CISSP 8 Domains Flashcards
Password Attacks falls under what doman?
Communication and Network Security Doman
What are the two kinds of Password Attacks?
1) Brute Force
2) Rainbow Table
Types of Social Engineering attacks
- Phishing
- Smishing
- Vishing-
- Whaling
- Social media phishing
- Business Email Compromise
- Watering hole attack
- USB baiting
- Physical social engineering
Social engineering attacks fall under what domain?
Security and Risk Management Domain
Physical Attacks fall under what domain?
Asset Security Domain
What are examples of physical attacks?
Malicious USB cable, Malicious flash drive, Card cloning and skimming
Adversarial artificial intelligence is a technique that…
manipulates
artificial intelligence and machine learning
technology to conduct attacks more efficiently.
Adversarial artificial intelligence falls under what domains?
1) communication and network security and
2) the identity and access management domains
Supply chain attack targets…
systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed. Because every item sold undergoes a process that involves third parties, this means that the security breach can occur at any point in the supply chain.
Supply chain attacks fall under which domain?
including but not limited to the security and risk management, security architecture and engineering, and security operations domains
Cryptographic attacks affect…
secure forms of communication between a sender and intended recipient. Some forms of cryptographic attacks are:
Birthday
Collision
Downgrade
Cryptographic attacks fall under which domain?
communication and network security domain
Threat Actor Types
- Advanced persistent threats
- Insider Threats
- Hacktivists
- Hackers (authorized/ethical hackers, semi auth/researchers, and unauth/enthical hackers)
Tasks associated with Security and Risk Management domain
Compliance, Defining security goals and objectives, business continuity.
Tasks associated with the security assessment and testing domain…
- Collecting and analyzing data
- Conducting security audits
- Auditing user permissions