CISSP Study Flashcards

1
Q

-An active/active pair can use the full throughput capability of both devices, but normal deployment models will design to the maximum throughput of a single device to avoid disruption in the event that one of the pair fails. Active/passive designs can only handle the throughput of a single device and allow the secondary device to remain ready to operate but not passing traffic until it is needed. Line interactive is a term often used to describe UPS systems that filter power instead of passing it through, and near-line is a term used to describe backups that are not online but can be retrieved relatively quickly.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

-PEAP is the best solution. It encapsulates EAP in a TLS tunnel, providing strong encryption. LEAP is a Cisco proprietary protocol that was originally designed to help deal with problems in WEP.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

-Starlink is newer low orbit satellite internet.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

-The application layer defines network policies using API, the control layer translates these policies into network configurations, and the data plane forwards packets based on these configurations.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

-Common drawbacks of multilayer protocols are that they can bypass filters, allow or create covert channels, and allow network segment boundaries to be bypassed. The ability to operate at higher OSI layer levels is normally considered a benefit.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

-5G technology includes both a new mutual authentication capability and additional protections for subscriber identities.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

-The TCP three-way handshake consists of initial contact via a SYN, or synchronize flagged packet; which receives a response with a SYN/ ACK, or synchronize and acknowledge flagged packet; which is acknowledged by the original sender with an ACK, or acknowledge packet. RST is used in TCP to reset a connection, PSH is used to send data immediately, and FIN is used to end a connection.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

-The five key concepts of decomposition are trust boundaries, dataflow paths, input points, privileged operations, and details about security stance and approach.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

-Confusion and diffusion are two principles underlying most cryptosystems. Confusion occurs when the relationship between the plaintext and the key is so complicated that an attacker can’t merely continue altering the plaintext and analyzing the resulting ciphertext to determine the key. Diffusion occurs when a change in the plaintext results in multiple changes spread throughout the ciphertext.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

-The one-time pad (OTP) is a type of encryption technique that is theoretically unbreakable if implemented correctly. It uses a pad of random, unique key values that are as long as the message itself.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

-An initialization vector (IV) is a random bit string (a nonce) that is the same length as the block size that is XORed with the message. Is used to create a unique ciphertext every time the same message is encrypted with the same key. Vigenère ciphers are an example of a substitution cipher technique.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

-Galois/Counter Mode (GCM) and Counter with Cipher Block Chaining Message Authentication Code mode (CCM) are the only two modes that provide both confidentiality and data authenticity. Other modes, including Electronic Code Book (ECB), Output Feedback (OFB), and Counter (CT) modes, only provide confidentiality.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

-One important consideration when using CBC mode is that errors propagate- if one block is corrupted during transmission, it becomes impossible to decrypt that block and the next block as well.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

-The major disadvantage of the ElGamal cryptosystem is that it doubles the length of any message it encrypts. Therefore, a 2,048-bit plaintext message would yield a 4, 096-bit ciphertext message when ElGamal is used for the encryption process.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

-The elliptic curve cryptosystem requires significantly shorter keys to achieve encryption that would be the same strength as encryption achieved with the RSA encryption algorithm. A 3,072-bit RSA key is cryptographically equivalent to a 256-bit elliptic curve cryptosystem key.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

-The SHA-2 hashing algorithm comes in four variants. SHA-224 produces 224-bit digests.
SHA-256 produces 256-bit digests. SHA-384 produces 384-bit digests, and SHA-512 produces 512-bit digests.

A
17
Q

-FIPS 186-4 The Digital Signature Standard allows federal government use of the Digital Signature Algorithm, RSA, or the Elliptic Curve DSA in conjunction with the SHA-1 hashing function to produce secure digital signatures.

A
18
Q

-The PFX format is most closely associated with Windows systems that store certificates in binary format, whereas the P7B format is used for Windows systems storing files in text format.

A
19
Q

-SSH2 adds support for simultaneous shell sessions over a single SSH connection. Both SSH1 and SSH2 are capable of supporting multifactor authentication. SSH2 actually drops support for the IDEA algorithm, whereas both SSH1 and SSH2 support 3DES.

A
20
Q

-The trusted computing base (TCB) has a component known as the reference monitor in theory, which becomes the security kernel in implementation. The other options do not have this feature. The Graham-Denning model is focused on the secure creation and deletion of both subjects and objects. The Harrison-Ruzzo-Ullman (HRU) model focuses on the assignment of object access rights to subjects as well as the integrity (or resilience) of those assigned rights.

A
21
Q

-The trusted computing base (TCB) has a component known as the reference monitor in theory, which becomes the security kernel in implementation. The other options do not have this feature. The Graham-Denning model is focused on the secure creation and deletion of both subjects and objects. The Harrison-Ruzzo-Ullman (HRU) model focuses on the assignment of object access rights to subjects as well as the integrity (or resilience) of those assigned rights.

A
22
Q

-The three parts of the Clark-Wilson model’s access control relationship (aka access triple) are subject, object, and program (or interface).

A
23
Q

-The TCB (trusted computing base) is the combination of hardware, software, and controls that work together to enforce a security policy.

A
24
Q

-The predetermined set or domain (i.e., a list) of objects that a subject can access is the Goguen-Meseguer model.

A
25
Q

-The reference monitor validates access to every resource prior to granting the requested access. The security kernel, is the collection of Trusted computing base components that work together to implement the reference monitor functions. In other words, the security kernel is the implementation of the reference monitor concept.

A