CISSP Learn App Flash Cards

1
Q

What documentation determines the type of individual that needs to be hired and is the first step in defining security needs related to personnel?

A

Job Descriptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What stage of the SW-CMM is usually little or no defined software development process.

A

Initial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What stage of the SW-CMM is where Reuse of code in an organized fashion begins to enter the picture ?

A

Repeatable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What stage of the SW-CMM is where formal, documented software development processes.

A

Defined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What stage of the SW-CMM is where quantitative measures are used to gain a detailed understanding of the development process.

A

Managed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What stage of the SW-CMM is where Sophisticated software development processes are in place that ensure that feedback from one phase reaches to the previous phase to improve future results.

A

Optimizing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a type of bar chart that provides a graphical illustration of a schedule that helps you plan, coordinate, and track specific tasks in a project.

A

Gantt Chart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a project-scheduling tool used to judge the size of a software product in development and calculate the standard deviation (SD) for risk assessment.

A

PERT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is used to direct improvements to project management and software coding in order to produce more efficient software.

A

PERT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the three components of the change management process ?

A

Request Control
Change Control
Release Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What provides an organized framework within which users can request modifications, managers can conduct cost/benefit analysis, and developers can prioritize tasks.

A

Request Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What change management process is used by developers to re-create the situation encountered by the user and to analyze the appropriate changes to remedy the situation.

A

Change Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What change management process provides an organized framework within which multiple developers can create and test a solution prior to rolling it out into a production environment.

A

Change Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What change management process double-checks and ensures that any code inserted as a programming aid during the change process (such as debugging code and/or backdoors) is removed before releasing the new software to production.

A

Release Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What change management process ensures that only approved changes are made to production systems.

A

Release Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What change management process include acceptance testing to ensure that any alterations to end-user work tasks are understood and functional.

A

Release Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What change management process includes conforming to quality control restrictions, developing tools for update or change deployment, properly documenting any coded changes, and restricting the effects of new code to minimize diminishment of security.

A

Change Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is used to control the version(s) of software used throughout an organization and to formally track and control changes to the software configuration.

A

SCM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the four components of SCM?

A

Configuration Identification
Configuration Control
Configuration Status Accounting
Configuration Audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What software configuration management process includes administrators documenting the configuration of covered software products throughout the organization.

A

Configuration Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What software configuration management process ensures that changes to software versions are made in accordance with the change control and configuration management policies.

A

Configuration Control

22
Q

What software configuration management process is where Formalized procedures are used to keep track of all authorized changes that take place.

A

Configuration Audit

23
Q

What is canon one of the ISC 2 code of ethics ?

A

“protect society, the commonwealth, and the infrastructure.”

24
Q

What is canon two of the ISC 2 code of ethics ?

A

“act honorably, honestly, justly, responsibly, and legally.”

25
Q

What is canon three of the ISC 2 code of ethics ?

A

“provide diligent and competent service to principals.”

26
Q

What is canon four of the ISC 2 code of ethics ?

A

“advance and protect the profession.”

27
Q

What cpu design is a large set of complex machine language instructions, and is used by x86 cpus ?

A

CISC

28
Q

What cpu design is a reduced set of simpler instructions and is used in phones, ARM, and PDAs?

A

RISC

29
Q

What type of storage is often used to support records retention for legal or regulatory compliance.

A

WORM

30
Q

What are two common protections against software exploitation and execution?

A

DEP
ALSR

31
Q

What is a type of backdoor installed by system designers and programmers to allow developers to bypass normal system checks?

A

Maintenance Hooks

32
Q

What type of malware self propagates and causes loss of network availability and carry malicious code ?

A

Worms

33
Q

What malware performs two functions: one benign, such as a game, and one malicious.

A

Trojan Horse

34
Q

What malware replaces portions of the kernel and/or operating system.

A

Rootkit

35
Q

What type of malware is triggered when certain conditions have been met ?

A

Logic bombs

36
Q

What are the five modes of DES?

A

ECB
CBC
CFB
OFB
CTR

37
Q

What means the organization that issued the public/private key pairs retains a copy.

A

Key storage

38
Q

What type of key is retained by a third-party organization (and sometimes multiple organizations), often for law enforcement purposes.

A

Key escrow

39
Q

What is the successor to SSL?

A

TLS

40
Q

What two protocols are commonly used by HTTP?

A

TLS and SSL

41
Q

What is a suite of protocols that provide a cryptographic layer to both IPv4 and IPv6.

A

IPSEC

42
Q

What IPsec protocol provides authentication and integrity for each packet of network data and acts as a digital signature for data?

A

AH

43
Q

What IPsec protocol provides confidentiality but can optionally provide authentication and integrity as well.

A

ESP

44
Q

What is a simplex (one-way) connection that may be used to negotiate ESP or AH parameters.

A

IPsec SA

45
Q

A unique 32-bit number that identifies each simplex SA connection.

A

SPI

46
Q

What protocol manages the SA creation process ?

A

ISAKMP

47
Q

What type of system requires two separate triggers to release water ?

A

Preaction systems

48
Q

What systems will not fill the pipes until both the fire alarm triggers and the sprinkler head opens.

A

Double interlock systems

49
Q

What systems release water into the pipes when a fire alarm triggers.

A

Single interlock systems

50
Q

What is a connection between private Intranets, such as connections to business partner intranets.

A

Extranet

51
Q

What is a privately owned network running TCP/IP, such as a company network.

A

Intranet

52
Q

What can provide dedicated bandwidth to point-to-point connections, such as a T1 connecting two offices.

A

Circuit switched networks