CISSP Notes Flashcards

1
Q

Type of malware which can change or update a system’s kernel

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Best practice when it comes to taking measures against a rootkit

A

Reinstall operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Type of self-sufficient malware

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Malware which requires host-to-host transmission to work

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Firewall rule placed at the top of the rulebase to drop direct connections to the firewall

A

Stealth rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Attribute-based access control allows authorization through this type of condition

A

Environmental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Examples of environmental attributes in ABAC

A

Time of day, geolocation, network type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Subjects access _________

A

objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Signing a document with your private key provides

A

Nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HMAC is associated with this high-level and fundamental security concept

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Users are allowed access to resources through a pre-determined template

A

Role-based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Firewall policies reflect this type of access control

A

Rule-based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Every object must have an owner

A

Discretionary Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A more in-depth, granular, detailed, and fully tested evaluation provides ________

A

assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Determines the functionality of a product

A

Certification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Determining why to create the software and for what purpose

A

First phase of SDLC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Implementing proper disposal methods for software

A

Last phase of SDLC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A portion of software which is left unprotected and could provide a means for an attacker

A

Attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How well the components of software work together per design specifications

A

Integration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Making sure the users verify the product operates as it should

A

User acceptance testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Enter safe mode, recover files, validate operations

A

What to do after a system crash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Only allowing systems administrators to shut down critical systems

A

Reduce the possibility of denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

When processes should not be interrupted from receiving input to providing output

A

Atomic transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Type of codes which maintain the integrity of files

A

Message authentication code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Even if a report has no data, it should still say "no data to report".
Input/output control
26
The default state of wiring closet doors.
Closed
27
When doors are opened during emergencies
Fail-safe
28
The estimated amount of time a device is meant to work reliably.
Mean time between failures
29
This should be implemented if the mean time to repair is too high on a device
Redundancy measures
30
The decision engine in this access control method is controlled by the operating system in highly classified computers
Mandatory Access Control
31
ACLs provide this type of RBAC, with no formal roles other than by the user themselves
Non-RBAC
32
An access control system fully defined by organizational roles, policies, and permissions for subjects to objects
Full RBAC
33
Attack from flaws in IP packet reassembly
Teardrop attack
34
10.1.2.0/23 and 10.1.3.248/30
RFC 1918 Overlapping subnets
35
A product which provides IDS/IPS, DLP, firewall, antimalware, antispam services
Unified Threat Management
36
First thing to establish before any security control or project
The business need
37
Transferring workers to another organization's workplace to use their infrastructure as a recovery agreement
Reciprocal agreement
38
Type of recovery site necessary for an MTD of 1 hour
Hot site
39
Type of recovery site necessary for an MTD of 12 hours
Warm site
40
Permissions and authorization rights are this type of control
Administrative
41
NIST 800-34
Contingency Guide Planning (good read for exam)
42
Who can declare an emergency?
Anyone
43
Who can declare a disaster?
BCP Coordinator
44
Read Shon Harris 7th Edition once, Sybex 3 times, Official CBK once
Study Tips
45
The best way to memorize something for the exam. It creates a visual placeholder in your brain.
Handwritten notes
46
Don't let your dreams be dreams, achieve them with goals. Achieve them with three methods.
Discipline, dedication, consistency.
47
People taking the exam usually think they are going to fail. But they pass.
Just like you will.
48
A Cisco ASA firewall failing after 213 days of uptime
Example of mean time between failure
49
The more complex a device, program, or component
The less reliability
50
Data written across all drives increases write performance
Striping
51
Applying controls to better "suit" an environment beyond the recommended baseline
Tailoring
52
Eliminating unnecessary controls for an environment recommended by a baseline
Scoping
53
Applying minimum security controls as a reference point in an organization
Baseline
54
Pre-employment administrative detective control to gauge employee suitability
Background investigation
55
Most important action before applying updates or patches to a system in production
Backup
56
Type of knowledge that is a must for the CISSP exam
Inter-domain
57
The most stressful moments of the CISSP exam
First 10-15 minutes/questions
58
Port for SMTP
25
59
Practice CISSP questions most similar to the CISSP exam
CISSP Practice Questions, Fourth Edition, Shon Harris
60
A more secure way to remotely connect to servers instead of Telnet (Port 23)
SSH (Port 22)
61
Standards enforce a _________ environment
homogeneous
62
Form of API security to mitigate DOS
Rate-limiting
63
Those who direct the business and security efforts of an organization
Senior management
64
Structure to properly direct organizational business and security efforts
Security governance
65
Cost to support, repair, replace, manage, and administer an asset
Asset valuation
66
Framework which provides steps to match business goals with IT resources
COBIT
67
Access control method which uses classifications and utilized in government systems
Mandatory Access Control
68
Standard which rewards clean desk policies, proper documentation, security protocols and processes for information security management systems
ISO 27001
69
Security model which upholds integrity through the use of data items and well-formed transactions
Clark-Wilson
70
Access control method in which each object must absolutely have an owner
Discretionary Access Control
71
Inventors of the one of the first mathematical security models
David Elliot Bell and Leonard J. LaPadula
72
Risk mitigation should be considered at which stages of the system development life-cycle?
Every stage
73
Administrative control which aims to teach users about potential social engineering techniques and other types of risks
Security awareness training
74
Access control method which users a set with least upper bound and greatest lower bound
Lattice-based access control
75
A backup site to a backup site
Tertiary site
76
Renting a database program
Software as a Service
77
Renting an operating system
Platform as a Service
78
Renting a virtual firewall
Infrastructure as a Service
79
The use of shared resources among thousands of servers in thousands of data centers
Cloud computing
80
Document which outlines an appropriate level of service between a provider and a customer
Service Level Agreement (SLA)
81
Uptime, downtime, peak, average and failover times.
Common issues addressed in SLAs
82
Establishing a contract with a cloud service provider
Due care
83
Verifying controls are in place when forming a contract with a cloud service provider
Due diligence
84
Reports capable of verifying the controls used by vendors to ensure service delivery
Service Organization Control (SOC)
85
Virtualization spurned the invention of this technology
Cloud computing
86
Customer's responsibility in Software as a Service
Data Security
87
Customer's responsibility in Platform as a Service
Data classification
88
Customer's responsibility in an Infrastructure as a Service
Access Control
89
Cloud service provider's responsibility in a Software as a Service
Application Security
90
Cloud service provider's responsibility in a Platform as a Service
Infrastructure Security
91
Cloud service provider's responsibility in an Infrastructure as a Service
Physical Security
92
Companies or users who utilize the services offered by the cloud
Tenants
93
AWS and Microsoft Azure
Cloud service providers
94
Cloud service model which dedicates all services to one tenant
Private cloud
95
Type of cloud where multiple tenants use the same service
Community cloud
96
Type of cloud service which will allow you to throttle server CPU utilization if necessary
Infrastructure as a Service
97
Best way to secure data flowing from your organization and the cloud
Encryption
98
Sort of like policies
Directives
99
Takes over when primary controls have failed
Compensating controls
100
Controls which discourage those trying to subvert directives
Deterrent controls
101
Pours water out immediately after the suppression mechanism is triggered
Wet Pipe
102
Pipe system filled with compressed air
Dry pipe system
103
Bigger pipes, more water
Deluge system
104
Best type of water suppression system for computers and other electronics
Preaction system
105
Combination of a dry pipe/wet pipe system
Preaction system
106
Vulnerability which was the death of SSL
POODLE
107
Component of ABAC which makes it a unique type of access control method
Environmental attributes
108
Data state which can be secured by hard disk encryption
Data at rest
109
Data state which can be secured by TLS
Data in motion
110
Data state which can be secured by a proper a software development life cycle
Data in use
111
Used to assess the quality of software, but not the vendor which makes the software
Common Criteria
112
Used to assess the quality of a software vendor, but not the software the vendor makes
Capability Maturity Model Integration
113
A form of non-discretionary based access control
Mandatory Access Control
114
Can be used on top of role-based access control
Rule-based access control
115
Evaluation method which preceded the Common Criteria
TCSEC (Trusted Computer System Evaluation Criteria)
116
A set of categorized basic security requirements to evaluate a specific type of system
Protection Profile
117
Documentation and paperwork to prove the functionality and assurance of a system
Security Target
118
The product of a Common Criteria security evaluation
Target of Evaluation
119
Hiding an invention such as custom encryption and thinking attackers won't ever break it
Security through obscurity
120
The theory that transistors on a microchip will grow exponentially making old encryption algorithms breakable
Moore's Law
121
Encrypting data on a hard drive instead of deleting it
Crypto erase
122
Overwriting sectors on a hard drive
Overwriting
123
Media which cannot be degaussed
Solid state drives
124
Method of calculating the different ways a system can experiences faults and lower reliability and safety
Fault-tree analysis
125
Technology used to control physical components of industrial environments
Industrial control systems
126
Trusting your friend and your friend's friend with data
Transitive trust
127
Trusting your friend and only your friend with data
Non-transitive trust
128
FTPS and SMTPS
Protocols which use Transport Layer Security
129
What to do the night before the exam
Get at least 8 hours of sleep
130
Bundle of functional and assurance requirements
Common Criteria EALs
131
Software, encryption algorithms, key management, applications, TPMs
A cryptosystem
132
Encryption cipher which uses the natural world and the elements within it for the key
Running key cipher
133
Less mathematical computations than public key cryptography
Symmetric encryption
134
Probably the only stream cipher you need to know for the CISSP exam
RC4
135
Random values used at the beginning of a keystream or algorithm
Initialization Vectors
136
Signing a document with a private key provides nonrepudiation and also this
Authentication
137
A symmetric key used one time to secure the communication channel for data
Session key
138
Supports 14 rounds of encryption if both the key and block sizes are 256 bits
Rijndael 256
139
Cryptographic keys should never be in cleartext outside the system's trusted memory location
Key management principle
140
Unique private key within a TPM and a public key to authenticate the TPM
Endorsement Key
141
The toughest cryptographic attack
Ciphertext-Only Attacks
142
You can view Known-Plaintext Attack in this movie
The Imitation Game
143
Locks, bollards, fences, barriers
Physical detective controls which only serve to slow down an attacker, not prevent
144
Emergency 911 service, water sprinklers, Army National Guard
Physical responses to security incidents
145
Results obtained from custom measurements of information which are becoming more important in organizations
Metrics
146
Manipulating the natural environment to reduce crime around a facility
Crime Prevention Through Environmental Design (CPTED)
147
WAN technology which dedicates a single virtual connection between two systems, not multiple paths
Circuit-switched
148
Multitasking, multicore, multiprocessing, multithreading
They all do not mean the same thing, should know the difference
149
Type of system security mode which provides the least amount of risk as compared to a multilevel security mode
Dedicated mode
150
If you don't want the predicted path of a synthetic transactions, use this instead
Real User Monitoring (RUM)
151
Your mindset and role when taking the CISSP exam
Risk advisor, security consultant, CISO, senior management
152
Type of solutions to pick when taking the CISSP exam
High-level answers which guide the organization without taking direct hands-on action
153
Every choice picked on the real CISSP exam must revolve around this
Risk management and cost-benefit analysis. Identifying and valuating assets. CIA Triad.
154
Input validation, message digests, preventing unauthorized modifications
Integrity protections
155
Availability metrics
MTD/RTO/RPO/SLA/MTBF/MTTR
156
What comes after identification but before authorization
Authentication
157
Operational plans are within days or weeks, tactical plans are within months, and strategic plans are within
years
158
Why do we have data classification
For implementing proper security controls
159
The activities which promote due care
Due diligence
160
The amount of time for which an organization will face risk
FOREVER
161
Risk Treatment: MART
Mitigate, Accept, Reject, Transfer
162
What are the exact BCP/DRP steps to know for the CISSP exam?
There are no official steps. Just know the general steps. Policy, BIA, Recovery Strategies, Maintenance
163
What do you probably NOT have to memorize or know for the exam?
TCSEC, US Laws
164
The right to be forgotten and having your personal information deleted is part of which regulation?
GDPR (Global Data Protection Regulation)
165
Term which describes destroying media to the point of being unrecoverable
Sanitization
166
Science of cryptography and cryptanalysis
Cryptology
167
Sharing proof of a part of the knowledge without knowing the actual knowledge
Zero Knowledge Proof
168
The work factor to break a cryptosystem depends on this
Key strength
169
Do you need to know "n(n-1)/2" ?
You most likely will not need to calculate total number of symmetric keys required
170
Streaming cipher version of cipher block chaining
Cipher Feedback Mode
171
The most important phase/step of the BCP/DRP process to know for the CISSP exam
Business Impact Analysis
172
Temporary location for holding initial memory instructions on a CPU
Registers
173
A countermeasure to inference
Polyinstantiation
174
Java, C++, Python, or other languages all have to be broken down to this by the processor
Binary format
175
After passing the CISSP, what can you focus on for a prosperous future?
Cloud computing or technical certs. You already have the best high-level cert.
176
Method of accessing a secure and separate channel outside the realm of the existing system
Out-of-band
177
Reckless programming leads to vulnerabilities which lead to this
Exploits
178
A bug in this protocol can lead hackers to compromising single sign-on services to websites
SAML
179
The approach to bridge different organizational teams to prevent conflicting priorities
DevOps
180
System which makes decisions based on the perceived thought process of humans
Neural Network
181
Cost is not a factor when classifying data.
Cost is a factor when implementing the security controls on classified data.
182
Concerned with preventing information from lower security levels to flow to higher security levels
Biba Model
183
Columns are ACLs, and rows are capability tables
Access Matrix
184
Model which uses integrity verification procedures to confirm data ingerity
Clark-Wilson Model
185
Subjects take over rights of an object, subjects grant rights to an object
Take-Grant Model
186
Any organization with a BYOD Policy must try to enforce this first step with the user.
Device registration
187
When the introduction of a new company-wide application or system has been formally approved
Accreditation
188
Metadata repository
Data dictionary
189
Legal way to obtain other people's confidential information
Dumpster diving
190
encryption=ontinyeprc
Message reordering process associated with the terms transposition or permutation
191
Report which covers the security, integrity, privacy, confidentiality and availability controls shared by an NDA with management and regulators
SOC2
192
Report on the internal financial reporting controls used by auditors and controller offices
SOC1
193
Report which covers the security, integrity, privacy, confidentiality and availability controls publicly available for all to view
SOC3
194
When you quickly go through a door you are not supposed to go through while it is closing
Piggybacking
195
Type of evidence which has not been tampered with at all and aligns with the facts presented
Reliable evidence
196
Device which can function like an IDS if the primary feature is disabled
Intrusion Prevention System
197
Most conservative form of system failure in terms of information security (but may cost human life)
Fail close/fail secure
198
The two most important things to maintain the integrity of audit trails
Date and time stamps
199
Windows failure in which the system is in a full secure state
Blue Screen of Death
200
If this is obtained from a victim, the attacker will be able to login to web services with their identity
API Key or SAML token
201
On-site inspection. Review how they exchange documents and data. Check out their policies, incident handling, guaranteed uptime, procedures, standards. Perform an audit by an external third-party company.
Risk management concepts for the supply chain
202
They used to be hired to lower costs, but slowly and slowly they are being hired for the value they would add.
Third-party vendors
203
Assurance that multiple vendors and partners have followed a sufficient level of quality, performance, and security controls for a finished product to a customer.
Supply chain security
204
Limited visibility into partner or supplier risk. Limited information to improve supplier vulnerabilities. Limited standardized platforms.
Supply chain risk management challenges
205
Evaluation of a vendor's internal policies, procedures, and controls as it directly relates to the CIA Triad and the service organization.
Service Organization Control 2 (SOC2)
206
There is never any true security in the cloud, so it's best to keep your data on your own. Or, the cloud provider has proper security controls to take care of data better than you ever could.
Two common attitudes toward putting data in the cloud. The solution is to find a balance.
207
Verify vendor security policies, contractors who may have access to the data, where the data is actually stored, any business relationships with parties who will also handle the data.
Cloud security due care practices by the data owner.
208
The best way to make sure your third-party cloud vendors properly handle your data and are held accountable.
Establishing a third-party risk management program.
209
To effectively manage cloud vendor information security risks, this type of monitoring should be encouraged from each cloud actor.
Near real-time monitoring.
210
Cloud actors and their individual businesses, processes, functions, missions, and supporting information security systems.
Cloud ecosystem.
211
SAML, OpenID, Kerberos.
Some standard protocols for cloud subscriber users to authenticate themselves.
212
The process of representing private data elements with a non-private and meaningless value.
Tokenization.
213
Other than the cloud vendor, this entity also has the responsibility of on-going monitoring and risk evaluation.
You.
214
Responsible for external vendor rules on an organization as a whole. Responsible for imposing internal rules on external vendors.
Responsibilities of a Compliance Officer.
215
A clear communicator, a strong constitution, intelligent, proactive, fair, modest, disciplined, fair principles, and held to the highest standard of ethics.
Qualities of a Compliance Officer.
216
Consists of a policy decision point, a policy enforcement point, and a supportive policy.
Main mechanisms of an Identity Provider for the cloud.
217
Amazon EC2, IBM Blue Mix, Microsoft Azure, Google Cloud, Dream Host.
Real time cloud providers.
218
An alternative open standard form of cloud authentication in which access is granted to a website/application without sharing passwords from another authenticated website/application.
OAuth.
219
Trade and professional organizations.
Sources of independent impartial auditors
220
Requires government agencies to have information security programs which provide assurance for networks, facilities, and systems.
Federal Information Security Management Act of 2002
221
Do this before prioritizing risk management of third-parties, cloud vendors, business partners, or the supply chain.
Prioritize the data and assets of your own organization first
222
Doveryai, no proveryai - Russian proverb describing clients first doing their own neutral third-party assessment before signing on with the vendor.
Trust, but verify
223
Know who you're trusting, anticipate problems, include vendor in your security discussions, constantly verify vendor's security.
Risk management best practices
224
Identify interdependencies and any risk inheritance between the cloud vendor and the consumer.
Cloud vendor risk treatment
225
Real-time monitoring of cloud provider's security controls, operations, and posture
Cloud vendor risk control
226
An early malicious form of cloud computing with cost reduction, dynamically provisioned computers, redundancy, and security.
These are the same characteristics as botnets.
227
Stage at which cost, security, privacy, and the effectiveness of cloud systems and vendors must be implemented for maximum effectiveness.
The first stage, and every other stage after that.
228
Addresses the customized concerns, data ownership, exit rights, breach notifications, tenant isolation, employee vetting, and compliance with laws and regulations.
Negotiable agreements with cloud provider
229
Defines the terms of use, conditions of access, period of service, and the termination or disposal of data with a cloud service provider.
Specifications of a cloud service provider
230
Predefined non-negotiable and negotiable.
Types of cloud service agreements.
231
Everything requires risk management, especially with third-party cloud providers or any other type of unfamiliar vendor.
The theme of these flashcards.
232
Cloud service agreement crafted completely by the cloud service provider. They serve as the general basis for a cloud vendor's economies of scale for cloud tenants. Can only be amended at the vendor's discretion.
Non-negotiable service agreement.
233
Promotes better automation of configuration control, vulnerability testing, audits, patching, and replacing platform components.
Cloud system homogeneity
234
Entity which determines alone, or jointly, the purpose for which data or personal information is processed.
Data controller
235
Entity which handles and processes the data as dictated by the data controller.
Data processor
236
Direct or indirect identification to whom personal information relates.
Data subject
237
Legally collected data and limited to the consent and scope of the data subject.
Data collection limitation
238
Relevance and kept in accurate form with integrity .
Data quality
239
Unauthorized secondary usage of PII, uncertainty of data disposal, questionable data retention policies, determination if a breach has occurred.
Cloud computing privacy issues
240
Cloud service model which is cost-effective but raises the most concern for the privacy of data.
Public cloud
241
Access, transparency, control over data lifecycle, changing providers
Limitation or lack of user control over cloud vendors
242
Technique to lessen the impact of decisions which impact the privacy of user data.
Training and expertise
243
Unauthorized sale of detailed customer sales data to competitors or advertisers.
Unauthorized secondary usage of data in the cloud.
244
Deployed applications, virtual machine monitors, guest virtual machines, data storage, supporting middleware, backplane services, utilization metering and quota monitoring.
Cloud computing system complexities
245
Emails coming into data center servers are redirected to the cloud for further analysis to check for spam, malware, or phishing.
Data center oriented cloud service
246
The ability to reduce company capital investment and increase computational needs through operations expenses.
An advantage of cloud computing
247
Best way to counter a sprawling, widespread, unknown and unmanageable mix of insecure cloud services.
Proper organizational security governance
248
An organization's responsibility to conduct agreements in line with laws, regulations, standards, and meeting specifications.
Compliance
249
One of the most important and common issues facing an organization whether in-house or in the cloud.
Data location
250
Goes beyond that of current or previous employees and includes contractors, affiliates or other third-parties.
Insider access/threat
251
Often times equated to just vulnerability assessment and pen testing, it also covers people, machines, and processes. It covers the entire information ecosystem.
A systematic assessment, otherwise known as a security audit.
252
Two crucial first steps to take before performing a security audit. If these two steps are not undertaken, it creates more work and costs more down the line.
It is important to establish the goals for the audit and to remain within scope.
253
The use of technology to protect an asset.
Technical control
254
Regulatory requirements, an unbiased view, or meeting internal benchmarks of assets, would bring this entity in for an audit.
Third-party
255
A blind test of the system. Similar to recreating the approach of a real attacker. Provides insight into otherwise unknown attack vectors.
Black box testing
256
Full-knowledge test specifically targeted at known internal security controls and systems. Good for understanding the internal threat, but not the external one.
White box testing
257
A good balance of knowns and unknowns of a tested environment. Tester does not have full scale knowledge, allowing for discovering unknown issues.
Gray box testing
258
Written proof that a hacker can compromise a system. Permission is obtained, scope is defined, test is performed, compromised systems are reported.
Penetration testing.
259
Provides identification of operating systems, active hosts, non-essential ports or insecure ports or system misconfigurations
Vulnerability scanning
260
The lawful compromise of technical, physical, and administrative controls.
Penetration testing
261
Search engine results, primary or secondary domain nameserver identification, WHOIS or IP Lookup results, and input from user machines
The general first step of the penetration testing process, otherwise known as "Discovery" stage (Shon Harris 7th edition, page 872).
262
Spellchecking, formatting, encrypting, and then sending a report to the top level executives of an organization
Last step of the penetration testing process, otherwise known as "Report to Management" stage (Shon Harris 7th Edition, page 872).
263
An adversary that compromises this core part of the system allows them to gain the most control
Kernel
264
The amount of time, money, and personnel a company is willing to spend defending its network or infrastructure
Risk appetite
265
Disruption to this UDP protocol can affect the timestamps of multiple applications, services, and processes
Network Time Protocol (NTP)
266
This strategy for logs keeps them out of reach of attackers or at least adds an additional step before compromise
Storing logs on a remote device
267
Technical control similar to cipher block chaining which ensures the integrity of multiple hashed messages
Hash chaining
268
Application which correlates alerts from multiple devices and provides an overview to determine if action is required or if it's a false positive
Security Incident Event Management (SIEM)
269
Associated with Unified Modeling Language, this type of testing takes the inverse of a proper case testing
Misuse case testing
270
The strongest method to prevent password guessing attacks
2-factor authentication
271
A state of mind in which opportunities for compromise must constantly be reviewed when reviewing code
Defensive programming
272
One of the first operating systems to implement a ring system and also inspire the term "Unix".
Multics operating system
273
Important account management step which eliminates the use of a legitimate account for malicious purposes
Suspending accounts
274
Allows the ability to improve the BCP/DRP process with not just a pass/fail score, but yielding long-lasting results
Performing exercises, not just testing
275
CPR, first aid, fire suppression, and equipment training
Physical security training
276
Gauging the success of a user's performance on a potential threat validates this security control
Training
277
A customized, detailed and specifically crafted attack against an adversary
Social engineering
278
Sending multiple TCP connection synchronization packets but never responding to the acknowledgement
SYN flood
279
Agreement, cooperation, and adherence of this group of people will determine the success of an information security awareness program
Users
280
Standard which provides a framework for an organization to make sure management is meeting the needs of customers and stakeholders
ISO 9000
281
Ernst & Young, Deloitte & Touche, PricewaterhouseCoopers, and KPMG
Big Four companies who provide a high degree of valid audits with an unbiased nature
282
Naming system to describe security vulnerabilities and referred to when issuing notices.
Common Vulnerabilities and Exposures (CVE)
283
Type of scanning in which multiple flags are set in a packet
Xmas Scanning
284
Ports for FTP, SSH, Telnet, SMTP, HTTP, HTTPS
20/21, 22, 23, 25, 80, 443
285
Software used for testing and executing exploits
Metasploit
286
Type of scan which opens a half TCP connection instead of a full open connection.
TCP SYN Scanning
287
Scanning which goes deeper into the presence of vulnerabilities within a system instead of just discovering an open port
Network vulnerability scan, not a discovery scan.
288
The purpose for the "sqlmap" vulnerability scanner
To discover database vulnerabilities
289
Associate developers, senior developers or automated tools used to look for code flaws
Code peer review measures
290
Planning, overview meeting, preparation, inspection, rework and follow-up.
Fagan Inspection steps
291
Allows the usage of web services to use code modules to interact with each other. Usages amount in the billions worldwide.
Application Programming Interfaces (APIs)
292
This concept is valued over knowing how to conduct vulnerability assessment and penetration testing
Understanding the important of vulnerability assessments and penetration testing
293
Port which allows the secure and remote management of network security devices using SSH
22
294
To be a well-rounded information security professional, the CISSP and this other type of certification goes well together
Technical certification. Examples include: CCNA, GIAC, or OSCP.
295
Being 15 minutes late to the testing center, not agreeing to the NDA within 5 minutes, forgetting your ID
Reasons you may be unable to take the exam without a full refund
296
Asking this question for any high or low-level topic in the CISSP CBK broadens your knowledge and seeks to gain high-level overral understanding
Why?
297
What does Wi-fi stand for?
It doesn't stand for anything. It is a marketing term.
298
Type of virtual desktop infrastructure which retains the custom settings and desktop environment for a user even after logging off
Persistent virtual desktops
299
Type of media which would require both on-site and off-site storage
Tape media
300
Environmental, physical, and infrastructure changes force the annual test of this process
BCP/DRP
301
Cryptography services provided by digital signatures
Nonrepudiation, authentication, integrity
302
Cryptography service NOT provided by digital signatures
Confidentiality
303
Method to which digital signatures provide nonrepudiation and authentication
When sender signs the hash with their private key
304
How to provide the confidentiality of a digital signature
Encrypted hash and plaintext message must both be encrypted with the receiver's public key
305
How exactly does a digital signature provide nonrepudiation and authentication?
When the sender signs the hash with their private key, since only the sender should have their private key
306
Besides nonrepudiation, digital signatures are also used for these vendor services
Applets, software patches, authentication of code distributions
307
To digitally sign a message you must use this type of key
Your private key. Signing a message with your private key ensures nonrepudiation and authentication
308
These are basically an official endorsement of your public key
Digital certificate
309
Symantec, AWS, DigiCert, Verisign, Entrust, GlobalSign, IdenTrust
Vendors who provide digital certificates
310
Process involves checking the certificate authority's public key, as well as CRL or OCSP
Digital certificate verification process
311
Compromise, loss of private key, erroneous issuance, change in public key details, a change in security association or sponsor
Reasons to revoke a digital certificate
312
Ticket authentication system which provides identification and authentication for services
Kerberos
313
Single point of failure in a Kerberos system. Is the trusted third-party for all clients and services in a realm.
Key Distribution Center (KDC)
314
Two major components of Kerberos are provided by this entity which is hosted on the Key Distribution Center
Authentication Server
315
Security, reliability, transparency, scalability
Four basic access control requirements provided by Kerberos
316
The principal, the application or resource, and the Key Distribution Center
Components of Kerberos
317
Limited lifetime of tickets, physical security of KDC, turning off non-Kerberos services
Security best practices for Kerberos
318
Short passwords in Kerberos are susceptible to this type of attack
Brute-force
319
Long passwords in Kerberos are susceptible to this type of system malfunction
Overload of system services (Longer encryption and decryption time)
320
The basis and the main element which makes Kerberos possible
Tickets
321
Entering your memorized password and checking your hard token in your possession follows these authentication factors
Something you know, something you have
322
Process of mathematically generating a value which represents private data located somewhere else
Tokenization
323
Local encryption keys must be marked with this in order to prevent it from being sent to another system
Non-exportable mark
324
Values generated by a soft token should have this lifetime
Less than 2 minutes
325
A practice of spying which could reveal a user's soft token generated PIN number
Shoulder surfing
326
Traditional cryptography uses complex mathematical calculations, quantum cryptography relies on this branch of science
Physics
327
Obfuscations, tokenization, and generally altering a message from the original form to something indecipherable upholds this cryptographic service
Confidentiality
328
A constant state of encrypting and decrypting a message until it reaches its final destination
Link encryption
329
Controls designed to make sure strong cryptographic technology is not sent to places where it would be used maliciously
International Export Controls
330
A complementary access control principle to dual control in which two users share knowledge of a single password or secret
Split Knowledge
331
Technique to only allow specific hardware devices in your household access to the Wifi
MAC filtering
332
Transportation, industry, healthcare, energy, agriculture, defense, emergency services, building utilities, power grid
Sectors of cyber-physical systems (CPS)
333
Abstractions, modularity, diagnostics, prognostics, distributed sensing, integration of multi-physics models, autonomy, human-interaction
Core technologies needed to maintain the security and viability of cyber-physical systems (CPS)
334
Industrial Control Systems (ICS)
Single standalone computers which monitor and control industrial and infrastructure systems like cyber-physical systems
335
A subgroup of Industrial Control Systems widely used to control, monitor, and interconnect cyber-physical systems
Supervisory Control and Data Acquisition (SCADA )
336
DDOS, unauthorized remote access endpoints, human error, sabotage, technical errors or accidents, unintentional outages, compromise of network hardware
Threats to Industrial Control Systems (ICS)
337
NISTIR 7628 is a good document to read in order to familiarize yourself with understanding of how to secure this type of system.
Cybersecurity for the electric power infrastructure.
338
Special purpose long-term use key used to protect a session key
Key encrypting key (KEK)
339
The process of using a key encrypting key to protect a session key
Key wrapping
340
You will most likely not have to know this formula for the exam, but it is useful to the know purpose of n (n-1)/2
Calculating the number of symmetric keys used for users (n is the number of users)
341
A central location where private keys are held should be encrypted, signed, and MACed in order to provide these two security services
Integrity and confidentiality
342
The period of time in which a cryptographic key can be used and even stored for decades in order to verify signatures and decryption
Crypto period
343
Is there a policy for the governship and usage of private keys? How long will key be in long term storage? What is the exposure risk to the data if the key is compromised?
Questions to ask when archiving crypto keys
344
Key derivation process, the threat factor, open office vs public terminal, data encryption, key production, key protection guidelines, number of copies of a key
Factors affecting risk exposure to crypto keys
345
Official terms used to describe a message of mixed length to go through a hash and have the output a standard length
Variable-length input, fixed-length output (relate this to hashing algorithms like MD5 or SHA)
346
Studying the amount of power a device may emit in order to use it in a passive attack to discover the secret key of a cryptographic algorithm
Side-channel attack
347
Diffie-Hellman uses public/private keys but not for the encryption of the message. The main function is for another crypto service
Secure key exchange
348
Type of cryptographic attack which works best against a substitution cipher with known plaintext language statistics
Frequency analysis
349
If I created a file, and I trusted you with it, and only you with it
Non-transitive trust
350
If I created a file, I trust you with the file, and your friend with the file
Transitive trust