CISSP Glossary (Simplified) Flashcards Preview

CISSP Prep - The Last Run > CISSP Glossary (Simplified) > Flashcards

Flashcards in CISSP Glossary (Simplified) Deck (25):
1

802.11

wireless networking standard

2

*Integrity axiom

Biba property which states "no write up"

3

*Security property

Bell-LaPadula property that states "no write down"

4

"Bad" blocks/cluster/sectors

good disk blocks marked as bad

5

4GL

fourth-generation programming language, designed to increase programmer's efficiency by automating the creation of compute programming code

6

802.11-1997

the original mode of 802.11, operated at 2 mbps using the 2.4 GHz frequency

7

802.11a

802.11 mode that operate 54 mbps using the 5 GHz frequency

8

802.11b

802.11 mode that operates 11 mbps using the 2.4 GHz frequency

9

802.11g

802.11 mode that operates at 54 mbps using the 2.4 GHz frequency

10

802.11i

the first 802.11 wireless security standard that provides reasonable security

11

802.11n

802.11 mode that uses both 2.4 and 5 GHz frequencies and allows speeds of 144 mbps and beyond

12

802.1X

Port-Based Network Access Control, layer 2 authentication

13

ABM

Asynchronous Balance Mode, HDLC combined mode where nodes may act as primary or secondary, initiating transmissions without receiving permission

14

Abstraction

hide unnecessary details from the user

15

Acceptance Testing

testing to ensure the software meets the customer's operational requirements

16

Access aggregation

the collective entitlements granted by multiple systems to one user, can lead to authorization creep




17

Access control matrix

table defining what access permissions exist between specific subjects and objects

18

Account lockout

disables an account after a set number of failed logins, sometimes during a specific time period

19

Accountability

holds individuals accountable for their actions

20

Accountability Principle

OECD Privacy Guideline principle which stated individuals should the right to challenge the content of any personal data being held, and have a process for updating their personnel dat if found to be inaccurate or incomplete

21

Accreditation

the data owner's acceptance of the risk represented by a system

22

ACK

TCP flag, acknowledge received data

23

Act honorably, honestly, justly, responsibility, and legally

Second canon of the (ISC)2; Code of Ethics

24

Active RFID

powered RFID tags that can operate via larger distances

25

Active-active cluster

involves multiple systems all of which are online and actively processing traffic or data