{ "@context": "https://schema.org", "@type": "Organization", "name": "Brainscape", "url": "https://www.brainscape.com/", "logo": "https://www.brainscape.com/pks/images/cms/public-views/shared/Brainscape-logo-c4e172b280b4616f7fda.svg", "sameAs": [ "https://www.facebook.com/Brainscape", "https://x.com/brainscape", "https://www.linkedin.com/company/brainscape", "https://www.instagram.com/brainscape/", "https://www.tiktok.com/@brainscapeu", "https://www.pinterest.com/brainscape/", "https://www.youtube.com/@BrainscapeNY" ], "contactPoint": { "@type": "ContactPoint", "telephone": "(929) 334-4005", "contactType": "customer service", "availableLanguage": ["English"] }, "founder": { "@type": "Person", "name": "Andrew Cohen" }, "description": "Brainscape’s spaced repetition system is proven to DOUBLE learning results! Find, make, and study flashcards online or in our mobile app. Serious learners only.", "address": { "@type": "PostalAddress", "streetAddress": "159 W 25th St, Ste 517", "addressLocality": "New York", "addressRegion": "NY", "postalCode": "10001", "addressCountry": "USA" } }

Notes Flashcards

(33 cards)

1
Q

5 Generations of Firewall

A
  1. Static/Stateless Packet Filtering
  2. Proxy/Application Layer Gateway
  3. Stateful Inspection
  4. Dynamic Packet Filtering
  5. Kernel Proxy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wireless Networking Speeds and Frequency

A
  1. 802.11 - 2 Mbps - 2.4 Ghz
  2. 802.11a - 54 Mbps - 5 Ghz
  3. 802.11b - 11 Mbps - 2.4 Ghz
  4. 802.11g - 54 Mbps - 2.4 Ghz
  5. 802.11n - 200+ Mbps - 2.4 Ghz/ 5 Ghz
  6. 802.11 ac - 1 Gbps - 5 Ghz
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ISC2 Canon

A
  1. Protect society, the commonwealth and the infrastructure
  2. Act honorably, honestly, justly, responsibly and legally
  3. Provide diligent and competent services to principals
  4. Advance and protect the profession
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

OSI Layer

A
  1. Physical
  2. Data Link Layer
  3. Network
  4. Transport
  5. Session
  6. Presentation
  7. Application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TCP/IP Layer

A
  1. Network (1,2)
  2. Internet (3)
  3. Transport (4)
  4. Application (5,6,7)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Biometric Enrollment Time and Throughput Rate

A

Throughput Rate is 6 seconds or faster

Enrollment Time is less than 2 minutes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Government Classification Scheme

A
  1. Top Secret
  2. Secret
  3. Confidential
  4. Sensitive
  5. Unclassified
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Private Classification Scheme

A
  1. Confidential
  2. Private
  3. Sensitive
  4. Public
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How to calculate loss

A
ALE = SLE * ARO
SLE = AV * EF
ALE or annualized loss expectancy
SLE or single loss expectancy
ARO or annualized rate of occurence
AV or asset value
EF or exposure factor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Formula for Risk and Total Risk

A

Risk = Threat * Vulnerability

Total Risk = Threat * Vulnerability * Asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Software Capability Maturity Model Stages

A

The stages of the SW-CMM are as follows:

Level 1: Initial
In this phase, you’ll often find hardworking people charging ahead in a disorganized fashion. There is usually little or no defined software development process.

Level 2: Repeatable
In this phase, basic life cycle management processes are introduced. Reuse of code in an organized fashion begins to enter the picture, and repeatable results are expected from similar projects. SEI defines the key process areas for this level as Requirements Management, Software Project Planning, Software Project Tracking and Oversight, Software Subcontract Management, Software Quality Assurance, and Software Configuration Management.

Level 3: Defined
In this phase, software developers operate according to a set of formal, documented software development processes. All development projects take place within the constraints of the new standardized management
model. SEI defines the key process areas for this level as Organization Process Focus, Organization Process Definition, Training Program, Integrated Software Management, Software Product Engineering, Intergroup Coordination, and Peer Reviews.

Level 4: Managed
In this phase, management of the software process proceeds to the next level. Quantitative measures are utilized to gain a detailed understanding of the development process. SEI defines the key process areas for this level as Quantitative Process Management and Software Quality Management.

Level 5: Optimizing
In the optimized organization, a process of continuous improvement occurs. Sophisticated software development processes are in place that ensure that feedback from one phase reaches to the previous phase to improve future results. SEI defines the key process areas for this level as Defect Prevention, Technology Change Management, and Process Change Management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Components of IPSec

A
  1. AH - Authentication Header
  2. ESP - Encapsulating Security Payload
  3. IPComp - IP Payload Compression Protocol
  4. IKE - Internet Key Exchange
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RAID level

A

RAID 0 - striping
RAID 1 - mirroring
RAID 2 - bit-level striping with dedicated Hamming-code parity
RAID 3 - byte-level striping with dedicated parity
RAID 4 - block-level striping with dedicated parity
RAID 5 - block-level striping with distributed parity
RAID 6 - lock-level striping with double distributed parity
RAID 10 - creates a striped set from a series of mirrored drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Requirements for Patent

A
  1. New
  2. Useful
  3. NonObvious
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Steps of Business Impact Analysis Process

A
  1. Identification of Priorities
  2. Risk Identification
  3. Likelihood Assessment
  4. Impact Assessment
  5. Resource Prioritization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HVAC computer requirements

A
  1. Temperature 60 to 75 F (15 to 23 C)

2. Humidity 40 to 60%

17
Q

TCSEC Categories

A
  1. D minimal protection, any systems that fails higher levels
  2. C1 DAC; (identification, authentication, resource protection).
  3. C2 DAC; Controlled access protection (object reuse, protect audit trail).
  4. B1 MAC; (security labels) based on Bell LaPadula security model. Labeled security (process isolation, devices
  5. B2 MAC; Structured protection (trusted path, covert channel analysis). Separate operator/admin roles. Configuration management
  6. B3 MAC; security domain (trusted recovery, Monitor event and notification).
  7. A MAC; Formal, verified protection
18
Q

VPN Protocols

A
  1. PPTP
  2. L2F
  3. L2TP
  4. IPSec
  5. SSL and TLS
19
Q

Cipher Modes

A
  1. CBC - Cipher Block Cipher
  2. ECB - Electronic Code Book
  3. CFB - Cipher Feedback
  4. OFB - Output Feedback
  5. CTR - Counter
20
Q

Wireless Frequency Access Technologies

A
  1. FHSS – Frequency Hopping Spread Spectrum, The entire range of available frequencies is employed, but only one frequency at a time is used.
  2. DSSS - Direct Sequence Spread Spectrum, employs all the available frequencies simultaneously in parallel. This provides a higher rate of data throughput than FHSS. DSSS also uses a special encoding mechanism known as chipping code to allow a receiver to reconstruct data even if parts of the signal were distorted because of interference.
  3. OFDM – Orthogonal Frequency-Division Multiplexing, employs a digital multicarrier modulation scheme that allows for a more tightly compacted transmission. The modulated signals are perpendicular and thus do not cause interference with each other.
21
Q

IEEE standard for Bluetooth

22
Q

Incidence Response Steps

A
  1. Detection
  2. Response
  3. Reporting
  4. Recovery
  5. Remediation
  6. Review
23
Q

STRIDE

A
  1. Spoofing
  2. Tampering
  3. Repudiation
  4. Information Disclosure
  5. Denial of Service
  6. Elevation of Privilege
24
Q

POODLE

A

Padding Oracle On Downgraded Legacy Encryption

25
Types of ICS (Industrial Control System)
1. SCADA - supervisory control and data acquisition 2. PLC - programmable logic circuit 3. DCS - distributed control system
26
Fagan Code Review Steps
1. Planning 2. Overview 3. Preparation 4. Inspection 5. Rework 6. Follow-up
27
``` Port ##### TCP 0. FTP Data 1. FTP Control 2. Telnet 3. HTTP 4. HTTPS 5. SMTP 6. SSH ##### UDP 7. DNS 8. TFTP 9. SNMP ```
``` ##### TCP 0. 20 1. 21 2. 23 3. 80 4. 443 5. 25 6. 22 ##### UDP 3753 8. 69 9. 161 ```
28
PDU or Protocol Data Unit
``` 7 Application 6 Transport 5 Session 4 Transport - segment tcp/datagram udp 3 Network - packet 2 Data Link - frame 1 Physical ```
29
Private IP Addresses
RFC 1918 10. 0.0.0 - 10.255.255.255 172. 16.0.0 - 172.31.255.255 192. 168.0.0 - 192.168.255.255
30
Asymmetric Encryption
1. DSA 2. RSA 3. El Gamal 4. ECC 5. Diffie-Helman 6. Knapsack
31
X.509 | X.500
X.509 - digital certificate | X.500 - directory services
32
Hash and Digest
MD5 - 128 bit SHA1 - 160 bit SHA256 - SHA512 -
33
Regulatory Bodies
``` PCI DSS HIPAA FISMA GLBA DMCA Safe Harbor Act SOX ```