CISSP 8 Domains Flashcards

1
Q

Password Attacks falls under what doman?

A

Communication and Network Security Doman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two kinds of Password Attacks?

A

1) Brute Force
2) Rainbow Table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Types of Social Engineering attacks

A
  • Phishing
  • Smishing
  • Vishing-
  • Whaling
  • Social media phishing
  • Business Email Compromise
  • Watering hole attack
  • USB baiting
  • Physical social engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Social engineering attacks fall under what domain?

A

Security and Risk Management Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Physical Attacks fall under what domain?

A

Asset Security Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are examples of physical attacks?

A

Malicious USB cable, Malicious flash drive, Card cloning and skimming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Adversarial artificial intelligence is a technique that…

A

manipulates
artificial intelligence and machine learning
technology to conduct attacks more efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Adversarial artificial intelligence falls under what domains?

A

1) communication and network security and

2) the identity and access management domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Supply chain attack targets…

A

systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed. Because every item sold undergoes a process that involves third parties, this means that the security breach can occur at any point in the supply chain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Supply chain attacks fall under which domain?

A

including but not limited to the security and risk management, security architecture and engineering, and security operations domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cryptographic attacks affect…

A

secure forms of communication between a sender and intended recipient. Some forms of cryptographic attacks are:

Birthday

Collision

Downgrade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cryptographic attacks fall under which domain?

A

communication and network security domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Threat Actor Types

A
  • Advanced persistent threats
  • Insider Threats
  • Hacktivists
  • Hackers (authorized/ethical hackers, semi auth/researchers, and unauth/enthical hackers)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Tasks associated with Security and Risk Management domain

A

Compliance, Defining security goals and objectives, business continuity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Tasks associated with the security assessment and testing domain…

A
  • Collecting and analyzing data
  • Conducting security audits
  • Auditing user permissions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tasks associated with Identity and Access Management…

A
  • Ensuring users follow established policies
  • Controlling physical assets,
  • Setting up an employees access keycard
17
Q

Security Controls

A

Safeguards designed to reduce specific security risks

18
Q

CIA Triad

A

A foundational model that helps inform how organizations consider risk when setting up systems and security policies

C- Confidentiality
I- Integrity
A- Availability

19
Q

Security Frameworks

A

guidelines used for building plans to help mitigate risks and threats to data and privacy. They have four core components:

  • Identifying and documenting security goals
  • Setting guidelines to achieve security goals
  • Implementing strong security processes
  • Monitoring and communicating results
20
Q

Examples of frameworks include…

A

the NIST Cybersecurity Framework (CSF) and

the NIST Risk Management Framework (RMF)

FedRAMP is a U.S. federal government program that standardizes security assessment, authorization, monitoring, and handling of cloud services and product offerings. Its purpose is to provide consistency across the government sector and third-party cloud providers.

Center for Internet Security (CIS®)
CIS is a nonprofit with multiple areas of emphasis. It provides a set of controls that can be used to safeguard systems and networks against attacks. Its purpose is to help organizations establish a better plan of defense. CIS also provides actionable controls that security professionals may follow if a security incident occurs.

General Data Protection Regulation (GDPR)
GDPR is a European Union (E.U.) general data regulation that protects the processing of E.U. residents’ data and their right to privacy in and out of E.U. territory.

Payment Card Industry Data Security Standard (PCI DSS)
PCI DSS is an international security standard meant to ensure that organizations storing, accepting, processing, and transmitting credit card information do so in a secure environment. The objective of this compliance standard is to reduce credit card fraud.

21
Q

HIPPA

A

HIPAA is a U.S. federal law established in 1996 to protect patients’ health information. This law prohibits patient information from being shared without their consent. It is governed by three rules:

Privacy

Security

Breach notification

21
Q

Security Frameworks

A

guidelines used for building plans to help mitigate risks and threats to data and privacy. They have four core components:

  • Identifying and documenting security goals
  • Setting guidelines to achieve security goals
  • Implementing strong security processes
  • Monitoring and communicating results
22
Q

International Organization for Standardization (ISO)

A

ISO was created to establish international standards related to technology, manufacturing, and management across borders. It helps organizations improve their processes and procedures for staff retention, planning, waste, and services.

23
Q

System and Organizations Controls (SOC type 1, SOC type 2)

A

The American Institute of Certified Public Accountants® (AICPA) auditing standards board developed this standard. The SOC1 and SOC2 are a series of reports that focus on an organization’s user access policies at different organizational levels such as:

Associate

Supervisor

Manager

Executive

Vendor

Others

They are used to assess an organization’s financial compliance and levels of risk. They also cover confidentiality, privacy, integrity, availability, security, and overall data safety. Control failures in these areas can lead to fraud.

24
Q

International standpoint on counterattacks

A

a person or group can counterattack if:

The counterattack will only affect the party that attacked first.

The counterattack is a direct communication asking the initial attacker to stop.

The counterattack does not escalate the situation.

The counterattack effects can be reversed.