CISSP Notes Flashcards
Type of malware which can change or update a system’s kernel
Rootkit
Best practice when it comes to taking measures against a rootkit
Reinstall operating system
Type of self-sufficient malware
Worm
Malware which requires host-to-host transmission to work
Virus
Firewall rule placed at the top of the rulebase to drop direct connections to the firewall
Stealth rule
Attribute-based access control allows authorization through this type of condition
Environmental
Examples of environmental attributes in ABAC
Time of day, geolocation, network type
Subjects access _________
objects
Signing a document with your private key provides
Nonrepudiation
HMAC is associated with this high-level and fundamental security concept
Integrity
Users are allowed access to resources through a pre-determined template
Role-based access control
Firewall policies reflect this type of access control
Rule-based access control
Every object must have an owner
Discretionary Access Control
A more in-depth, granular, detailed, and fully tested evaluation provides ________
assurance
Determines the functionality of a product
Certification
Determining why to create the software and for what purpose
First phase of SDLC
Implementing proper disposal methods for software
Last phase of SDLC
A portion of software which is left unprotected and could provide a means for an attacker
Attack surface
How well the components of software work together per design specifications
Integration testing
Making sure the users verify the product operates as it should
User acceptance testing
Enter safe mode, recover files, validate operations
What to do after a system crash
Only allowing systems administrators to shut down critical systems
Reduce the possibility of denial of service
When processes should not be interrupted from receiving input to providing output
Atomic transactions
Type of codes which maintain the integrity of files
Message authentication code