Exam Flashcards

(147 cards)

1
Q

NETWORK ASSESSMENT TOOLS

A

ISS, SATAN, BALLISTA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

HDSL

A

1.55MBPS UPSTREAM 1.55MBPS DOWNSTREAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SODA ACID

A

SUPPRESSES FUEL SUPPLY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TIME TO SWITCH AND TIME PRESSING KEY

A

FLIGHT TIME AND DWELL TIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RED BOOK

A

NETWORK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

GREEN BOOK

A

PASSWORD MANAGEMENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TEMPERATURE THAT DAMAGES MAGNETIC MEDIA

A

100 DEGREES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RED BOX

A

SOUND OF COINS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BLUE BOX

A

TONE, FREQ FOR LONG DISTANCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BLACK BOX

A

LINE VOLTAGE, RECEIVER’S END

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

FRAGMENTATION

A

TEAR DROP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ABSTRACT MACHINE THAT MEDIATES ALL ACCESS BETWEEN SUBJECTS AND OBJECTS

A

REFERENCE MONITOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NUMBER OF COLUMNS IN TABLE

A

DEGREE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

APPLICATION LAYER, 2 ASYMMETRICAL KEYS -or- 2 DIGITAL CERTIFICATES

A

SET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MD5 SIZE OF DIGEST

A

128 BITS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SHA-1 SIZE OF DIGEST

A

160 BITS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

B2

A

STRUCTURED, SEPARATION OF DUTIES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

B3

A

SECURITY DOMAIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

PASSWORD-TWO UNRELATED WORDS

A

COMPOSITION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SATISFY REAL WORLD REQUIREMENTS

A

VALIDATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DECISION SUPPORT SYSTEM (DSS) PROVIDES

A

FLEXIBILITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BEST PROGRAMMING HAS

A

HIGH COHESION AND LOW COUPLING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

COHESION

A

ONLY ONE PROCESS OR ONLY RELATED PROCESSES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

COUPLING

A

INTERACTION REQUIRED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
RISK
LIKELIHOOD
26
IP HEADER-TCP NUMBER
6
27
IP HEADER-ICMP NUMBER
1
28
IP HEADER-IGMP NUMBER
2
29
IP HEADER-UDP NUMBER
17
30
IMPORTANT FOR EVIDENCE
CHAIN OF CUSTODY
31
DATABASE ROWS
TUPLE
32
NETWORK REDUNDANCY
DUAL BACKBONE
33
DRAW CONCLUSIONS
INFERENCE
34
SUSTAINING-DURING AND AFTER
BUSINESS CONTINUITY PLAN
35
FIRST STEP
POLICY
36
STEP-BY-STEP
PROCEDURE
37
RECOMMENDED
GUIDELINES
38
CONTENT DEPENDENT-ADVANTAGE
MORE GRANULAR
39
CONTENT DEPENDENT-DISADVANTAGE
OVERHEAD
40
PROTECT ONLY WITHIN A FEW INCHES
CAPACITANCE DETECTOR
41
TRANSMIT ONLINE TRANSACTIONS TO REMOTE FACILITY
ELECTRONIC VAULTING
42
CELL PHONE-PREVENT MONITORING
TIME DIVISION MULTIPLEXING
43
CCTV IS MAINLY
DETECTIVE
44
LINUX, PREVENTS USERS FROM SEEING DATA
SHADOW
45
ORANGE BOOK
TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC)
46
RADIUS-ACT AS CLIENT
NETWORK ACCESS SERVER (NAS)
47
LOCK PICKING TECHNIQUE FOR COMBINATION LOCKS
SHIMMING
48
DES NUMBER OF ROUNDS
16
49
FLEXIBLE SUPPORT FOR O/S
FLASK FLUX ADVANCED SECURITY KERNEL
50
ID PICTURE, VERIFY AUTHENTICITY ON A DOCUMENT
WATERMARK
51
PROPER LIFECYCLE OF EVIDENCE
COLLECTION, ANALYSIS, STORAGE, PRESENT IN COURT, RETURN TO OWNER
52
ALGORITHMS BASED ON DISCRETE LOGARITHMS
EL GAMAL, DIFFIE-HELLMAN, ECC
53
24 HOURS A DAY PROCESSING, GOOD ALTERNATIVE TO TAPE BACKUP
BACKUP TO JUKEBOX
54
NUMBER OF COMBINATIONS FOR A NUMERIC PASSWORD THAT IS 1-4 DIGITS
10,000 COMBOS
55
SSO BENEFIT
MORE EFFICIENT LOG-ON
56
ACCOUNTABILITY=TRACED BACK TO
INDIVIDUAL
57
IPSEC LAYER AND PROTOCOLS USED
L3, AH AND ESP, ESP=INTEGRITY AND CONFIDENTIALITY
58
REASONABLE MEASURES TO ENSURE
DUE CARE
59
LIABILITY
DUE CARE, DUE DILIGENCE
60
SINGLE UNIT OF ETHERNET DATA
FRAME
61
1ST STEP IN A PENETRATION TEST
FORMULATION OF SPECIFIC MANAGEMENT OBJECTIVES
62
COVERT CHANNEL
1 PROCESS SIGNALS ANOTHER BY MODIFYING ITS OWN USE OF SYSTEM RESOURCES
63
QUALITATIVE
PRIORITIZES RISK
64
REGISTERED PORTS
1024-49151
65
WELL KNOWN PORTS
1-1023
66
DYNAMIC AND OR PRIVATE PORTS
49152-65535
67
ISDN BRI
2B AND 1D
68
WITH PUBLIC KEY CRYPTOGRAPHY, FOR CONFIDENTIALITY, WHICH KEY IS USED FIRST
RECEIVER'S PUBLIC KEY
69
WITH PUBLIC KEY CRYPTOGRAPHY, FOR AUTHENTICATION, WHICH KEY IS USED FIRST
SENDER'S PRIVATE KEY
70
INTEGRITY
HASHING
71
GUARDS
DISCRIMINATING JUDGMENT
72
SSO-TYPES
KERBEROS, SESAME, KRYPTOKNIGHT
73
KERBEROS
TICKETS, MIT, PROJECT ATHENA, SYMMETRIC, CONFIDENTIAL & INTEGRITY, 3-HEADED DOG, GREEK MYTHOLOGY
74
EVIDENCE MUST BE
RELEVANT
75
PACKET FILTERING FIREWALL (GENERATION)
1
76
APPLICATION LEVEL FIREWALL (GENERATION)
2
77
STATEFUL INSPECTION FIREWALL(GENERATION)
3
78
DYNAMIC PACKET FILTERING FIREWALL (GENERATION)
4
79
KERNEL PROXY FIREWALL (GENERATION)
5
80
TRINOO/TRIN00
DDOS, TRIBAL FLOOD NETWORK
81
AUTOMATICALLY LEAVES SYSTEM PROCESSES & COMPONENTS IN A SECURE STATE AFTER FAILURE
FAIL-SAFE
82
MOST CRUCIAL LINK IN THE COMPUTER SECURITY CHAIN
MANAGEMENT
83
RESPONSIBLE FOR ENSURING PROPER CONTROLS ARE IN-PLACE FOR DATA
DATA OWNER
84
SCHEMA
STRUCTURE
85
RELATION
HOW DATA & SCHEMA ARE RELATED (ASSOCIATED)
86
DEGREE
NUMBER OF COLUMNS
87
CARDINALITY
NUMBER OF ROWS IN A RELATION, HOW TABLES LINK TO ONE ANOTHER
88
CONTINGENCY PLAN SHOULD ADDRESS
RESIDUAL RISK
89
LEAST PRIVILEGE-MODEL
TCSEC
90
RETROFITTING SECURITY FOR A DATABASE
TRUSTED FRONT-END
91
SCRAMBLED
TRANSPOSITION
92
REPLACED
SUBSTITUTION
93
HIDE IN MEDIA (PICTURES)
STEGANOGRAPHY
94
EVERY X NUMBER OF WORDS IS PART OF REAL MESSAGE
CONCEALMENT
95
BOOK, PAGE, PARAGRAPH, ETC?..
RUNNING
96
CERTIFICATION RULES & ENFORCEMENT RULES (MODEL)
CLARK-WILSON
97
FORENSIC DISK BACK-UP
BIT LEVEL, BIT-BY-BIT
98
ADDED TO PASSWORDS TO INCREASE RANDOMNESS
SALTS
99
RPC OSI LAYER
5 (SESSION)
100
LOWER CASE
IMPLEMENTATION
101
MIDDLE CASE
ANALYSIS & DESIGN
102
UPPER CASE
EXECUTIVES/PLANNING
103
ICASE
COMBINED (L,M,U) ALSO CALLED INTEGRATED CASE
104
ARTIFICIAL INTELLIGENCE/LEARN FROM EXPERIENCE
NEURAL NETWORK
105
AUDIT TRAILS
DETECTIVE/TECHNICAL
106
HIPPA
SECURITY & PRIVACY
107
SOFTWARE TESTING (INTERNAL)
WHITE BOX
108
SOFTWARE TESTING (EXTERNAL)
BLACK BOX
109
FORMAL ACCEPTANCE
ACCREDITATION
110
PROPRIETARY & IMPORTANT TO SURVIVAL
TRADE-SECRET
111
INVALID TRANSACTIONS SHOULD BE
WRITTEN TO REPORT AND REVIEWED
112
ATTRIBUTES IN A TABLE DEPEND ONLY ON PRIMARY KEY
DATA NORMALIZATION
113
MAY RENDER TOKEN UNUSABLE
BATTERY LIFESPAN
114
ACV
ACTUAL COST VALUE, VALUE OF ITEM ON THE DATE OF LOSS + 10 %
115
SET
VISA, MASTERCARD, INTERNET, CREDIT CARD PROTOCOL, USED DIGITAL SIGNATURES
116
WAP GAP
WTLS IS DECRYPTED AT THE CARRIERS WAP GATEWAY TO RE-ENCRYPT WITH SSL FOR WIRED NETWORKS
117
PASSWORD CRACKERS USE
COMPARATIVE ANALYSIS
118
CHAIN OF CUSTODY SHOWS
WHO: OBTAINED AND SECURED EVIDENCE
119
DIGITAL SIGNATURE STANDARD(DSS) PROVIDES
INTEGRITY, DIGITAL SIGNATURE & AUTHENTICATION, NOT ENCRYPTION
120
HIGH AVAILABILITY-SERVER
LOAD BALANCING, DISK REPLICATION
121
ALL RECOVERY PLANS
BECOME OBSOLETE QUICKLY
122
MAIN REASON FOR CCTV
INCREASE GUARD VISIBILITY
123
PROTECT AGAINST BRUTE-FORCE ATTACK
ACCOUNT LOCK-OUT AFTER 3 UNSUCCESSFUL ATTEMPTS
124
FORMAL DESCRIPTION OF SECURITY POLICY
ACCESS CONTROL MODULE
125
ONE-WAY HASH
DIFFERENT DIGEST FOR DIFFERENT DATA, VARIABLE INPUT-FIXED OUTPUT GIVEN DIGEST, COMPUTATIONALLY INFEASIBLE TO FIND CORRESPONDING MESSAGE
126
X.509
DIGITAL CERTIFICATES
127
HOST-BASED IDS-DISADVANTAGE
COSTLY TO MANAGE
128
SECURITY REQUIREMENT UNIQUE TO COMPARTMENTED WORKSTATION
INFORMATION LABELS
129
ACT OF VALIDATING USER
AUTHENTICATION
130
SALARY LEVELS-CLASSIFICATION IN PRIVATE SECTOR
PRIVATE
131
PROTECTION PROFILE
COMMON CRITERIA (CC)
132
ORANGE BOOK
SECURITY TESTING, DESIGN SPECIFICATION & TESTING, TRUSTED DISTRIBUTION, NOT SYSTEM INTEGRITY
133
MOST SECURE FORM OF 3DES
DES-EDE3
134
MAC ADDRESS SIZE
48-BIT, ALSO CALLED HARDWARE ADDRESS
135
IPV4 ADDRESS SIZE IN BITS
32-BIT
136
MTO
MAXIMUM TOLERABLE DOWNTIME, MAX DELAY BUSINESS CAN TOLERATE & STILL BE VIABLE
137
ATM
FIXED CELL SIZE
138
CONFLICT OF INTEREST, SUBJECT, COMPANY DATASETS = WHAT MODEL
CHINESE WALL
139
FACIAL IDENTIFICATION
EIGEN FEATURES OF EIGEN FACES
140
MAC CATEGORY OF A RESOURCE CAN BE ONLY BE CHANGED BY
ADMINISTRATORS
141
STATE MACHINE MODEL IS BEST FOR
CONFIDENTIALITY
142
BELL-LAPADULA (BLP) SECURITY MODE WITH HIGHEST RISK
MULTI-LEVEL
143
DATA DICTIONARY
CONTROL & MANAGE DATA FROM A CENTRAL LOCATION
144
TECHNIQUE FOR ARTIFICIAL INTELLIGENCE
CYCLIC-BASED REASONING STATEMENT
145
NOT EFFECTIVE DETERRENT AGAINST DATABASE INFERENCE ATTACKS
SMALL QUERY SETS
146
BUSINESS CONTINUITY PLAN DEVELOPMENT DEPENDS ON
BIA
147
CONTROL TECHNIQUE REQUIRES SEPARATE ENTITIES OPERATING IN CONCERT
DUAL CONTROL