Shared Flashcard Set

Details

CISSP Vocabulary
The Definition will be given, you must guess the correct CISSP term
47
Computer Science
Professional
06/23/2010

Additional Computer Science Flashcards

 


 

Cards

Term
INVOLVES CHANGING data before, or as it is entered into the computer
Definition
Data diddling
Term
What is called a system that is capable of detecting that a fault has occurred and has the ability to correct the fault or operate around it?
Definition
A fault-tolerant system
Term
To communicate management's intentions in regards to information security
Definition
Corporate Security Policy
Term
Advanced Research Projects Agency Network (ARPANET), Department of Defense Research Projects Agency Network (DARPANET), Defense Data Network (DDN), or DoD Internets is referred to as
Definition
The Internet
Term
Located right behind your first Internet firewall
Definition
DMZ
Term
Which communication method is characterized by very high speed transmission rates that are governed by electronic clock timing signals?
Definition
Synchronous Communication
Term
What is a TFTP server most useful for?
Definition
Transferring configurations to and from network devices.
Term
Refers to the data left on the media after the media has been erased
Definition
remanence
Term
When should a post-mortem review meeting be held after an intrusion has been properly taken care of?
Definition
Within the first week of completing the investigation of the intrusion.
Term
What is a class C fire?
Definition
electrical
Term
›The air goes out of a room when a door is opened and outside air does not go into the room.
Definition
Positive pressurization
Term
A prolonged power supply that is below normal voltage is a:
Definition
brownout
Term
Within the CEH curriculum there are 4 tenets on which security rests, what are those 4 tenets?
Definition
Confidentiality, Integrity, Availability, Authenticity
Term
A strongly protected computer that is in a network protected by a firewall (or is part of a firewall) and is the only host (or one of only a few hosts) in the network that can be directly accessed from networks on the other side of the firewall?
Definition
A bastion host
Term
What is a difference between a Quantitative Analysis versus a Qualitative Risk Analysis?
Definition
quantitative analysis provides formal cost/benefit analysis and qualitative does not
Term
An attribute in one relation that has values matching the primary key in another relation?
Definition
foreign key
Term
Represents the number of columns in a table
Definition
degree
Term
What algorithm has been selected as the AES algorithm, replacing the DES algorithm?
Definition
Rijndael
Term
Used for Key agreement (key distribution) and cannot be used to encrypt and decrypt messages.
Definition
Diffie-Hellman algorithm
Term
a function that takes a variable-length string a message, and compresses and transforms it into a fixed length value referred to as a hash value. It provides integrity, but no confidentiality, availability or authentication.
Definition
one-way hash
Term
The Orange book requires protection against two types of covert channels- what are they?
Definition
Timing and Storage
Term
A communications path that enables a process to transmit information in a way that violates the system’s security policy.
Definition
covert channel
Term
A covert channel that involves writing to a storage location by one process and the direct or indirect reading of the storage location by another process. Covert storage channels typically involve a resource (for example, sectors on a disk) that is shared by two subjects at different security levels.
Definition
Covert Storage Channel
Term
A covert channel in which one process modulates its system resource (for example, CPU cycles), which is interpreted by a second process as some type of communication.
Definition
Covert Timing Channel
Term
Frequently referred to as the Orange Book, is the centerpiece of the DoD Rainbow Series publications.
Definition
TCSEC
Term
Replaced with the development of the Common Criteria international standard originally published in 2005.
Definition
TCSEC
Term
Its three primary goals are Data processing continuity planning, data recovery plan maintenance, and testing the disaster recovery plan.
Definition
business impact assessment
Term
A chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software.
Definition
exploit
Term
It has multiple network interfaces, each connected to separate networks.
Definition
multi-homed host
Term
High-level statements, beliefs, goals and objectives and the general means for their attainment for a specific subject area
Definition
Policies
Term
Are mandatory activities, action, rules or regulations designed to provide policies with the support structure and specific direction they require to be effective.
Definition
Standards
Term
Are more general statements of how to achieve the policies objectives by providing a framework within which to implement procedures.
Definition
Guidelines
Term
Spell out the specific steps of how the policy and supporting standards and how guidelines will be implemented.
Definition
Procedures
Term
Which protocol makes USE of an electronic wallet on a customer's PC and sends encrypted credit card information to merchant's Web server, which digitally signs it and sends it on to its processing bank?
Definition
SET (Secure Electronic Transaction)
Term
An administrative declaration by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards
Definition
Accreditation
Term
Which Orange Book evaluation level is described as "Labeled Security Protection"?
Definition
B1
Term
Which Orange book security rating introduces security labels?
Definition
B1
Term
Which kind of evidence would printed business records, manuals and printouts classify as?
Definition
Documentary evidence
Term
What is the name of the first mathematical model of a multi-level security policy used to define the concept of a secure state, the modes of access, and rules for granting access?
Definition
Bell-LaPadula Model
Term
TCP/IP layer provides for reliable end-to-end communications, ensures the data's error-free delivery, handles the data's packet sequencing, and maintains the data's integrity. It is comparable to the transport layer of the OSI model.
Definition
Host-to-host transport layer
Term
What layer of the OSI/ISO model does Point-to-point tunnelling protocol (PPTP) work at?
Definition
Data link layer
Term
Which approach to a security program makes sure that the people actually responsible for protecting the company's assets are DRIVING the program?
Definition
The top-down approach
Term
The verification that what is being installed does not affect any portion of the application system already installed. It generally requires the support of automated process to repeat tests previously undertaken.
Definition
Regression testing
Term
The set of allowable values that an attribute can take.
Definition
domain of a relation
Term
An entity that issues digital certificates (especially X.509 certificates) and vouches for the binding between the data items in a certificate.
Definition
Certification authority
Term
A domain of trust that shares a single security policy and single management.
Definition
A security domain
Term
An agreement between two companies with like equipments and processing needs provides an inexpensive alternative to other off-site facilities.
Definition
Reciprocal agreement
Supporting users have an ad free experience!