CISSP Flash Cards
- What are some examples of detective access controls?
Security guards, supervising users, incident investigations, and intrusion detection systems
- What are some examples of physical access controls?
Guards, fences, motion detectors, locked doors, sealed windows, lights, backups, cable protection, laptop locks, swipe cards, dogs, CCTV, mantraps, and alarms
- What are the three commonly recognized authentication factors?
Something you know, something you have, and something you are
- What is a cognitive password?
A series of questions about facts or predefined responses that only the subject should know (for example, what is your birth date? What is your mother’s maiden name?)
- Name at least eight biometric factors.
Fingerprints, face scans, iris scans, retina scans palm topography, palm geography, heart/pulse pattern, voice patter, signature dynamics, keystroke patterns
- What are the issues related to user acceptance of biometric enrollment and throughput rate?
Enrollment times longer than 2 minutes are unacceptable; subjects will typically accept a throughput rate of about 6 seconds or faster.
- What access control technique employs security labels?
Mandatory access controls. Subjects are labeled as to their level of clearance. Objects are labeled as to their level of classification or sensitivity.
- The Bell-LaPadula, Biba, and Clark-Wilson access control models were all designed to protect a single aspect of security. Name the corresponding aspect for each model.
Bell-Lapadula: Protects confidentiality
Biba and Clark-Wilson: protect integrity
Name the three types of subjects and their roles in a security environment.
The user accesses objects on a system to perform a work task; the owner is liable for protection of data; the data custodian is assigned to classify and protect data.
- Explain why the separation of duties and responsibilities is a common security practice.
It prevents any single subject from being able to circumvent or disable security mechanisms.
- What is the principle of least privilege?
Subjects should be granted only the amount of access to objects that is required to accomplish their assigned work tasks.
- Name the four key principles upon which access control relies.
Identification, authentication, authorization, accountability
- How are domains related to decentralized access control?
A domain is a realm of trust that shares a common security policy. This is a form of decentralized access control.
- Why is monitoring an important part of a security policy?
Monitoring is used to watch for security policy violations and to detect unauthorized or abnormal activities.
- What are the functions of an intrusion detection system (IDS)?
An IDS automates the inspection of audit logs and real-time system events, detects intrusion attempts, and watched for violations of confidentiality, integrity, and availability.
- What are the pros and cons of a host-based IDS?
It can pinpoint resources compromised by a malicious user. It can’t detect network-only attacks or attacks on other systems, has difficulty detecting DoS attacks, and can be detected by intruders.
- What are the pros and cons of a network-based IDS?
It can monitor a large network and can be hardened against attack. It may be unable to handle large data flows, requires a central view of traffic, and can’t pinpoint compromised resources.
- What are the differences between knowledge-based and behavior-based detection methods used by IDS?
Knowledge-based uses a signature database and tries to match monitored events to that database. Behavior-based learns about the normal activities on your system through watching and learning.
- What is a honeynet, and what is it used for?
Honeynets are fake networks used to lure intruders in order to create sufficient audit trails for tracking them down and prosecuting. Honeynets contain no real or sensitive data.
- How does penetration testing improve your system’s security?
Penetration testing is a good way to accurately judge the security mechanisms deployed by an organization.
- What is a denial-of-service attack?
An attack that prevents the system from receiving, processing, or responding to legitimate traffic or requests for resources and objects.
- What is a spoofing attack?
The attacker pretends to be someone or something other than whom or what they are. They can spoof identities, IP addresses email addresses, and phone numbers. They often replace the valid source and/or destination IP address and node numbers with false ones.
- What are countermeasures to spoofing attacks?
Countermeasures to spoofing attacks include patching the OS and software, enabling source/destination verification on routers, and employing an IDS to detect and block attacks.
- What is a man-in-the-middle attack?
An attack in which a malicious user is positioned between the two endpoints of a communication’s link
- What is a replay or Playback attack?
A malicious user records the traffic between a client and a server and then retransmits them to the server with slight variations of the timestamp and source IP address. It is similar to hijacking.
- What is a sniffer attack?
Any activity that results in a malicious user obtaining information about a network or the traffic over that network. Data is captured using a sniffer or protocol analyzer.
- What is a spamming attack?
Directing floods of messages to a victim’s email inbox or other messaging system. Such attacks cause DoS issues y filling up storage space and preventing legitimate messages from being delivered.
- What are some countermeasures to common attack methods?
Patching software, reconfiguring security, employing firewalls, updating filters, using IDSs/IPSs, improving security policy, using traffic filters, improving physical access control, using system monitoring/auditing
- Name the seven layers of the OSI model by their layer name and layer number.
7 - Application 6 - Presentation 5 - Session 4 - Transport 3 - Network 2 - Data Link 1 - Physical
- List the security features offered by the Network layer of the OSI model.
The Network layer (layer 3) offers confidentiality, authentication, and integrity.
- What is the maximum throughput rate and maximum usable distance for 10Base2 cable?
10Base2 cable has a throughput of 10 Mbps and can be run up to distances of 185 meters.
- Name the common network topologies.
Ring, bus, star, and mesh
- What are the four layers of the TCP/IP protocols, and how do they relate to the OSI model layers?
The four layers of TCP/IP are Application (layers 5-7 of OSI), Transport (layer 4 of OSI), internet (layer 3 of OSI), and Link (layers 1 and 2 of OSI).
- What are the five generation types of firewalls?
Static packet filtering, application- level gateway, stateful inspection, dynamic packet filtering, and kernel proxy
- Name at least five networking device types other than firewalls
Routers, switches, hubs, repeaters, bridges, gateways, proxies.
- What is a proxy, and what is it used for?
Any system that performs a function or requests a service on behalf of another system. Proxies are most often used to provide clients with Internet access while protecting their identity.
- Name at least 10 network and protocol security mechanisms.
IPsec, SKIP, SWIPE, SSL, S/MIME, SET, PEM, PGP, PPP, SLIP, PPTP, L2TP, CHAP, PAP, RADIUS, TACACS, S-RPC
- Name at least six protocol services used to connect to LAN and WAN communication technologies.
Frame Relay, SMDS, X.25, ATM, HSSI, SDLC, HDLC, ISDN
- How are PVC, SVC, DTE, and DCE used in a Frame Relay network?
Frame Relay requires the use of a DTE and a DCE at each connection point, PVC is always available; SVC is established using the best paths currently available.
What are three remote access authentication mechanisms?
RADIUS, DIAMETER, and TACACS
- What is tunneling, and why is it used?
A process that protects the contents of packets by encapsulating them in another protocol. This creates the logical illusion of a communications tunnel through an untrusted intermediary network.
What is a VPN?
A Virtual Private Network (VPN) is a communication tunnel that provides point-to-point transmission of both authentication and data traffic over an intermediary network.
- What are the four primary VPN protocols?
PPTP, L2F, L2TP, and IPsec (Note: SSL/TLS is a valid VPN protocol as well, but it’s not necessarily recognized on the exam as such.
- What are the two modes available through IPsec, and what do they do?
In transport mode, the IP packet data is encrypted, but the header is not. In tunnel mode, the entire IP packet is encrypted, and a new header is added to govern transmission through the tunnel.
- What is NAT?
Network Address Translation (NAT) allows the private IP addresses defined in RFC 1918 to be used in a private network while still being able to communicate with the internet.
- What is transparency?
A characteristic of a service, security control, or access mechanism that ensures it is unseen by users
- What are some important aspects to consider when designing email security?
Nonrepudiation, access control, message integrity, source authentication, verified delivery, acceptable use policies, privacy, management, and backup and retention policies.
- What is the most serious threat of email?
Email is a common delivery mechanism for viruses, worms, Trojan horses, documents with destructive macros, and other malicious code.
- What are possible mechanisms for adding security to email?
S/MIME, MOSS, PEM, and PGP
- What are elements of effective user training against social-engineering attacks?
Always error on the side of caution whenever communications are odd or unexpected. Always request proof of identity. Identify what information can be conveyed via voice communications by classifying the information. Never change passwords over the phone.
- What are the most common threats against communication systems?
Denial of service, eavesdropping, impersonation, replay, and modification
- What are some countermeasures to eavesdropping?
Maintaining physical access security, using encryption, employing one-time authentication methods
- What is an ARP attack?
The modification of ARP mappings. When ARP mappings are falsified, packets are not sent to their proper destination. ARP mappings can be attacked through spoofing. Spoofing provides false MAC addresses for requested IP addressed systems to redirect traffic to alternate destinations.
- What is privacy?
Prevention of unauthorized intrusion, knowledge that information deemed personal or confidential won’t be shared with unauthorized entities, freedom from being observed without consent
- What are the requirements for accountability?
Identification, authentication, authorization, and auditing
What is nonrepudiation?
Nonrepudiation prevents a subject from claiming not to have sent a message, not to have performed an action, or not to have been the cause of an event.
What is layering?
Layering is the use of multiple controls in a series. The use of a multilayered solution allows for numerous controls to be brought to bear against whatever threats occur.
- How is abstraction used?
Abstraction is used to collect similar elements into groups, classes, or roles that are assigned security controls, restrictions, or permissions.
- What is data hiding?
Data hiding is preventing data from being known by a subject. Keeping a database from being accessed by unauthorized visitors is a form of data hiding.
- What is change control or change management?
A mechanism used to systematically manage change. Typically, it involves extensive logging, auditing, and monitoring of activities related to security controls and security solutions.
- What are the goals of change management?
Implementation of changes in an orderly manner, formalized testing, ability to reverse changes, ability to inform users of changes, systematical analysis of changes minimization of negative impact of changes
- What is data classification?
Data classification is the primary means by which data is protected based on categories of secrecy, sensitivity, or confidentiality.
- What criteria are used to classify data?
Usefulness, timeliness, value or cost, maturity or age, lifetime or expiration period, disclosure damage assessment, modification damage assessment, national or business security implications, storage
- What is the government/military data classification scheme?
Top secret, Secret, Confidential, Sensitive, and Unclassified
- What is the commercial business/private sector classification scheme?
Confidential, Private, Sensitive, and Public
Name at least seven security management concepts and principles.
CIA Triad, confidentiality, Integrity, Availability, privacy, identification, authentication, authorization, auditing, accountability, and nonrepudiation
- What are the elements of a termination procedure policy?
Have at least one witness; escort terminated employee off the premises immediately; collect identification, access, or security devices; perform exit interview; disable network account.
- What is the function of the data owner security role?
The data owner is responsible for classifying information for protection within the security solution.
- What is the data custodian security role?
The data custodian is assigned the tasks of implementing the prescribed protection defined by the security policy and upper management.
- What is the function of the auditor security role?
The auditor is responsible for testing and verifying that the security policy is properly implemented and the derived security solutions are adequate.
- What should the documents that make up a formalized security structure include?
Policies, standards, baselines, guidelines, and procedures
- What is generally involved in the processes of risk management?
Analyzing an environment for risks, evaluating each risk as to its likelihood and damage, assessing the cost of countermeasures, and creating a cost/benefit report to present to upper management
- What should be considered when establishing the value of an asset?
Cost of purchase, development, maintenance, acquisition, and protection; value to owners/users/competitors; equity value; market valuation; liability of asset loss; and usefulness.
- Name at least five possible threats that should be evaluated when performing a risk analysis.
Viruses; buffer overflows; coding errors; user errors; intruders (physical and logical); natural disasters; equipment failure; misuse of data, resources, or services; loss of data; physical theft; denial of service
- What is single loss expectancy, and how is it calculated?
The cost associated with a single realized risk against a specific asset. SLE = asset value (AV) * Exposure Factor (EF). The SLE is expressed in a dollar value.
- What is annualized loss expectancy, and how is it calculated?
The possible yearly cost of all instances of a specific realized threat against a specific asset. ALE = Single Loss Expectancy (SLE) * annualized rate of occurrence (ARO).
- What are the basic distinctions between qualitative and quantitative risk analysis?
Quantitative risk analysis assigns real dollar figures to the loss of an asset. Qualitative risk analysis assigns subjective and intangible values to the loss of an asset.
- What are the four possible responses by upper/senior management to risk?
Reduce/mitigate, assign/transfer, accept, or reject/deny
- What is residual risk?
Once countermeasures are implemented, the risk that remains is known as residual risk. Residual risk is the risk that management has chosen to accept rather than mitigate.
- What is total risk?
The amount of risk an organization would face if no safeguards were implemented. A formula for total risk is threatsvulnerabilities asset value = total risk.
- What is the controls gap?
The difference between total risk and residual risk. The controls gap is the amount of risk that is reduced by implementing safeguards.
- What are the three learning levels of security?
Awareness, training, and education
- What are the three types of plans employed in security management planning?
A strategic plan is a long-term plan that is fairly stable. The tactical plan is a midterm plan that provides more details. Operational plans are short term and highly detailed.
- How many primary keys may each dataase table have?
One
- What type of malicious code spreads through the sharing of infected media?
Viruses
- What term is used to describe intelligent code objects that perform actions on behalf of a user?
Agent
- What term is used to describe code sent by a server to a client for execution on the client machine?
Applet
- What language developed by Sun Microsystems, owned by Oracle, is often used for applet programming and development?
Java
- What type of database key enforces relationships between tables?
Foreign key
- What security principle ensures that multiple records are created in a database table for viewing at different security levels?
Polyinstantiation
- What process evaluates the technical and nontechnical security features of an IT system?
Certification and accreditation
- What type of accreditation evaluates the systems and applications at a specific, self-contained location?
Site accreditation
- In which phase of the Software Capability Maturity Model do you often find hardworking people charging ahead in a disorganized fashion?
Initial
- In which layer of the ring protection scheme do user applications reside?
Layer 3
- What system mode requires that the system process only one classification level at a time and all system users have a clearance and need to know that information?
Dedicated security mode
- What is another term for the Master boot record?
Boot sector
- What type of virus embeds itself in application documents?
Macro virus
- What can antivirus programs do when they encounter a virus infection?
Delete the file, disinfect the file, or quarantine the file.
- What type of virus modifies itself each time it infects a new system in an attempt to avoid detection?
Polymorphic virus
- What type of malicious code launches itself when certain conditions (such as a specific date) are met?
Logic bomb
- What were the mechanisms of action used by Robert T. Morris’s Internet worm of 1988?
The worm exploited vulnerabilities in the Sendmail debug mode and finger daemon, launched password attacks, and exploited trust relationships between systems.
- Where are passwords stored in a Unix system?
In the /etc/passwd or /etc/shadow file.
- What term is used to describe hackers rooting through trash looking for useful information?
Dumpster diving
- What is the cornerstone of computer security?
Education
- What are the three phases of the three-way handshake used by TCP/IP?
SYN, SYN/ACK, ACK
- How does the teardrop attack operate?
It sends overlapping packet fragments to the victim machine.
- What is the term used to describe a secret method used by a programmer to gain access to the system?
Trap door (or back door)
- When is the XOR function true?
When only one of the input bits is true
- What term describes a mathematical function that easily produces output values for each possible combination of inputs but makes it impossible to retrieve the input values?
One-way function
- True or false? All ciphers are meant to obscure the meaning of a message.
True
- True or false? All codes are meant to obscure the meaning of a message.
False
- What occurs when a change in the plain text results in multiple changes spread through the cipher text?
Diffusion
- What type of cipher is the Caesar cipher?
Simple substitution
- True or false? Modern cryptosystems rely on the secrecy of the encryption algorithm.
False
- What is the length of the key used by the standard DES algorithm?
56 bits
- How many rounds of encryption does DES utilize
16
- True or false? The IDEA algorithm is available free for noncommercial use.
True
- What encryption algorithm was selected for the advanced Encryption Standard (AES)?
Rijndael
- What is the Diffie-Hellman algorithm most commonly used for?
Key exchange
- True or false? The Hashed Message Authentication Code (HMAC) provides nonrepudiation.
False
- What are the three encryption algorithms supported by the Digital Signature Standard?
DSA, RSA, and ECDSA
- What ITU standard describes the contents of a digital certificate?
X.509
- What is the process by which you are issued a digital certificate?
Enrollment
- Who issues digital certificates?
Certificate authorities (CAs)
- True or false? PEM provides protection against replay attacks.
False
- What protocol uses the RSA encryption algorithm to provide encrypted mail support for a number of common commercial email packages?
S/MIME
- True or false? S-HTTP secures individual messages between a client and a server
True
- What cryptographic methods are used by the Secure Electronic Transaction (SET) protocol
RSA Public key cryptography and DES private key cryptography in connection with digital certificates.
- What are the four components of IPSec?
Authentication Header (AH), Encapsulating Security Payload (ESP), IP Payload Compression Protocol (IPComp), and Internet Key Exchange (IKE)
- What type of cryptographic attack is used against algorithms that don’t incorporate temporal protections?
Replay attack
- What are some common reasons a certificate might need to be revoked?
The certificate was compromised, the certificate was erroneously issued, the certificate details changed, the private key was exposed, or there was a change of security association.
- What type of cryptography relies on the use of public and private keys?
Asymmetric
- What technology allows multiple users to make use of the same process without interfering with each other?
Multithreading
- What are some of the terms used to describe the CPU mode that gives access to the full range of supported instructions?
System mode, privileged mode, supervisory mode, and kernel mode
- What is the greatest security risk to RAM modules?
Theft
- What addressing scheme supplies the CPU with the actual address of the memory location to be accessed?
Direct addressing
- Magnetic/optical media devices are classified as what type of memory?
Secondary
- Memory devices designed to retain their data when power is removed are known as ___________.
nonvolatile
- What two ways can storage devices be accessed?
Randomly and sequentially
- What is the greatest security risk to computer monitors?
TEMPEST technology
- What is another term often used for firmware?
Microcode
- Where are the operating system-independent primitive instructions that a computer needs to start and load the operating system stored?
BIOS
- What concept ensures that data existing at one level of security is not visible to processes running at different security levels?
Data hiding
- What are the important factors in personnel management?
Hiring practices, ongoing job performance reviews, and termination procedures
- What security mechanisms are countermeasures to collusion?
Job rotation, separation of duties, mandatory vacations, workstation change
- Why is antivirus protection important?
Viruses are the most common form of security breach in the IT world. Any communications pathway can and is being exploited as a delivery mechanism for a virus or other malicious code.
- What is need to know?
Need to know is the requirement to have access to, knowledge of, or possession of data or a resource in order to perform specific work tasks.
- What principle states that users should be granted the minimum amount of access to the secure environment as possible for them to be able to complete their work tasks?
Principle of least privilege
- What are due care and due diligence?
Due care is using reasonable care to protect the interest of an organization. Due diligence is practicing the activities that maintain the due care effort.
- How are security and illegal activities related?
A secure environment should provide mechanisms to prevent the committal of illegal activities, which are actions that violate a legal restriction, regulation, or requirement.
- With what level of security precautions should backup media be treated?
Backup media should be handled with the same security precautions as any other asset with the same data classification.
- What are the goals of managing backup media?
Preventing disclosure, destruction, or alteration of data
- What are the processes that can be applied to used media in order to prepare the media for reuse in various environments?
Erasing, clearing, and overwriting media that will be used in the same classification environments; purging, sanitizing, and degaussing if media is used in different classification environments
- What are the classifications of security control types?
Preventive, deterrent, detective, corrective, recovery, compensation, directive
- What is the purpose of auditing?
To ensure compliance with security policy and to detect abnormalities, unauthorized occurrences, or outright crimes.
- What types of activities are labeled as auditing?
Recording of event/occurrence data, examination of data, data reduction, use of event/occurrence alarm triggers, log analysis, logging, monitoring, using alerts, intrusion detection
- What is the purpose of compliance testing?
To ensure that all of the necessary and required elements of a security solution are properly deployed and functioning as expected
- How are audit trails used?
To reconstruct an event, to extract information about an incident, to prove or disprove culpability
- What types of activities can be used as penetration tests?
War dialing, sniffing, eavesdropping, radiation monitoring, dumpster diving, social engineering, port scanning, ping scanning, vulnerability scanning, and actual compromise activities
- What are some ways to keep inappropriate content to a minimum?
Address the issue in the security policy, perform awareness training, use content filtering tools to filter source or word content.
- Why is it important to protect against resource waste?
If the storage space, computing power, or networking bandwidth capacity is consumed y inappropriate or non-work-related (non-profit-producing) data, the organization loses money.
- Why is it important to protect against privilege abuse?
It can cause the disclosure of sensitive information, violating the principle of confidentiality.
- What countermeasures are moderately effective against errors and omissions?
Input validators and user training
- How can you protect data against fraud and theft?
The use of access controls (auditing and monitoring, for example) reduce fraud and theft.
- What are some safeguards against sabotage?
Intensive auditing, monitoring for abnormal or unauthorized activity, keeping lines of communication open between employees and managers, and compensating and recognizing employees for excellence
- Why isn’t there an effective direct countermeasure against the threat of malicious hackers or crackers?
Most safeguards and countermeasures protect against one specific threat or another, but it is not possible to protect against all possible threats that a cracker represents.
- What is malicious code?
Malicious code is any script or program that performs an unwanted, unauthorized, or unknown activity on a computer system.
- True or false? Senior management should be included in the BCP process from the beginning.
True
What resource is in greatest demand during the BCP testing, training, and maintenance process?
Manpower
- What type of decision making is mainly concerned with metrics such as dollar values and downtime?
Quantitative
- What Business Impact Analysis/Assessment variable is used to describe the longest period of time a resource can be unavailable without causing irreparable harm to the business?
Maximum tolerable downtime (MTD)
- What is the formula for computing single loss expectancy?
SLE= AV*EF [Single Loss Expectancy = Asset Value * Exposure Factor]
- What is the formula for computing annualized loss expectancy?
ALE = SLE*ARO [Annualized Loss Expectancy = Single Loss Expectancy * Annual Rate of Occurrence]
- What are some of the qualitative factors that must e taken into account when assessing the cost of a disaster?
Loss of goodwill among client base, loss of employees after prolonged downtime, social/ethical responsibilities to the community, and negative publicity
- What is the first thing you should do when a disaster strikes?
Ensure that people are safe.
- What are the two possible responses to a risk?
Acceptance and mitigation
- Provide two examples of devices that might be used to harden a system.
Computer-safe fire suppression systems and uninterruptible power supplies
- What is the goal of business continuity planning (BCP)?
To ensure the continuous operation of a business in the face of an emergency situation
- What are some of the elements that should be included in emergency response guidelines?
Immediate response procedures, notification procedures, and secondary response procedures
- What are the five steps of the business impact assessment process?
Identification of priorities, risk identification, likelihood assessment, impact assessment, and resource prioritization
- What process brings order to the chaotic events surrounding the interruption of an organization’s normal activities by an emergency?
Disaster Recovery Planning (DRP)
- Name some common natural disasters.
Earthquakes, floods, storms, tornadoes, and fires
- What organization sponsors the National Flood Insurance Program and is a good source of historical flood information?
Federal Emergency Management Agency (FEMA)
- What disaster recovery system is often highly dependent on the public water supply?
Fire suppression system
- What type of disaster recover separates recovery sites by business teams?
Workgroup recovery
- What are the three major options for alternative processing sites?
Hot sites, warm sites, and cold sites
- What type of recovery site is particularly suited to workgroup recovery options?
Mobile site
- True or false? Organizations participating in a mutual assistance agreement are typically located in the same geographic region.
True
- True or false? There is an accepted standards document defining the requirements for an electronic vaulting solution.
False
- What is the most common document type used for emergency response plans?
Checklists
- What are the three major types of filesystem backups?
Full backups, Incremental backups, and Differential backups
- What can be used to protect a company against the failure of a developer to provide adequate support?
Software escrow agreements
- It is sometimes useful to separate disaster _____________tasks from disaster_____________tasks.
Recovery, restoration (in either order)
- True or false? In most circumstances, it is illegal for an employer to monitor an employee’s email.
False
- If a witness is not able to uniquely identify an object, how else may it be authenticated in court?
By establishing a chain of evidence
- What type of evidence is an authenticated computer log?
Documentary evidence
- What are the three major evidence admissibility requirements?
Evidence must be relevant, material, and competent.
- What law created the category of mission-critical computer systems?
Government Information Security Reform Act
- What are the two requirements for acceptance of a trademark application?
The trademark must not be confusingly similar to another trademark, and it must not be descriptive.
- What are the three requirements for acceptance of a patent application?
The invention must be new, useful, and nonobvious.
- How long does trade secret protection last?
Indefinitely
- What type of license agreements are written on the outside of software packaging and require no action from the user other than opening the package?
Shrink-wrap
- What amendment to the US Constitution forms the basis for privacy rights?
Fourth Amendment
- What law requires that websites provide parents with the opportunity to review any information collected from their children?
Children’s Online Privacy Protection Act
- What law grants privacy rights to students enrolled in educational institutions that accept government funding?
Family Educational Rights and Privacy Act
- Which type of computer crime attacks an organization’s computer system to extract confidential information?
Business attack
- Which type of computer crime would likely be timed to occur simultaneously with a physical attack to reduce the ability to effectively respond to the physical attack?
Terrorist attack
- What term refers to any hardware, software, or data that can be used to prove the identity and actions of an attacker?
Evidence
- What term describes any violation or threatened violation of a security policy?
Incident
- Which type of incident generally does not cause direct damage to the victim?
Scanning. The purpose of a scanning attack is to collect information. The real damage to the system occurs in later attacks.
- How do you protect your system from a malicious code incident?
Make sure your security policy restricts the introduction of untested files to your computer system. Have a good scanner with an up-to-date signature database. Frequently scan all files. Implement whitelisting of applications.
- Which two types of incidents are the easiest to stop by dynamically altering filtering rules?
Scanning and denial of service. They can both potentially be stopped by filtering out the offending packets.
- What must you do to make sure evidence is kept viable for use in a trial?
You must ensure that the evidence has not changed, and you must be able to validate its integrity.
- Where should you begin looking to find information about an incident that occurred in the recent past?
The first place to look is in the system and network log files.
- If an incident has occurred that has violated no laws or regulations, how do you determine whether to report it?
The incident reporting guidelines should be in your security policy.
- Is adherence to the (ISC)2 Code of Ethics recommended, mandatory, or optional for CISSPs?
Adherence to the (ISC)2 Code of Ethics is mandatory, and acceptance of the Code of Ethics is a condition of certification.
- What is the leading reason many incidents are not reported?
Because they are not recognized as incidents
- What are the three main types of physical security controls?
Administrative physical security controls, technical physical security controls, physical controls for physical security.
- What is the primary purpose of lighting as a physical security device?
To discourage casual intruders, trespassers, prowlers, and would-be thieves.
- What are the benefits of security guards?
They are able to adapt and react to any condition or situation, are able to learn and recognize attack patterns, can adjust to a changing environment, and are able to make decisions and judgment calls.
- What are the disadvantages of security guards?
Not all environments support them; prescreening, bonding, and training is not always effective; they are expensive, subject to illness, take vacations, and are vulnerable to social engineering.
- What are the benefits and disadvantages of guard dogs?
They can be deployed as a perimeter security control and as detection and deterrent agents, they are costly and require high maintenance, and their use involves insurance and liability issues.
- What are the 11 electrical terms and definitions you should be aware of?
Fault, blackout, sag, brownout, spike, surge, inrush, noise, transient, clean, ground
- What are the types of noise or interference and their sources?
Common mode noise is generated by the difference in power between the hot and ground wires. Traverse mode noise is generated by the difference in power between the hot and neutral wires.
- What are the typical HVAC requirements for a computer room?
A computer room should be kept at 60 to 75 degrees Fahrenheit (15 to 23 degrees Celsius). Humidity in a computer room should be maintained at between 40 and 60 percent.
- What type of damage occurs when static electricity discharges exceed 40 volts?
Destruction of sensitive circuits
- What is a Type C fire extinguisher used for, and what is it made of?
A Type C fire extinguisher is for use on electrical devices thus the extinguishing agent is non-conductive, so the devices might use CO2, halon, or various alternatives.
- What are the four types of water-based fire suppression systems?
Wet pipe system, dry pipe system, deluge system, preaction system
- What are the alternatives for halon?
FM-200 (HFC-227ea), CEA-410 or CEA 308, NAF-S-III (HCFC Blend A), FE-13 (HCFC-23), Aragon (IG55) or Argonite (IG01), Intergen (IG541), and low-pressure water mists
- Which security vulnerability conveys information by altering the performance of a system component or modifying as resource’s timing in a predictable manner?
Covert timing channel
- What is a separate object that is associated with a resource and describes its security attributes?
Security token
- In the Clark-Wilson security model, what is a procedure that scans data items and confirms their integrity
Integrity verification procedure (IVP)
- In the Biba integrity model, what is the Simple Integrity Axiom, which states that a subject cannot read an object of a lower integrity, also called?
No read down
- Which organization developed the Bell-LaPadula security model?
The US Department of Defense
- What is the collection of TCB components that work together to implement the reference monitor functions?
Security kernel
- What does ITSEC call the system that is being evaluated?
the Target Of Evaluation (TOE)
- What TCSEC category is reserved for systems that have been evaluated but do not meet the requirements of any other category?
Category D (minimal protection)
- Which IPsec protocol provides integrity, authentication, and nonrepudiation to the secure message exchange?
Authentication Header (AH)
- Which type of controls considers static attributes of the subject and the object to determine the permissibility of an access?
Mandatory access controls
- What term is used to refer to the user or process that makes a request to access a resource?
Subject
- What is the imaginary boundary that separates the TCB from the rest of the system?
Security perimeter
- What term describes the technical evaluation of each part of a computer system to assess its concordance with security standards?
Certification
- What is the difference between analog and digital signals?
Analog communications occur with a continuous signal that varies in frequency, amplitude, and so on. Digital communications occur through the use of a state change of on-off pulses.
- What is the difference between synchronous and asynchronous communications?
Synchronous communications rely on a timing or clocking mechanism. Asynchronous communications rely on a stop and start delimiter bit to manage transmission of data.
- What is the difference between baseband and broadband communications?
Baseband technology uses a direct current to support a single communication channel. Broadband technology uses frequency modulation to support multiple simultaneous signals.
- Describe broadcast, multicast, and unicast communications
A broadcast supports communications to all possible recipients. A multicast supports communications to multiple specific recipients. A unicast supports only a single communication to one recipient.
- What is the difference between packet switching and circuit switching?
In circuit switching, a dedicated physical pathway is created between the two parties. Packet switching occurs when the message is broken up into segments and sent across the intermediary network.
- What are the characteristics of PPP?
The Point-to-Point Protocol (PPP) is an encapsulation protocol designed to support the transmission of IP traffic over dial-up or point-to-point links. PPP supports CHAP and PAP for authentication.
- What are the characteristics of SLIP?
Serial Line Internet Protocol (SLIP) offers no authentication, supports only half-duplex communications, has no error-detection capabilities, and requires manual link establishment and teardown.
- What is CORBA?
Common Object Request Broker Architecture (CORBA) is an international standard (sanctioned by the International Organization for Standardization [ISO]) for distributed computing.
- What’s the most desirable default setting for access control?
Denial. When access is not specifically granted, it should be denied by default. This is also known as implicit deny.
- What type of approach to security is considered better than a fortress mentality approach?
Defense in depth, multiple layers of security, concentric circles of security.
- What form of password attack consists first of a dictionary attack and then a bruteforce attack based on the dictionary list?
A hybrid attack. Sometimes called a one-upped password attack.
- What is the most acceptable form of biometrics to end users?
Iris scans
- What is the most unacceptable form of biometric control to end users?
Retina scans
- What is the stored sample of a biometric factor called?
A reference profile or a reference template
- With what other forms of single sign-on can Kerberos be combined?
Any or all of them, including SESAME, KryptoKnight, NetSP, thin clients, directory services, and scripted access.
- How is the ticket-granting ticket used by Kerberos generated?
The user’s password is hashed, and a timestamp is added.
- What is a centralized database of resources available to the network?
A directory service
- What are examples of rule-based access control?
MAC, RBAC, TBAC
- What form of access control can combine levels of security domains with compartments of additional control and isolation?
MAC (Specifically, a hybrid MAC environment
- What form of access control is best suited to those organizations with a high rate of employee turnover?
RBAC
- When an intrusion is detected, what should be the first response?
Contain or constrain the intrusion.
- Once an intrusion has occurred, what is the most secure process for restoring the environment?
Format and reinstall from scratch.
- What form of IDS is easier for an intruder to discover and disable?
Host-based IDS
- What network device works primarily at the Application layer?
Gateway
- What are the most common causes of network failure?
Cable failures and misconfigurations
- What type of cabling must be used to comply with building code safety requirements?
Plenum-rated cable
- How many sockets does TCP have?
65,536 (2^16) sockets (aka ports), numbered from 0 to 65,535
- What is the IP header protocol field value for TCP? UDP? ICMP? IGMP?
TCP: 6
UDP: 17
ICMP: 1
IGMP: 2
- What protocol is used by ping, pathping, and traceroute?
ICMP
- What is the APIPA range?
169.254.0.1 to 169.254.255.254 along with the default Class B subnet mas of 255.255.0.0
- What port is used by IMAP
143
- What port is used by DHCP?
Port 68 for client request broadcast and port 67 for server point-to-point response
- Network devices at what layer and above separate collision domains?
Layer 2