CISSP For Dummies Flashcards

Electronic flashcards with book

1
Q

What is the longest period of time that a business can survive without a critical function?

A

Maximum tolerable downtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

To be admissible in a court of law, evidence must be ________________________.

A

relevant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

____________ monitoring records every key press and mouse movement on a system.

A

Keystroke

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A ________________ is useful in safeguard selection for determining cost-effectiveness.

A

cost-benefit analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The process of wrapping protocol information from one layer in the data section of another layer describes .

A

encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name a type of extinguishing agent that fights fires by separating the elements of the fire triangle rather than simply removing one element.

A

FM-200

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A system that accumulates knowledge by observing events’ inputs and outcomes is known as a ________________.

A

neural network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An IPsec SA consists of what three parameters to uniquely identify it in an IPsec session?

A

Destination IP address, Security Protocol ID (SPID), Security Parameter Index (SPI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name three VPN protocol standards.

A

IPsec, PPTP, SSL/TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name the four main components of a Public Key Infrastructure (PKI).

A

Certificate Authority (CA), Registration Authority (RA), Repository, Archive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of firewall architecture employs external and internal routers, as well as a bastion host?

A

Screened-subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the required operating state of a network interface on a system running a sniffer?

A

Promiscuous mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name four Wi-Fi access point infrastructure modes of operation.

A

Root, repeater, bridge, mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A third-party inspection of a system is known as ________________

A

an audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the formula for calculating Annualized Loss Expectancy (ALE)?

A

SLE x ARO = ALE, where SLE is the Single Loss Expectancy and ARO is the Annualized Rate of Occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PCI DSS is applicable to organizations that ______________________.

A

transmit, process, or store payment card information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the four main functions of the operating system?

A

Process management, I/O device management, memory management, file management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The decision whether to purchase an emergency generator should be based on the _________________ of electrical power outages.

A

average and worst-case duration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The minimum number of SAs required for a two-way IPSec session between two communicating hosts using both AH and ESP is ____________.

A

four

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

An alternative information-processing facility where all systems, patches, and data are mirrored from live production systems is known as a _______________.

A

hot site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the purpose of a Business Impact Assessment (BIA)?

A

To describe the impact that an event or disaster will have on business operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Masquerading is a ___________ technique.

A

social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In a civil case, the court may issue an order, known as a _________________ , allowing a law-enforcement official to seize specific evidence.

A

writ of possession

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are two types of risk analysis?

A

Quantitative, qualitative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Name four examples of packet-switched WAN protocols.
IP, X.25, Frame Relay, SMDS
26
Name three types of possible damages in a civil case.
Compensatory, punitive, statutory
27
A ________________ model ensures that the actions of different objects and subjects aren’t seen by (and don’t interfere with) other objects and subjects on the same system.
noninterference
28
A prolonged drop in voltage describes what electrical anomaly?
Brownout
29
What type of water sprinkler system initially has no water present in the pipes and, at activation, delivers a large volume of water?
Deluge
30
A developer, suspecting that he may be fired soon, modifies an important program that will corrupt payroll files long after he is gone. The developer has created a _________________.
logic bomb
31
A SYN flood is an example of what type of attack?
Denial-of-service (DoS)
32
The simple integrity property and star integrity property are defined in which integrity model?
Biba
33
Name two protocols that can be used to implement one-time passwords.
S/Key and Diameter
34
Wardriving and port scanning are examples of ___________ tests.
penetration
35
192.167.4.1 is an example of what class of IP address?
C
36
A baseline is what type of governance?
Standard
37
Viruses, rootkits, and Trojan horses are broadly defined as ______________.
malware
38
Which Internet specification provides secure e-commerce by using symmetric key systems, asymmetric key systems, and dual signatures?
Secure Electronic Transaction (SET)
39
Who is the individual responsible for assigning information classification levels to assigned information assets?
Information owner
40
A system used to monitor and control end -user access to cloud-based services is known as a ________________.
cloud access security broker (CASB)
41
What are the four basic control requirements identified in the Orange Book?
Discretionary access control, mandatory access control, object reuse, labels
42
An attacker has placed a URL on a website that, if clicked, will cause malicious JavaScript to execute in victims’ browsers. This attack is known as a ___________ attack.
cross-site scripting
43
True or false: A signature-based IDS generally reports a high number of false positives.
False
44
True or false: Bell-LaPadula, Biba, and Clark-Wilson all address availability issues.
False
45
Filling a system’s hard drive so that it can no longer record data is a type of __________ attack.
denial-of-service (DOS)
46
Authentication can be based on any combination of what three factors?
Something you know, something you have, something you are
47
Sensitivity labels are a fundamental component of which type of access control system?
Mandatory
48
Antimalware software that watches for anomalous behavior uses what technique?
Heuristics
49
Name three types of intrusion detection systems used for physical security.
Photoelectric sensors, dry contact switches, motion detectors
50
Which U.S. government data classification level describes information that, if compromised, could cause grave damage to national security?
Top Secret
51
Most security policies are categorized as what type?
Advisory
52
To deter casual trespassers, fencing should be a minimum height of ______________ feet.
3
53
Name three methods of attack against access control systems
Brute-force, dictionary, buffer overflow
54
The two types of host or network intrusion detection are ______________ and ________________ .
signature-based systems, anomaly-based systems
55
Name the four layers of the TCP/IP Protocol Model.
Application, Transport, Internet, Link (or Network)
56
Name the three elements of the fire triangle necessary for a fire to burn.
Fuel, oxygen, heat
57
The Ethernet protocol is defined at what layer of the OSI model and in which IEEE standard?
Data Link, 802.3
58
Which ITSEC classification level is equivalent to TCSEC level B3?
E5
59
The process of reviewing and approving proposed changes to systems is known as ________________.
change management
60
What type of cabling should be used below raised floors and above drop ceilings?
Plenum
61
What is the main reason for establishing an asset classification program?
It isn’t practical to protect all data equally.
62
What is the main reason for establishing an asset classification program?
It isn’t practical to protect all data equally.
63
Portable CO2 fire extinguishers are classified as what type of extinguishing system?
Gas-discharge
64
Electrical fires are classified as what type of fire and use what extinguishing methods?
Class C; CO2 or FM-200
65
When should management be notified of a computer crime?
As soon as the crime is detected
66
The LLC and MAC are sublayers of which OSI model layer?
Data Link
67
A ______________ conveys information by altering stored system data.
covert storage channel
68
A ___________ conveys information by altering a system resource’s performance or timing.
covert timing channel
69
Which U.S. government data classification level describes information that, if compromised, could cause serious damage to national security?
Secret
70
Which PPP authentication protocol transmits passwords in clear text?
Password Authentication Protocol (PAP)
71
What are the three elements of the C-I-A triad?
Confidentiality, integrity, availability
72
A system that continues to operate following the failure of a network component describes which type of system?
Fault-tolerant
73
What term describes the legal evidence-gathering technique of luring an individual toward certain evidence after that individual has already committed a crime?
Enticement
74
Name three factors that are used to determine data classification.
Value, regulations, policy
75
True or false: Risk avoidance is considered to be a general remedy for risk.
False
76
A computer system that alternates execution of multiple subprograms on a single processor describes what type of system?
Multitasking
77
Name three asymmetric key systems based on discrete logarithms.
Diffie-Hellman, Elliptic Curve, ElGamal
78
Name four types of intellectual property.
Patents, trademarks, copyrights, trade secrets
79
Name five protocols that can be used to secure email communication.
SMTP over TLS, S/MIME, MOSS, PEM, PGP
80
What type of network attack sends TCP packets from a spoofed source address with the SYN bit set?
SYN flood
81
The Advanced Encryption Standard (AES) is based on what symmetric key algorithm?
Rijndael
82
The restricted environment that Java applets occupy is known as a _______________.
sandbox
83
Violation reports and audit trails are examples of what type of control?
Detective technical
84
A type of cipher that replaces bits, characters, or character blocks with alternate bits, characters, or character blocks to produce cipher text is known as a ______________.
substitution cipher
85
Name three types of general-purpose controls.
Detective, preventive, corrective
86
Data on backup media being sent by courier to an off-site storage location is known as what?
Data in transit
87
The ____________ protocol is used to facilitate user authentication across systems and among organizations through the exchange of authentication and authorization information among organizations.
Security Assertion Markup Language (SAML)
88
True or false: Failure to implement a safeguard may result in legal liability if the cost of implementing the safeguard is less than the cost of the associated loss.
True
89
The Clark-Wilson integrity model is based on the concept of a ___________, in which a transaction is sufficiently ordered and controlled that it maintains internal and external consistency.
well-formed transaction
90
The logic present in an object is known as a ____________ .
method
91
“A user cannot deny an action” describes the concept of _____________
nonrepudiation
92
A data network that operates across a large geographic area defines what type of network?
WAN
93
In biometric systems, what is a False Accept Rate (Type II) error?
Unauthorized users are incorrectly granted access.
94
Name five types of attacks against voice communication systems.
Identity fraud, toll fraud, eavesdropping, denial-of-service (DoS), Spam over Internet Telephony (SPIT)
95
The practice of regularly transferring personnel to different positions or departments within an organization is known as ___________.
job rotation
96
The purpose of session management in a web application is to ________________.
protect sessions from unauthorized access
97
The total combination of protection mechanisms within a computer system (including hardware, firmware, and software) that’s responsible for enforcing a security policy defines a ______________.
Trusted Computing Base
98
An address used as the origin for calculating other addresses describes ________________.
base addressing
99
What is a primary technical concern with long-term audit log retention?
Whether any tape or disk drives will be available to read the media
100
The most extensive type of disaster recovery plan test is ______________.
an interruption test
101
Name the four CPU operating states.
Operating (or run), problem (or application), supervisory, wait