CISSP For Dummies Flashcards
Electronic flashcards with book
What is the longest period of time that a business can survive without a critical function?
Maximum tolerable downtime
To be admissible in a court of law, evidence must be ________________________.
relevant
____________ monitoring records every key press and mouse movement on a system.
Keystroke
A ________________ is useful in safeguard selection for determining cost-effectiveness.
cost-benefit analysis
The process of wrapping protocol information from one layer in the data section of another layer describes .
encapsulation
Name a type of extinguishing agent that fights fires by separating the elements of the fire triangle rather than simply removing one element.
FM-200
A system that accumulates knowledge by observing events’ inputs and outcomes is known as a ________________.
neural network
An IPsec SA consists of what three parameters to uniquely identify it in an IPsec session?
Destination IP address, Security Protocol ID (SPID), Security Parameter Index (SPI)
Name three VPN protocol standards.
IPsec, PPTP, SSL/TLS
Name the four main components of a Public Key Infrastructure (PKI).
Certificate Authority (CA), Registration Authority (RA), Repository, Archive
What type of firewall architecture employs external and internal routers, as well as a bastion host?
Screened-subnet
What is the required operating state of a network interface on a system running a sniffer?
Promiscuous mode
Name four Wi-Fi access point infrastructure modes of operation.
Root, repeater, bridge, mesh
A third-party inspection of a system is known as ________________
an audit
What is the formula for calculating Annualized Loss Expectancy (ALE)?
SLE x ARO = ALE, where SLE is the Single Loss Expectancy and ARO is the Annualized Rate of Occurrence
PCI DSS is applicable to organizations that ______________________.
transmit, process, or store payment card information
What are the four main functions of the operating system?
Process management, I/O device management, memory management, file management
The decision whether to purchase an emergency generator should be based on the _________________ of electrical power outages.
average and worst-case duration
The minimum number of SAs required for a two-way IPSec session between two communicating hosts using both AH and ESP is ____________.
four
An alternative information-processing facility where all systems, patches, and data are mirrored from live production systems is known as a _______________.
hot site
What is the purpose of a Business Impact Assessment (BIA)?
To describe the impact that an event or disaster will have on business operations
Masquerading is a ___________ technique.
social engineering
In a civil case, the court may issue an order, known as a _________________ , allowing a law-enforcement official to seize specific evidence.
writ of possession
What are two types of risk analysis?
Quantitative, qualitative
Name four examples of packet-switched WAN protocols.
IP, X.25, Frame Relay, SMDS
Name three types of possible damages in a civil case.
Compensatory, punitive, statutory
A ________________ model ensures that the actions of different objects and subjects aren’t seen by (and don’t interfere with) other objects and subjects on the same system.
noninterference
A prolonged drop in voltage describes what electrical anomaly?
Brownout
What type of water sprinkler system initially has no water present in the pipes and, at activation, delivers a large volume of water?
Deluge
A developer, suspecting that he may be fired soon, modifies an important program that will corrupt payroll files long after he is gone. The developer has created a _________________.
logic bomb
A SYN flood is an example of what type of attack?
Denial-of-service (DoS)
The simple integrity property and star integrity property are defined in which integrity model?
Biba
Name two protocols that can be used to implement one-time passwords.
S/Key and Diameter
Wardriving and port scanning are examples of ___________ tests.
penetration
192.167.4.1 is an example of what class of IP address?
C
A baseline is what type of governance?
Standard
Viruses, rootkits, and Trojan horses are broadly defined as ______________.
malware
Which Internet specification provides secure e-commerce by using symmetric key systems, asymmetric key systems, and dual signatures?
Secure Electronic Transaction (SET)
Who is the individual responsible for assigning information classification levels to assigned information assets?
Information owner
A system used to monitor and control end -user access to cloud-based services is known as a ________________.
cloud access security broker (CASB)