Information Systems Management > QUESTIONS & ANSWERS > CISSP test bank. Exam Question Review, revision guide, Full Coverage. Verified. (All)

CISSP test bank. Exam Question Review, revision guide, Full Coverage. Verified.

Document Content and Description Below

CISSP test bank. Exam Question Review, revision guide, Full Coverage. Verified. "Bad" Blocks/Clusters/sectors - ✔✔-Good disk blocks marked as bad 4GL - ✔✔-Fourth-generation programming lan... guage designed to increase programmers efficiency by automating the creation of computer programming code 4GL / Fourth-generation programming language - ✔✔-Designed to increase programmer's efficiency by automating the creation of computer programming code 802.1X - ✔✔-Port-based Network Access Control layer 2 authentication 802.11 - ✔✔-Wireless networking standard 802.11-1997 - ✔✔-The original mode of 802.11 operated at 2mbs using the 2.4 GHz frequency 802.11a - ✔✔-802.11 mode that operates at 54 mbps using the 5 GHz frequency 802.11b - ✔✔-802.11 mode that operates at 11 mbps using the 2.4 GHz frequency 802.11g - ✔✔-802.11 mode that operates at 54 mbps using the 2.4 GHz frequency 802.11i - ✔✔-The first 802.11 wireless security standard that provides reasonable security 802.11n - ✔✔-802.11 mode that uses both 2.4 and 5 GHz frequencies and allows speeds of 144 mbps and beyond ABM - ✔✔-Asynchronous Mode HDLC combined mode where nodes may act as primary or secondary, initiating transmission without receiving permission Abstraction - ✔✔-Hides unnecessary details from the user Acceptance Testing - ✔✔-Testing to ensure the software meets the customers operational requirements Access - ✔✔-A subject's ability to view, modify, or communicate with an object. Access enables the flow of information between the subject and the object. Access aggregation - ✔✔-The collective entitlements granted by multiple systems to one user. Can lead to authorization creep Access Control - ✔✔-Mechanisms, controls, and methods of limiting access to resources to authorized subjects only. Access Control list (ACL) - ✔✔-A list of subjects that are authorized to access a particular object. Typically, the types of access are read, write, execute, append, modify, delete, and create. Access Control Lists/ACL - ✔✔-Access Control List Access Control Matrix - ✔✔-Table defining what access permissions exist between specific subjects and objects Access Control Mechanism - ✔✔-Administrative, physical, or technical control that is designed to detect and prevent unauthorized access to a resource or environment. Account Lockout - ✔✔-Disables an account after a set number of failed logins, sometimes during a specific time period Accountability - ✔✔-A security principle indicating that individuals must be identifiable and must be held responsible for their actions. Accountability - ✔✔-Holds individuals accountable for their actions Accountability Principle - ✔✔-OECD Privacy Guideline principle which states individuals should have the right to challenge the content of any personal data being held, and have a process for updating their personal data if found to be inaccurate or incomplete Accreditation - ✔✔-The data owners acceptance of the risk represented by a system Accredited - ✔✔-A computer system or network that has received official authorization and approval to process sensitive data in a specific operational environment. There must be a security evaluation of the system's hardware, software, configurations, and controls by technical personnel. ACK - ✔✔-TCP flag, acknowledge received data Act honorably, justly, responsibly, and legally - ✔✔-Second canon of the (ISC)2 Code of ethics Active RFID - ✔✔-Powered RFID tags that can operate via larger distances Active-active Cluster - ✔✔-Involves multiple systems all of which are online and actively processing traffic or data Active-passive Cluster - ✔✔-Involves devices or systems that are already in place, configured, powered on and ready to begin processing network traffic should a failure occur on the primary system ActiveX controls - ✔✔-The functional equivalent of Java applets. They use digital certificates instead of a sandbox to provide security Ad hoc mode - ✔✔-802.11 peer-to-peer mode with no central AP Add-on Security - ✔✔-Security protection mechanisms that are hardware or software retrofitted to a system to increase that system's protection level. Address Space Layout Randomization/ASLR - ✔✔-Address Space Layout Randomization, seeks to decrease the likelihood of successful exploitation by making memory address employed by the system less predictable Administrative Controls - ✔✔-Implemented by creating and following organizational policy, procedures, or regulation. Also called directive controls Administrative Controls - ✔✔-Security mechanisms that are management's responsibility and referred to as "soft" controls. These controls include the development and publication of policies, standards, procedures, and guidelines; the screening of personnel; security-awareness training; the monitoring of system activity; and change control procedures. Administrative Law - ✔✔-Law enacted by government agencies, aka regulatory law ADSL - ✔✔-Asymmetric Digital Subscriber Line, DSL featuring faster download speeds than upload Advance and protect the profession - ✔✔-Fourth canon of the (ISC)2 Code of Ethics Advanced Encryption Standard/AES - ✔✔-Advanced Encryption Standard, a block cipher using 128 bit, 192 bit, or 256 bit keys to encrypt 128-bit blocks of data Agents of law enforcement - ✔✔-Private citizens carrying out actions on the behalf of law enforcement Aggregation - ✔✔-Mathematical attack where a user is able to use lower-level access to learn restricted information Aggregation - ✔✔-The act of combining information from separate sources of a lower classification level that results in the creation of information of a higher classification level, which the subject does not have the necessary rights to access. Agile Software Development - ✔✔-Flexible software development model that evolved as a reaction to rigid software development models such as the Waterfall Model AH/Authentication Header - ✔✔-Authentication Header, Ipsec protocol that provides authentication and integrity for each packet of network data AIC triad - ✔✔-The three security principles: availability, intregrity, and confidentiality. ALE/Annualized Loss Expectancy - ✔✔-The cost of loss due to a risk over a year All pairs testing - ✔✔-Form of combinatorial software testing that tests unique pairs of inputs otherwise known as (Pairwise testing) Allocated Space - ✔✔-Portions of disk partition that are marked as actively containing data ALU/Arithmetic Logic Unit - ✔✔-CPU Component that performs mathematical calculations Analog - ✔✔-Communications that sends a continuous wave of information ANN/Artificial Neural Networks - ✔✔-Simulate neural networks found in humans and animals Annualized loss expectancy (ALE) - ✔✔-A dollar amount that estiamtes the loss potenial from a risk in a span of a year. Single Loss Expectancy (SLE) x annualized rate of occurrence (ARO) = ALE Annualized Rate of Occurrence (ARO) - ✔✔-The value that represents the estimated possibility of a specific threat taking place within a one-year timeframe. Antimalware - ✔✔-Software whose principal functions include the identification and mitigation of malware; also known as antivirus, although this term could be specific to only one type of malware. Antivirus Software - ✔✔-Software designed to prevent and detect malware infections API/Application Programmers Interface - ✔✔-Allows an application to communicate with another application, or an operating system, database, network, etc. For example, The Google Maps API allows an application to integrate 3rd-party content such as restaurants overlaid on a Google Map Applet - ✔✔-Small pieces of mobile code that are embedded in other software such as web browsers Application Layer (OSI) - ✔✔-Layer 7 of the OSI model where the user interfaces with the computer application. Application Layer (TCP/IP) - ✔✔-TCP/IP model layer that combines Layers 5 through 7 of the OSI model Application-layer proxy - ✔✔-Proxy firewall that operates up to Layer 7 ARCNET - ✔✔-Attached Resource Computer Network, a Legacy LAN technology that uses tokens ARM/Asynchronous Response Mode - ✔✔-HDLC mode where secondary nodes may initiate communication with the primary ARO/Annual Rate of Occurrence - ✔✔-The number of losses suffered per year ARPAnet - ✔✔-The predecessor of the Internet Artificial Intelligence - ✔✔-The science of programming electronic computers to "think" more intelligently, sometimes mimicking the ability of mammal brains ASLR - ✔✔-Address Space Layout Randomization, seeks to decrease the likelihood of successful exploitation by making memory address employed by the system less predictable Assembly Language - ✔✔-Low-level computer programming Language with instructions that are short mnemonics, such as "ADD", "SUB" (subtract) and "JMP" (jump) that match to machine language instructions Asset - ✔✔-A resource that is valuable to an organization and must be protected Assurance - ✔✔-Ameasurement of confidence in the level of protection that a specific security control delivers and the degree to which is enforces the security policy. Asymmetric Encryption - ✔✔-Encryption that uses two keys: if you encrypt with one you may decrypt with the other Asynchronous Dynamic Token - ✔✔-Authentication that is not synchronized with a central server, includes challenge-response tokens ATA Secure Erase - ✔✔-Hardware-level secure erase command available on Solid State Drives (SSD's) that erases all blocks and also generates a new encryption key ATM/Asynchronous Transfer Mode - ✔✔-A WAN technology that uses fixed length cells Attack - ✔✔-An attempt to bypass security controls in a system with the mission of using that system or compromising it. An attack is usually accomplished by exploiting a current vulnerability. Attribute - ✔✔-A Column in a relational database table Audit Trail - ✔✔-A chronological set of logs and records used to provide evidence of a system's performance or activity that took place on the system. These logs and records can be used to attempt to reconstruct past events and track the activities that took place, and possibly detect and identify intruders. Authenticate - ✔✔-To verify the identity of a subject requesting the use of a system and/or access to network resources. The steps to giving a subject access to an object should be identification, authentication, and authorization. Authentication - ✔✔-Proof of an Identity claim Authorization - ✔✔-Actions an individual can perform on a system Authorization Creep - ✔✔-Occurs when employees not only maintain old access rights but also gain new ones as they move from one division to another within an organization. AV/Asset Value - ✔✔-The Value of a protected asset Availability - ✔✔-Assures information is available when needed Availability - ✔✔-The reliability and accessibility of data and resources to authorized identified individuals in a timely manner. Awareness - ✔✔-Security Control designed to change user behavior Back Door - ✔✔-An undocumented way of gaining access to a computer system. After a system is compromised, an attacker may load a program that listens on a port )back door) so that the attacker can enter the system at any time. A back door is also referred to as a trapdoor. Back up - ✔✔-Copy and move data to a medium so that it may be restored if the original data is corrupted or destroyed. A full backup copies all the data from the system to the backup medium. An incremental backup copies only the files that have been modified since the previous backup. A differential backup backs up all files since the last full backup. Backdoor - ✔✔-A shortcut in a system that allows a user to bypass security checks Background checks - ✔✔-A Verification of a person's background and experience, Also called preemployment screening Backward chaining - ✔✔-Expert system mode that starts with begins with a premise and works backwards Baseband - ✔✔-Network with one channel; can only send one signal at a time Baseline - ✔✔-The minimum level of security necessary to support and enforce a security policy. Baseline - ✔✔-Uniform ways to implement a safeguard , administrative control Baselining - ✔✔-The process of capturing a point in time understanding of the current system security configuration Bastion Host - ✔✔-Any host placed on the internet that is not protected by another device Bayesian filtering - ✔✔-Uses mathematical formulas to assign probabilities to make decisions such as identifying spam BCI - ✔✔-The Business Continuity Institute BCP - ✔✔-Business Continuity Plan, A long-term plan to ensure the continuity of business operations BCP/DRP project manager - ✔✔-The key point of contact for ensuring that a BCP/DRP is not only completed, but also routinely tested Bell-LaPadula - ✔✔-Security model focused on maintaining the confidentiality of objects Bell-LaPadula Model - ✔✔-The model uses a formal state transition model that describes its access controls and how they should perform. When the system must transition from one state to another, the security of the system should never be lowered or compromised. See also multilevel security, simple security proeprty, and start property (*-property). Best evidence rule - ✔✔-Requires use of the strongest possible evidence Best practice - ✔✔-A consensus of the best way to protect the confidentiality, integrity and availability of assets BGP - ✔✔-Border Gateway Protocol, the routing protocol used on the Internet Biba - ✔✔-Security model focused on maintaining the integrity of objects Biba Model - ✔✔-A formal state transition system of a computer security policy that describes a set of access control rules designed to ensure data integrity. Big Bang testing - ✔✔-Integration testing that tests all integrated software components Binary image - ✔✔-Bit-level copy of memory Biometrics - ✔✔-When used within computer security, identifies individuals by physiological characteristics, such as a fingerprint, hand geometry, or pattern in the iris. BIOS - ✔✔-Basic Input output System, typically stored in firmware BIOS/Basic Input Output System - ✔✔-Typically stored in Firmware Black box software testing - ✔✔-Gives the tester no internal details: the software is treated as a black box that receives inputs Black hat - ✔✔-Unethical hacker or researcher Blacklist - ✔✔-A set of known bad resources such as IP addresses, domain names, or applications. Blowfish - ✔✔-Block cipher using from 32 through 448 bit (the default is 128) keys to encrypt 64 bits of data Bluetooth - ✔✔-802.15 networking, a PAN wireless technology Bollard - ✔✔-A post designed to stop a car, typically deployed in front of building entrances Book cipher - ✔✔-Cryptographic method that uses whole words from a well-known text such as a dictionary as a one-to-one replacement for plaintext Boot sector virus - ✔✔-Virus that infects the boot sector of a PC, which ensures the virus loads upon system startup BOOTP - ✔✔-Bootstrap Protocol, used for bootstrapping via a network by diskless systems Bootstrap Protocol - BOOTP - ✔✔-Bootstrap Protocol, used for bootstrapping via a network by diskless systems Border Gateway Protocol - BGP - ✔✔-Border Gateway Protocol, the routing protocol used on the Internet Bot - ✔✔-A computer system running malware that is controlled via a botnet Botnet - ✔✔-A central bot command and control (C&C) network, managed by humans Bottom-Up programming - ✔✔-Starts with the low-level technical implementation details and works up to the concept of the complete program Breach notification - ✔✔-Notification of persons whose personal data has been, or is likely to have been, compromised Brewer-Nash / Chinese Wall Model - ✔✔-Model designed to avoid conflicts of interest by prohibiting one person, like a consultant, from accessing multiple conflict of interest categories (CoIs) BRI - ✔✔-Basic Rate interface, provides two 64 K digital ISDN channels BRI/Basic Rate Interface - ✔✔-Provides two 64k digital ISDN channels Bridge - ✔✔-Layer 2 device that has two ports and connects network segments together Broadband - ✔✔-Network with multiple channels; can send multiple signals at a time, like cable TV Broadcast - ✔✔-Traffic that is sent to all stations on a LAN Browsing - ✔✔-Searching through storage media looking for specific information without necessarily knowing what format the information is in. A browsing attack is one in which the attacker looks around a computer system either to see what looks interesting or to find specific information. BRP - ✔✔-Business Recovery Plan, details the steps required to restore normal business operations after recovering from a disruptive event. Also known as the Business Resumption Plan Brute force attack - ✔✔-Attack that attempts every possible key or combination Brute-Force Attack - ✔✔-An attack that continually tries different inputs to achieve a predefined goal, which can be used to obtain credentials for unauthorized access. BS-25999 - ✔✔-Continuity standard by the British Standards institution (BSI) Buffer overflow - ✔✔-Condition where an attacker can inset data beyond the end of a buffer variable Bus - ✔✔-Physical network topology that connects network nodes in a string Business Continuity Plan - BCP - ✔✔-Business Continuity Plan, A long-term plan to ensure the continuity of business operations Business Impact Analysis (BIA) - ✔✔-A functional analysis in which a team collects data, documents business functions, develops a hierarchy of business functions, and applies a classification scheme to indicate each individual function's criticality level. Business interruption testing - ✔✔-Partial or complete failover to an alternate site Business Owners - ✔✔-Also called Mission Owners, members of senior management who create the information security program and ensure that it is properly staffed, funded, and has organization priority Business Recovery Plan - BRP - ✔✔-Business Recovery Plan, details the steps required to restore normal business operations after recovering from a disruptive event. Also known as the Business Resumption Plan Business Resumption Plan - BRP - ✔✔-Business Recovery Plan, details the steps required to restore normal business operations after recovering from a disruptive event. Also known as the Business Resumption Plan Bytecode - ✔✔-Machine-independent interpreted code, used by Java Cable modem - ✔✔-Provide Internet access via broadband cable TV Cache memory - ✔✔-The fastest memory on the system, required to keep up with the CPU as it fetches and executes instructions Caesar Cipher - ✔✔-A rot-3 substitution cipher Callback - ✔✔-A procedure for identifying a system that accessed an environment remotely. In a callback, the host system disconnects the caller and then dials the authorized telephone number of the remote terminal in order to reestablish the connection. Synonymous with dialback. Callback - ✔✔-Modem-based authentication system Caller ID - ✔✔-Identifies the calling phone number, sometimes used as a weak authentication method Candidate keys - ✔✔-Any attribute (column) in the table with unique values Capability - ✔✔-A capability outlines the objects a subject can access and the operations the subject can carry out on the different objects. It indicates the access rights for a specific subject; many times, the capability is in the form of a ticket. Capability Maturity Model - CMM - ✔✔-Capability Maturity Model, a maturity framework for evaluating and improving the software development process Capability Maturity Model Integration (CMMI) - ✔✔-A process model that captures the organization's maturity and fosters continuous improvement. Carrier Sense Multiple Access - CSMA - ✔✔-Carrier Sense Multiple Access, a method used by Ethernet networks to allowed shared usage of a baseband network, and avoid collisions CASE - ✔✔-Computer-Aided Software Engineering, uses programs to create assist in the creation and maintenance of other computer programs CBC - ✔✔-Cipher Block Chaining, a block mode of DES that XORs the previous encrypted block of ciphertext to the next block of plaintext to be encrypted CCD - ✔✔-Charged Couple Discharge, a digital CCTV CCMP - ✔✔-Counter Mode CBC MAC Protocol, used by WPA2 to create a MIC CCTV - ✔✔-Closed Circuit Television, a detective device used to aid guards in detecting the presence of intruders in restricted areas CDN - ✔✔-Content Distribution networks (also Content Delivery Networks) use a series of distributed caching servers to improve performance and lower the latency of downloaded online content Central Processing Unit - CPU - ✔✔-Central Processing unit, the "brains" of the computer, capable of controlling and performing mathematical calculations Centralized access control - ✔✔-Concentrates access control in one logical point for a system or organization CER - ✔✔-Crossover Error Rate, describes the point where the False Reject Rate (FRR) and the False Accept Rate (FAR) are equal Certificate Authority - ✔✔-PKI component that authenticates the identity of a person or organization before issuing a certificate to them Certificate Revocation List - ✔✔-Certificate Revocation Lists, PKI component which lists digital certificates that have been revoked Certification - ✔✔-A detailed inspection that verifies whether a system meets the documented security requirements Certification - ✔✔-The technical evaluation of the security components and their compliance for the purpose of accreditation. A certification process can use safeguard evaluation, risk analysis, verification, testing, and auditing techniques to assess the appropriateness of a specific system processing a certain level of information within a particular environment. The certification is the testing of the security component or system, and the accreditation is the approval from management of the security component or system. CFB - ✔✔-Cipher Feedback, a stream mode DES that is similar to block-mode CBC Chain of custody - ✔✔-Requires that once evidence is acquired, full documentation regarding who, what, when and where evidence was handled is maintained Chaining - ✔✔-Block cipher mechanism that seeds the previous encrypted block into the next block to be encrypted Challenge Handshake Authentication Protocol - CHAP - ✔✔-Challenge Handshake Authentication Protocol, a more secure network authentication protocol that uses a shared secret Challenge/Response Method - ✔✔-A method used to verify the identity of a subject by sending the subject an unpredictable or random value. If the subject responds with the expected value in return, the subject is authenticated. Change management - ✔✔-The process of understanding, communicating, and documenting changes Channel Service Unit/Data Service Unit - CSU/DSU - ✔✔-Channel Service Unit/Data Service Unit, DCE device. CHAP - ✔✔-Challenge Handshake Authentication Protocol, a more secure network authentication protocol that uses a shared secret Charged Couple Discharge - CCD - ✔✔-Charged Couple Discharge, a digital CCTV Checklist testing - ✔✔-Lists all necessary components required for successful recovery, and ensures that they are, or will be, readily available should a disaster occur. Also knows as consistency testing Chinese Wall Model - ✔✔-Model designed to avoid conflicts of interest by prohibiting one person, like a consultant, from accessing multiple conflict of interest categories (CoIs) CIA triad - ✔✔-Confidentiality, Integrity and Availability CIDR - ✔✔-Classless Inter-Domain Routing, allows for many network sizes beyond the arbitrary stateful network sizes Cipher - ✔✔-A Cryptographic algorithm Cipher Block Chaining - CBC - ✔✔-Cipher Block Chaining, a block mode of DES that XORs the previous encrypted block of ciphertext to the next block of plaintext to be encrypted Cipher disk - ✔✔-Cryptographic device that uses two concentric disks, each with an alphabet around the periphery Cipher Feedback - CFB - ✔✔-Cipher Feedback, a stream mode DES that is similar to block-mode CBC Ciphertext - ✔✔-A encrypted message Ciphertext - ✔✔-Data that has been encrypted and is unreadable until it has been converted into plaintext. Circuit-level proxy - ✔✔-Proxy firewall that operates at Layer 5 Circuit-switched network - ✔✔-Network that provides a dedicated circuit or channel between two nodes Circumstantial evidence - ✔✔-Evidence that servers to establish the circumstances related to particular points or even other evidence CIRT - ✔✔-Computer Incident Response Team, a team that performs incident handling CISC - ✔✔-Complex Instruction Set Computers, CPU instructions that are longer and more powerful Civil law - ✔✔-Law that resolves disputes between individuals or organizations Civil law (legal system) - ✔✔-Legal system that leverages codified laws or statues to determine what is considered within the bounds of law Clark-Wilson - ✔✔-Real-world integrity model that protects integrity by having subjects access objects via programs Clark-Wilson Model - ✔✔-An integrity model that addresses all three integrity goals: prevent unauthorized users from making modification, prevent authorized users from making improper modifications, and maintain internal and external consistency through auditing. Class I gate - ✔✔-Residential gate designed for home use Class II gate - ✔✔-Commercial gate, such as a parking garage gate Class III gate - ✔✔-Industrial/limited access gate, such as a loading dock Class IV gate - ✔✔-Restricted access gate, used at an airport or prison Classful address - ✔✔-IPv4 networks in classes A through E Classification - ✔✔-A systematic arrangement of objects into groups or categories according to a set of established criteria. Data and resources can be assigned a level of sensitivity as they are being created, amended, enhanced, stored, or transmitted. The classification level then determines the extent to which the resource needs to be controlled and secured, and is indicative of its value in terms of information assets. Classless Inter-Domain Routing - CIDR - ✔✔-Classless Inter-Domain Routing, allows for many network sizes beyond the arbitrary stateful network sizes Clearance - ✔✔-A determination, typically made by a senior security professional, about whether or not a user can be trusted with a specific level of information Cleartext - ✔✔-In data communications, cleartext is the form of a message or data, which is transferred or stored without cryptographic protection. Client-side attacks - ✔✔-Attack where a user downloads malicious content Clipper Chip - ✔✔-(Failed) 1993 Escrowed Encryption Standard (EES), which used the Skipjack algorithm Clipping level - ✔✔-A minimum reporting threshold level Closed Circuit Television - CCTV - ✔✔-Closed Circuit Television, a detective device used to aid guards in detecting the presence of intruders in restricted areas Closed source - ✔✔-Software released in executable form: the source code is kept confidential Closed system - ✔✔-System using proprietary hardware or software Cloud computing - ✔✔-The use of share remote computing devices for the purpose of providing improved efficiencies, performance, reliability, scalability, and security. CMM - ✔✔-Capability Maturity Model, a maturity framework for evaluating and improving the software development process CMP - ✔✔-Crisis Management Plan Coaxial - ✔✔-Network cabling that has an inner copper core separated by an insulator from a metallic braid or shield COBIT - ✔✔-Control Objectives for Information and related Technology, a control framework for employing information security governance best practices within an organization COCOM - ✔✔-Committee for Multilateral Export Controls, a munitions law which was in effect from 1947 to 1994. It was designed to control the export of critical technologies (including cryptography) to "Iron Curtain" countries during the cold war Code Repositories - ✔✔-Secure service for storing source code of projects, a public example is GitHub Codebreakers (The) - ✔✔-David Kahn's history of cryptography Cohesion - ✔✔-OOP concept that describes as independent object. Objects with high cohesion have low coupling Cold Site - ✔✔-A backup site with raised floor, power, utilities, and physical security, and no configured systems or data Collection Limitation Principle - ✔✔-OECD Privacy Guideline principle which states personal data collection should have limits, be obtained in a lawful manner, and, unless there is a compelling reason to the contrary, with the individuals knowledge and approval. Collision - ✔✔-Two or more plaintexts that generate the same hash Collusion - ✔✔-An agreement between two or more individuals to subvert the security of a system Collusion - ✔✔-Two or more people working together to carry out a fraudulent activity. More than one person would need to work together to cause some type of destruction or fraud; this drastically reduces its probability. Color of law - ✔✔-Acting on the authority of law enforcement COM - ✔✔-Component Object Model, locates, and connects objects locally Combinatorial software testing - ✔✔-Black box testing method that seeks to identify and test all unique combinations of software inputs Commandments of Computer Ethics - ✔✔-The Computer Ethics institute code of ethics Commercial Off-the-Shelf Software - ✔✔-See - COTS Commit - ✔✔-Makes changes to a database permanent Common Criteria - ✔✔-An internationally agreed upon standard for describing and testing the security of IT projects Common law - ✔✔-Legal system that places significant emphasis on particular cases and judicial precedent as a determinant of laws Common Object Request Broker Architecture - ✔✔-See- COBRA Communications Security - ✔✔-Controls in place to protect information as it is being transmitted, especially by telecommunications mechanisms. [Show More]

Last updated: 2 years ago

Preview 1 out of 116 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Also available in bundle (1)

CISSP test BUNDLE, QUESTIONS AND ANSWERS, VERIFIED.

CISSP test bank - Exam questions to study/review 1. Top questions with accurate answers, 100% Accurate. VERIFIED.

By Topmark 2 years ago

$36

14  

Reviews( 0 )

$14.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

84
0

Document information


Connected school, study & course


About the document


Uploaded On

Mar 14, 2023

Number of pages

116

Written in

Seller


seller-icon
Topmark

Member since 2 years

70 Documents Sold

Reviews Received
7
4
0
0
0
Additional information

This document has been written for:

Uploaded

Mar 14, 2023

Downloads

 0

Views

 84

Document Keyword Tags


$14.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·