Boson Test Cissp
50 community-sourced questions and answers. Free — no login.
Throughput
Can be measured by the amount of time the authentication process takes
Kerberos Secret Key Storage
Clear text format
ESP in Transport Mode
Encrypts only the data sent over the IPSec VPN tunnel
ESP in Tunnel Mode
Encrypts the entire packet including headers
Object Oriented Database
Combines data and functions in a code-accessible framework
Change Management Step Interfacing the Most with Configuration Management
Documentation
Security Policy Best Practice
Short as possible
Base Metrics (CVSS)
Indicate the severity of the vulnerability and have largest influence on the final CVSS score
Temporal Metrics (CVSS)
Indicate the urgency fo the vulnerability and can change over time
Environmental Metrics (CVSS)
Optional and indicate how much an environment or end-user organization is affected by a vulnerability
CSU/DSU
Required to connect a data terminal equipment device such as a router to a digital circuit
/etc/shadow
Linux system file that contains secure user account info and can only be read by root
Explicit Permission
Permission assigned to a user at the user account level
Smart Phone Flash Memory
Data at rest stored on the device
Zachman Framework for Enterprise Architecture
ACM based methodology that enables the viewing of an architecture from six different perspectives
Finality Principle (EU)
Requires that data collected by an organization that monitors its employees be used for a specific, explicit, and legitimate purpose
Clark-Wilson
Focused on information integrity
Hybrid Security Guard Program
Combination of the proprietary security guard system and the contract security guard system
Dedicated Mode
Each user must have security clearance, access approval, and a valid need to know for all information processed by a system
System High Mode
A user must have a security clearance and access approval for all info processed by the system. They must also have a valid need to know for the information they will access on the system
Compartmented Mode
A user must have security clearance for all info processed by the system. They must also have access approval and a valid need to know for the information they will access on the system
Multilevel Mode
A user must have a security clearance, access approval, and a valid need to know that permits only the info they will access on the system
Side-Channel Attack
Passive attacks that are intended to glean info from a device by observing how the device operates under given conditions
CSMA/CA
Requires that the receiving device send acknowledgements
Static Software Testing
Includes walkthroughs, sanity checks, syntax checks, and logical reviews of code
Directory Traversal
Enables attacker to steal file contents from locations outside the web server's publicly accessible home directory on the server
False Positive (Vulnerability Assessment)
When an assessment identifies a business requirement as a vulnerability
What OSI layers correspond to the Network Access Layer of the TCP/IP Model?
Physical and Data Link
What OSI layer corresponds to the Internet Layer of the TCP/IP Model?
Network
What OSI layer corresponds to the Host-to-Host Layer of the TCP/IP Model?
Transport
What OSI layer corresponds to the Application Layer of the TCP/IP Model?
Session, Presentation, and Application
Layer 2 Ring Model
Device Drivers
Layer 1 Ring Model
OS Components that are not the kernel
Heap Metadata Protection
Buffer overflow protection
Private IP Range per RFC 1918
10.0.0.0 through 10.255.255.255; 172.16.0.0 through 172.31.255.255; 192.168.0.0 through 192.168.255.255
MIC
Feature of WPA that helps protect against man-in-the-middle attacks
Checksum
Output from a one-way hash function
VM Task Involving Enumeration of All Security Risks within a System
Vulnerability Scanning
Photoelectric Motion Sensor
Emits a beam of light to another sensor across a path that is monitored by the sensor
Passive Infrared Motion Sensor
Detects energy that is generated by body heat
DNS OSI Model Layer
Application (Layer 7)
Ephemeral Ports
Not assigned by IANA; Private/dynamic ports
Birthday Attack
Attempts to find two passwords with matching hashes
P2PE
Point to point encryption solution to prevent cardholder data theft
Facial Scan
Process of taking a person's photograph and comparing it to identified photographs in a database
Coaxial Cable
Contains single copper conductor at the cable core surrounded by shielding to mitigate data emanation from eh core
Fiber Optic Cable
Contains one or more glass or plastic fibers that are used to transmit data by using light signals
Pharming Attack
DNS cache poisoning attacks that attempt to modify a DNS cache by providing invalid information to a DNS server
IDS Primary Benefit
have a low false positive rate
Modern Ethernet Topology
Star
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials