequency



802.11g - ✔✔-802.11 mode that operates at 54 mbps using the 2.4 GHz frequency



802.11i - ✔✔-The first 802.11 wireless security standard that provides reasonable security



802.11n - ✔✔-802.11 mode that uses both 2.4 and 5 GHz frequencies and allows speeds of 144 mbps
and beyond

,ABM - ✔✔-Asynchronous Mode HDLC combined mode where nodes may act as primary or secondary,
initiating transmission without receiving permission



Abstraction - ✔✔-Hides unnecessary details from the user



Acceptance Testing - ✔✔-Testing to ensure the software meets the customers operational requirements



Access - ✔✔-A subject's ability to view, modify, or communicate with an object. Access enables the flow
of information between the subject and the object.



Access aggregation - ✔✔-The collective entitlements granted by multiple systems to one user. Can lead
to authorization creep



Access Control - ✔✔-Mechanisms, controls, and methods of limiting access to resources to authorized
subjects only.



Access Control list (ACL) - ✔✔-A list of subjects that are authorized to access a particular object.
Typically, the types of access are read, write, execute, append, modify, delete, and create.



Access Control Lists/ACL - ✔✔-Access Control List



Access Control Matrix - ✔✔-Table defining what access permissions exist between specific subjects and
objects



Access Control Mechanism - ✔✔-Administrative, physical, or technical control that is designed to detect
and prevent unauthorized access to a resource or environment.



Account Lockout - ✔✔-Disables an account after a set number of failed logins, sometimes during a
specific time period

,Accountability - ✔✔-A security principle indicating that individuals must be identifiable and must be
held responsible for their actions.



Accountability - ✔✔-Holds individuals accountable for their actions



Accountability Principle - ✔✔-OECD Privacy Guideline principle which states individuals should have the
right to challenge the content of any personal data being held, and have a process for updating their
personal data if found to be inaccurate or incomplete



Accreditation - ✔✔-The data owners acceptance of the risk represented by a system



Accredited - ✔✔-A computer system or network that has received official authorization and approval to
process sensitive data in a specific operational environment. There must be a security evaluation of the
system's hardware, software, configurations, and controls by technical personnel.



ACK - ✔✔-TCP flag, acknowledge received data



Act honorably, justly, responsibly, and legally - ✔✔-Second canon of the (ISC)2 Code of ethics



Active RFID - ✔✔-Powered RFID tags that can operate via larger distances



Active-active Cluster - ✔✔-Involves multiple systems all of which are online and actively processing
traffic or data



Active-passive Cluster - ✔✔-Involves devices or systems that are already in place, configured, powered
on and ready to begin processing network traffic should a failure occur on the primary system



ActiveX controls - ✔✔-The functional equivalent of Java applets. They use digital certificates instead of a
sandbox to provide security



Ad hoc mode - ✔✔-802.11 peer-to-peer mode with no central AP

, Add-on Security - ✔✔-Security protection mechanisms that are hardware or software retrofitted to a
system to increase that system's protection level.



Address Space Layout Randomization/ASLR - ✔✔-Address Space Layout Randomization, seeks to
decrease the likelihood of successful exploitation by making memory address employed by the system
less predictable



Administrative Controls - ✔✔-Implemented by creating and following organizational policy, procedures,
or regulation. Also called directive controls



Administrative Controls - ✔✔-Security mechanisms that are management's responsibility and referred
to as "soft" controls. These controls include the development and publication of policies, standards,
procedures, and guidelines; the screening of personnel; security-awareness training; the monitoring of
system activity; and change control procedures.



Administrative Law - ✔✔-Law enacted by government agencies, aka regulatory law



ADSL - ✔✔-Asymmetric Digital Subscriber Line, DSL featuring faster download speeds than upload



Advance and protect the profession - ✔✔-Fourth canon of the (ISC)2 Code of Ethics



Advanced Encryption Standard/AES - ✔✔-Advanced Encryption Standard, a block cipher using 128 bit,
192 bit, or 256 bit keys to encrypt 128-bit blocks of data



Agents of law enforcement - ✔✔-Private citizens carrying out actions on the behalf of law enforcement



Aggregation - ✔✔-Mathematical attack where a user is able to use lower-level access to learn restricted
information

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper QuickPass. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €12,21. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 79223 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€12,21
  • (0)
  Kopen