Domain I: Security and Risk Management
Domain II: Asset Security
Domain III: Security Engineering
Domain IV: Communication and Network Security?
Domain V
100
These three terms are sometimes at opposition and it is the information security professional's job to balance them.
What are confidentiality, integrity, and availability?
100
These people determine data sensitivity labels and the frequency of data backups.
What are data owners?
100
This turns a ciphertext back into a plaintext.
What is decryption?
100

*****DOUBLE JEOPARDY******** Who developed theoretical computer science, providing a formalisation of the concepts of algorithm and computation.

Who is Alan Turing
100

This concentrates access control in one logical point for a system or organization.

What is centralized access control?

200
These hackers are malicious, lack ethics, and sometimes violate laws.
What are black hat attackers?
200
These are field-programmable devices, which means it is programmed after it leaves the factory. Examples are EPROMs, EEPROMS, and Flash Memory.
What are Programmable Logic Devices (PLD)?
200
This model is designed to avoid conflicts of interest by prohibiting one person, such as a consultant, from accessing multiple conflict of interest categories.
What is the Chinese Wall Model?
200

These are the seven layers of the OSI Model

What are Physical, Data Link, Network, Transport, Session, Presentation, Application?

200

This is the single point of failure in Kerberos.

What is the key distribution center?

300
This allows for the free flow of information while maintaining consistent protections of each member nation's citizens in the EU.
What is The EU Data Protection Directive?
300
What destroys the integrity of magnetic media such as tapes or disk drives by exposing them to a strong magnetic field?
What is degaussing?
300
These are the two primary rules of The Biba Model.
What are Simple Integrity Axiom and Integrity Axiom?
300

_____ uses a three-way handshake to establish a reliable connection. The connection is full duplex, and both sides _____ and _____ each other.

What are TCP, synchronize, and acknowledge?

300

This type of cracking attack will always be successful.

What is brute force?

400
The purpose of this is to allow for the creation of a brand that distinguishes the source of products or services.
What are trademarks?
400
This is OCTAVE's three step process for managing risk.
What is 1. Identifies staff knowledge, assets, and threats 2. identifies vulnerabilities and evaluates safeguards 3. Conducts the Risk Analysis and develops the risk mitigation strategy
400
These are the three primary types of modern encryption.
What are symmetric, asymmetric, and hashing?
400

This connects network nodes in a string--each node inspects the data as it passes along.

What is a bus?

400

Server A trusts server B. Server B trusts Server C. Server A therefore trusts server C. This term describes the trust relationship.

What is transitive trust?

500
This requires that once evidence is acquired, full documentation be maintained regarding the who, what, when, and where related to handling the evidence.
What is Chain of Custody?
500
This is a physical attack in which a person recovers trash in hopes of finding sensitive information that has been discarded.
What is dumpster diving?
500
This is a suite of protocols that provides a cryptographic layer to both IPv4 and IPv6?
What is IPsec?
500

This is described by IEEE standard 802.15 and it is a Personal Area Network wireless technology.

What is Bluetooth?

500

*****DOUBLE JEOPADRY ******** 

The first Network Intrusion Detection System (Network IDS), was designed and prototyped in the Computer Security Laboratory at the University of California, Davis, in 1989

What is Network Security Monitor (NSM).