Exam Flashcards
NETWORK ASSESSMENT TOOLS
ISS, SATAN, BALLISTA
HDSL
1.55MBPS UPSTREAM 1.55MBPS DOWNSTREAM
SODA ACID
SUPPRESSES FUEL SUPPLY
TIME TO SWITCH AND TIME PRESSING KEY
FLIGHT TIME AND DWELL TIME
RED BOOK
NETWORK
GREEN BOOK
PASSWORD MANAGEMENT
TEMPERATURE THAT DAMAGES MAGNETIC MEDIA
100 DEGREES
RED BOX
SOUND OF COINS
BLUE BOX
TONE, FREQ FOR LONG DISTANCE
BLACK BOX
LINE VOLTAGE, RECEIVER’S END
FRAGMENTATION
TEAR DROP
ABSTRACT MACHINE THAT MEDIATES ALL ACCESS BETWEEN SUBJECTS AND OBJECTS
REFERENCE MONITOR
NUMBER OF COLUMNS IN TABLE
DEGREE
APPLICATION LAYER, 2 ASYMMETRICAL KEYS -or- 2 DIGITAL CERTIFICATES
SET
MD5 SIZE OF DIGEST
128 BITS
SHA-1 SIZE OF DIGEST
160 BITS
B2
STRUCTURED, SEPARATION OF DUTIES
B3
SECURITY DOMAIN
PASSWORD-TWO UNRELATED WORDS
COMPOSITION
SATISFY REAL WORLD REQUIREMENTS
VALIDATION
DECISION SUPPORT SYSTEM (DSS) PROVIDES
FLEXIBILITY
BEST PROGRAMMING HAS
HIGH COHESION AND LOW COUPLING
COHESION
ONLY ONE PROCESS OR ONLY RELATED PROCESSES
COUPLING
INTERACTION REQUIRED
RISK
LIKELIHOOD
IP HEADER-TCP NUMBER
6
IP HEADER-ICMP NUMBER
1
IP HEADER-IGMP NUMBER
2
IP HEADER-UDP NUMBER
17
IMPORTANT FOR EVIDENCE
CHAIN OF CUSTODY
DATABASE ROWS
TUPLE
NETWORK REDUNDANCY
DUAL BACKBONE
DRAW CONCLUSIONS
INFERENCE
SUSTAINING-DURING AND AFTER
BUSINESS CONTINUITY PLAN
FIRST STEP
POLICY
STEP-BY-STEP
PROCEDURE
RECOMMENDED
GUIDELINES
CONTENT DEPENDENT-ADVANTAGE
MORE GRANULAR
CONTENT DEPENDENT-DISADVANTAGE
OVERHEAD
PROTECT ONLY WITHIN A FEW INCHES
CAPACITANCE DETECTOR
TRANSMIT ONLINE TRANSACTIONS TO REMOTE FACILITY
ELECTRONIC VAULTING
CELL PHONE-PREVENT MONITORING
TIME DIVISION MULTIPLEXING
CCTV IS MAINLY
DETECTIVE
LINUX, PREVENTS USERS FROM SEEING DATA
SHADOW
ORANGE BOOK
TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC)
RADIUS-ACT AS CLIENT
NETWORK ACCESS SERVER (NAS)
LOCK PICKING TECHNIQUE FOR COMBINATION LOCKS
SHIMMING
DES NUMBER OF ROUNDS
16
FLEXIBLE SUPPORT FOR O/S
FLASK FLUX ADVANCED SECURITY KERNEL
ID PICTURE, VERIFY AUTHENTICITY ON A DOCUMENT
WATERMARK
PROPER LIFECYCLE OF EVIDENCE
COLLECTION, ANALYSIS, STORAGE, PRESENT IN COURT, RETURN TO OWNER
ALGORITHMS BASED ON DISCRETE LOGARITHMS
EL GAMAL, DIFFIE-HELLMAN, ECC
24 HOURS A DAY PROCESSING, GOOD ALTERNATIVE TO TAPE BACKUP
BACKUP TO JUKEBOX
NUMBER OF COMBINATIONS FOR A NUMERIC PASSWORD THAT IS 1-4 DIGITS
10,000 COMBOS
SSO BENEFIT
MORE EFFICIENT LOG-ON
ACCOUNTABILITY=TRACED BACK TO
INDIVIDUAL
IPSEC LAYER AND PROTOCOLS USED
L3, AH AND ESP, ESP=INTEGRITY AND CONFIDENTIALITY
REASONABLE MEASURES TO ENSURE
DUE CARE