A(s) Flashcards

1
Q

802.11

A

Wireless Networking Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity axiom

A

Biba property which states “no write up”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Property

A

Bell-LaPadula which states “no write down”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

“Bad” blocks/clusters/sectors

A

Good disk blocks marked as bad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

4GL

A

Fourth-generation programming language, designed to increase programmer’s efficiency by automating the creation of computer programming code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

802.11-1997

A

The original mode of 802.11 operated at 2 mbps using the 2.4 GHz frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

802.11a

A

802.11 mode that operates at 54 mbps using the 5 GHz frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

802.11b

A

802.11 mode that operates at 11 mbps using the 2.4 GHz frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

802.11g

A

802.11 mode that operates at 54 mbps using the 2.4 GHz frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

802.11i

A

The first 802.11 wireless security standard that provides reasonable security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

802.11n

A

802.11 mode that uses both 2.4 and 5 GHz frequencies and allows speeds of 144 mbps and beyond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

802.11X

A

Port-based Network Access Control, layer 2 authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ABM

A

Asynchronous Balanced Mode, HDLC combined mode where nodes may act as primary or secondary, initiating transmissions without receiving permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Abstraction

A

Hides unnecessary details from the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Acceptance Testing

A

Testing to ensure the software meets the customer’s operational requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Access aggregation

A

The collective entitlements granted by multiple systems to one user. Can lead to authorization creep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Access Control Matrix

A

Table defining what access permissions exist between specific subjects and objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Account Lockout

A

Disabled an account after a set number of failed logins, sometimes during a specific time period

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Accountability

A

Holds individuals accountable for their actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Accountability Principle

A

OECD privacy Guideline Principle which states individuals should have the right to challenge the content of any personal data being held, and have a process for updating their personal data if found to be inaccurate or incomplete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Accreditation

A

The Data owner’s acceptance of the risk represented by a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

ACK

A

TCP flag , acknowledge received data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Act honorably, honestly, justly,responsibly, and legally

A

Second canon of the (ISC)2 Code of Ethnics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Active RFID
Powered RFID tags that can operate via larger distances
26
Active-active cluster
Involves multiple systems all of which are online and actively processing traffic or data
27
Active-passive cluster
Involves devices or systems that are already in place, configured, powered on and ready to begin processing network traffic should a failure occur on the primary system
28
ActiveX Controls
The functional equivalent of Java applets. They use digital certificates instead of a sandbox to provide security
29
Ad box mode
802.11 peer-to-peer mode with no central AP
30
Address space Layout Randomization (ASLR)
Seeks to decrease the likelihood of successful exploitation by making memory addresses employed by the system less predictable
31
Administrative Controls
Implemented by creating and following organizational policy, procedure, or regulation. Also called directive Controls
32
Administrative law
Law enacted by government agencies, aka regulatory law
33
ADSL
Asymmetric Digital Subscriber Line, DSL featuring faster download speeds than upload
34
Advance and protect the profession
Fourth canon of the (ISC)2 code of ethics
35
Advanced Encryption Standard (AES)
A block cipher using 128 bit, 192 bit, or 256 bit keys to encrypt 128-bit blocks of data
36
Agents of law enforcement
Private citizens carrying out actions on behalf of law enforcement
37
Aggregation
Mathematical attack where a user is able to use lower-level access to learn restricted information
38
Agile software development
Flexible software development model that evolved as a reaction to rigid software development models such as waterfall model
39
AH
Authentication Header, IPSec protocol that provides authentication and integrity for each packet of network data
40
ALE
Annualized Loss Expectancy, the cost of loss due to a risk over a year
41
All pair testing
Or pairwise testing , form of combinatorial software testing that tests unique pairs of inputs
42
Allocated space
Portions of a disk partition that are marked as actively containing data
43
ALU
Arithmetic Logic Unit, CPU component that performs mathematical calculations
44
Analog
Communication that sends a continuous wave of information
45
ANN
Artificial Neural Networks, simulate neural networks found in humans and animals
46
ARO
Annual Rate of occurrence, the number of losses suffered per year
47
Antivirus software
Software is designed to prevent and detect malware infections
48
API
Application programming Interface, allows an application to communicate with an another application, or an operating system, database, network , etc. For example, google maps API allows an application to integrate 3rd-party content, such as restaurants overlaid on a google map
49
Applet
Small pieces of mobile code that are embedded in other software such as web browsers
50
Application layer (OSI)
Layer 7 of the OSI model, where the user interfaces with the computer application
51
Application layer (TCP/IP)
TCP/IP model layer that combines layer 5 through 7 of the OSI model
52
Application-layer proxy
Proxy firewall that operates up to Layer 7
53
ARCNET
Attached Resource Computer Network, a legacy LAN technology that uses tokens
54
ARM
Asynchronous Response Mode, HDLC mode where secondary nodes may initiate communication with the primary
55
ARPAnet
The predecessor of the internet
56
Artificial Intelligence
The science of programming electronic computers to think more intelligently, Sometimes mimicking the ability of mammal brains
57
Assembly language
Low-level computer programming language with instructions that are short mnemonics, such as “ADD”, “SUB”(subtract) and “JMP”(jump), that match to machine language instructions
58
Asset
A resource that is valuable to an organization and must be protected
59
AV
Asset Value, the value of a protected asset
60
Asymmetric Encryption
Encryption that uses two keys: if you encrypt with one you may decrypt with the other
61
Asynchronous Dynamic Token
Authentication token that is not synchronized with a central server; includes challenge-response tokens
62
ATA Secure Erase
Hardware-level secure erase command available on Solid State Drives (SSDs) that erases all blocks and also generates a new encryption key
63
ATM
Asynchronous Transfer Mode , a WAN technology that uses fixed length cells
64
Attribute
A column in a rational database table
65
Authentication
Proof of an identity claim
66
Authorization
Actions an individual can perform on a system
67
Authorization creep
Occurs when employees not only maintain old access rights but also gain new ones as they move from one division to another within an organization
68
Availability
Assured information is available when needed
69
Awareness
Security control designed to change user behavior