vocabularyQ2R Flashcards Preview

CISSP Vocabulary > vocabularyQ2R > Flashcards

Flashcards in vocabularyQ2R Deck (23)
Loading flashcards...
1
Q

Qualitative Risk Assessment

A

A technique that involves no numbers, only comparisons. This assessment type is used in ranking risks.

2
Q

Quantitative Risk Assessment

A

A structured technique that assigns a numerical value to the likelihood and the extent of a risk.

3
Q

Quantitative Risk Assessment

A

A structured technique which assigns a numerical value to the likelihood and the extent of a risk.

4
Q

Query Language

A

A language with primitive statements that extract data. A query language is required by every database and database product.

5
Q

RADIUS

A

Remote Authentication Dial-In User Server is a centralized authentication protocol that authenticates and authorizes users, generally through dial-up access, and provides the authentication mechanism that allows dial-up subjects to access objects.

6
Q

RADIUS

A

The Remote Authentication Dial-In User Service protocol is a centralized authentication protocol that authenticates and authorizes users, generally through dial-up access, and provides the authentication mechanism that allows dial-up subjects to access objects.

7
Q

RAM

A

Random access memory is a type of real memory. It includes dynamic RAM which is slower, cheaper, and must be periodically charged because it uses capacitors. It also includes static RAM which uses flip-flop circuits that do not lose their charges, which is faster and more expensive.

8
Q

Random Access

A

The act of accessing memory in any order.

9
Q

Reciprocal Processing Agreement

A

An agreement with a similar company that allows a disaster-stricken business to transfer data to the other business, thereby using their capacity until they recover.

10
Q

Reference Monitor

A

A control layer of software within the system that stands between subjects and objects to enforce access rules.

11
Q

Register

A

An area of extremely fast memory within the CPU that is easy for the CU and ALU to read from and write to.

12
Q

Relational Database

A

A database architecture model which dictates that all data is stored logically as a collection of tables, each containing fields, and stored independently of each other. In a true relational database, no true relationships are stored in the database.

13
Q

Replay Attack

A

A type of attack in which the attacker intercepts the session and records it in order to play back the session at a later time.

14
Q

Ring Topology

A

A LAN topology in which each node is connected to its neighbor on either side and messages travel from node to node until they reach their destination. This type of topology requires each machine to either have two NIC cards or special hardware allowing the NIC to connect on two sides.

15
Q

RISC

A

Reduced Instruction Set Computing is an instruction set design where there are few and smaller types of instructions that do one particular thing giving the compilers the option to combine small steps to get them to accomplish a specific task.

16
Q

Risk

A

The combination of threat and vulnerability at any given time.

17
Q

Risk Assessment

A

The process of identifying and categorizing risks that threaten each businesss priorities and processes.

18
Q

ROM

A

Read-only memory is a type of real memory that is put on a chip at the manufacturing location. It is true read-only memory, so it can never be changed. Lowest-level instructions are put on ROM.

19
Q

Rootkit

A

Freely available software that exploits known vulnerabilities and increases system access.

20
Q

ROT3 Cipher

A

A type of cryptography in which each character is taken and three is added to that character to create a new character value, such as an A becoming a D.

21
Q

Router

A

A network layer device that determines the most favorable path on which to forward network traffic.

22
Q

Row

A

A group of fields positioned horizontally on a table. Also may be referred to as a record.

23
Q

RSA Encryption

A

Rivest-Shamir-Adelman encryption is a patented public key encryption standard. It was created by Ronald Rivest, Adi Shamir, and Leonard Adelman in 1978.