A(s) Flashcards

1
Q

802.11

A

Wireless Networking Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity axiom

A

Biba property which states “no write up”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Property

A

Bell-LaPadula which states “no write down”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

“Bad” blocks/clusters/sectors

A

Good disk blocks marked as bad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

4GL

A

Fourth-generation programming language, designed to increase programmer’s efficiency by automating the creation of computer programming code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

802.11-1997

A

The original mode of 802.11 operated at 2 mbps using the 2.4 GHz frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

802.11a

A

802.11 mode that operates at 54 mbps using the 5 GHz frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

802.11b

A

802.11 mode that operates at 11 mbps using the 2.4 GHz frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

802.11g

A

802.11 mode that operates at 54 mbps using the 2.4 GHz frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

802.11i

A

The first 802.11 wireless security standard that provides reasonable security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

802.11n

A

802.11 mode that uses both 2.4 and 5 GHz frequencies and allows speeds of 144 mbps and beyond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

802.11X

A

Port-based Network Access Control, layer 2 authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ABM

A

Asynchronous Balanced Mode, HDLC combined mode where nodes may act as primary or secondary, initiating transmissions without receiving permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Abstraction

A

Hides unnecessary details from the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Acceptance Testing

A

Testing to ensure the software meets the customer’s operational requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Access aggregation

A

The collective entitlements granted by multiple systems to one user. Can lead to authorization creep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Access Control Matrix

A

Table defining what access permissions exist between specific subjects and objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Account Lockout

A

Disabled an account after a set number of failed logins, sometimes during a specific time period

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Accountability

A

Holds individuals accountable for their actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Accountability Principle

A

OECD privacy Guideline Principle which states individuals should have the right to challenge the content of any personal data being held, and have a process for updating their personal data if found to be inaccurate or incomplete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Accreditation

A

The Data owner’s acceptance of the risk represented by a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

ACK

A

TCP flag , acknowledge received data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Act honorably, honestly, justly,responsibly, and legally

A

Second canon of the (ISC)2 Code of Ethnics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Active RFID

A

Powered RFID tags that can operate via larger distances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Active-active cluster

A

Involves multiple systems all of which are online and actively processing traffic or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Active-passive cluster

A

Involves devices or systems that are already in place, configured, powered on and ready to begin processing network traffic should a failure occur on the primary system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

ActiveX Controls

A

The functional equivalent of Java applets. They use digital certificates instead of a sandbox to provide security

29
Q

Ad box mode

A

802.11 peer-to-peer mode with no central AP

30
Q

Address space Layout Randomization (ASLR)

A

Seeks to decrease the likelihood of successful exploitation by making memory addresses employed by the system less predictable

31
Q

Administrative Controls

A

Implemented by creating and following organizational policy, procedure, or regulation. Also called directive Controls

32
Q

Administrative law

A

Law enacted by government agencies, aka regulatory law

33
Q

ADSL

A

Asymmetric Digital Subscriber Line, DSL featuring faster download speeds than upload

34
Q

Advance and protect the profession

A

Fourth canon of the (ISC)2 code of ethics

35
Q

Advanced Encryption Standard (AES)

A

A block cipher using 128 bit, 192 bit, or 256 bit keys to encrypt 128-bit blocks of data

36
Q

Agents of law enforcement

A

Private citizens carrying out actions on behalf of law enforcement

37
Q

Aggregation

A

Mathematical attack where a user is able to use lower-level access to learn restricted information

38
Q

Agile software development

A

Flexible software development model that evolved as a reaction to rigid software development models such as waterfall model

39
Q

AH

A

Authentication Header, IPSec protocol that provides authentication and integrity for each packet of network data

40
Q

ALE

A

Annualized Loss Expectancy, the cost of loss due to a risk over a year

41
Q

All pair testing

A

Or pairwise testing , form of combinatorial software testing that tests unique pairs of inputs

42
Q

Allocated space

A

Portions of a disk partition that are marked as actively containing data

43
Q

ALU

A

Arithmetic Logic Unit, CPU component that performs mathematical calculations

44
Q

Analog

A

Communication that sends a continuous wave of information

45
Q

ANN

A

Artificial Neural Networks, simulate neural networks found in humans and animals

46
Q

ARO

A

Annual Rate of occurrence, the number of losses suffered per year

47
Q

Antivirus software

A

Software is designed to prevent and detect malware infections

48
Q

API

A

Application programming Interface, allows an application to communicate with an another application, or an operating system, database, network , etc.
For example, google maps API allows an application to integrate 3rd-party content, such as restaurants overlaid on a google map

49
Q

Applet

A

Small pieces of mobile code that are embedded in other software such as web browsers

50
Q

Application layer (OSI)

A

Layer 7 of the OSI model, where the user interfaces with the computer application

51
Q

Application layer (TCP/IP)

A

TCP/IP model layer that combines layer 5 through 7 of the OSI model

52
Q

Application-layer proxy

A

Proxy firewall that operates up to Layer 7

53
Q

ARCNET

A

Attached Resource Computer Network, a legacy LAN technology that uses tokens

54
Q

ARM

A

Asynchronous Response Mode, HDLC mode where secondary nodes may initiate communication with the primary

55
Q

ARPAnet

A

The predecessor of the internet

56
Q

Artificial Intelligence

A

The science of programming electronic computers to think more intelligently, Sometimes mimicking the ability of mammal brains

57
Q

Assembly language

A

Low-level computer programming language with instructions that are short mnemonics, such as “ADD”, “SUB”(subtract) and “JMP”(jump), that match to machine language instructions

58
Q

Asset

A

A resource that is valuable to an organization and must be protected

59
Q

AV

A

Asset Value, the value of a protected asset

60
Q

Asymmetric Encryption

A

Encryption that uses two keys: if you encrypt with one you may decrypt with the other

61
Q

Asynchronous Dynamic Token

A

Authentication token that is not synchronized with a central server; includes challenge-response tokens

62
Q

ATA Secure Erase

A

Hardware-level secure erase command available on Solid State Drives (SSDs) that erases all blocks and also generates a new encryption key

63
Q

ATM

A

Asynchronous Transfer Mode , a WAN technology that uses fixed length cells

64
Q

Attribute

A

A column in a rational database table

65
Q

Authentication

A

Proof of an identity claim

66
Q

Authorization

A

Actions an individual can perform on a system

67
Q

Authorization creep

A

Occurs when employees not only maintain old access rights but also gain new ones as they move from one division to another within an organization

68
Q

Availability

A

Assured information is available when needed

69
Q

Awareness

A

Security control designed to change user behavior