Boson Cissp
21 community-sourced questions and answers. Free — no login.
what ethernet field contains a 4-byte cyclic redundancy check, CRC, value?
Frame check sequence, FCS.
Swapping
Processes are swapped in and out of main memory to the disk.
minutiae in access control
loops, whorls, ridges, and bifurcations in a fingerprint.
Tripwire
Host-based IDS. Monitors integrity of critical OS files.
RPC
Remote Procedure Call. Session layer. Allows a client to execute a process on a remote server.
Tcp/IP model
-armadillos take in new ants, From the top,- application, transport, internet, network access
RAID 5
Striping with parity; only protects against single drive failure, need minimum of 3 disks.
pharming attack
uses a zombie farm to launch a massive phishing attack by poisoning a DNS server
After completion of an SSL handshake, a ___ key is used to provide security.
symmetric session
A service account enables:
an application to perform system level actions.
Type 2 Authentication
Something you have
___ divides CPU time among Child processes
multithreading
Pointer encoding
buffer overflow protection mechanism recommended, but not required, in the microsoft security development lifecycle.
RSA is particularly susceptible to:
Chosen ciphertext attacks. Attackers can encrypt plaintext with the user's public key and analyze the result.
___ was found to be susceptible to POODLE attacks in 2014.
SSL
Protocol that secures communication between a web browser and a web server
Transport Layer Security
Database replication
Mirrors a Live database, allowing simultaneous reads and writes.
Memory aid for smurf attacks
I see my papa (icmp) smurf, smurf, smurf. DoS attack using ICMP echo requests.
CPU Pipelining stages
Fetch, decode, execute, write
Wireless standards that use orthogonal frequency division multiplexing (ofdm)
802.11, A., G, & N.
TLS replaced ___, which was officially deprecated in 2015.
SSL, secure sockets layer
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials