Part 1 Flashcards
CISSP domain Security and Risk Management?
Defining security goals and objectives, risk mitigation, compliance, business continuity, and the law.
Which CISSP Domain defines security goals and objectives, risk mitigation, compliance, business continuity, and the law.
Security and Risk Management.
Which area of CISSP does the following example belong in?
Security analysts may need to update company policies related to private health information if a change is made to a federal compliance regulation such as the Health Insurance Portability and Accountability Act, also known as HIPAA.
Security and Risk Management.
CISSP domain Asset Security?
Securing digital and physical assets. Also related to the storage, maintenance, retention, and destruction of data.
Which area of CISSP does the following example belong in?
An analyst is tasked with making sure that old equipment is properly disposed of and destroyed, including any type of confidential information.
Asset Security Domain.
Which CISSP domain is involved in securing digital and physical assets. Also related to the storage, maintenance, retention, and destruction of data.
Asset Security.
CISSP domain Security architecture and engineering?
Focuses on optimizing data security by ensuring effective tools, systems, and process are in place.
Which CISSP domain focuses on optimizing data security by ensuring effective tools, systems, and process are in place.
Security Architecture and Engineering.
Which CISSP domain is the following an example of?
Configuring a firewall.
Security Architecture and Engineering.
What is a firewall?
A device used to monitor and filter incoming and outgoing computer network traffic.
A device used to monitor and filter incoming and outgoing computer network traffic.
Firewall.
CISSP domain Communication and Network Security?
Focuses on managing and securing physical networks and wireless communications.
Which CISSP domain focuses on managing and securing physical networks and wireless communications?
Communication and Network Security.
Which CISSP domain is the following an example of?
Analyzing user behavior within your organization
Communication and Network Security.
CISSP domain Identity and Access Management?
Focuses on keeping data secure, by ensuring users follow established policies to control and manage physical assets, like office spaces, and logical assets, such as networks and applications.
which CISSP domain focuses on keeping data secure, by ensuring users follow established policies to control and manage physical assets, like office spaces, and logical assets, such as networks and applications.
Identity and Access Management.
Which CISSP domain is the following and example of?
Setting up employees’ keycard access to buildings.
Identity and Access Management.
CISSP domain Security Assessment and Testing?
Focuses on conducting security control testing, collecting and analyzing data, and conducting security audits to monitor for risks, threats, and vulnerabilities.
Which CISSP domain focuses on conducting security control testing, collecting and analyzing data, and conducting security audits to monitor for risks, threats, and vulnerabilities.
Security Assessment and Testing.
Which CISSP domain is the following an example of?
Analyst who is asked to regularly audit permissions to ensure that no unauthorized person can view employee salaries.
Security Assessment and Testing.
CISSP domain security operations?
Focuses on conducting investigations and implementing preventative measures.
CISSP domain that focuses on conducting investigations and implementing preventative measures.
Security Operations
Which CISSP domain is the following an example of?
As an analyst, you receive an alert that an unknown device has been connected to your internal network. You would need to follow the organization’s policies and procedures to quickly stop the potential threat.
Security Operations.
CISSP domain software development security?
Focuses on using secure coding practices, which are a set of recommended guidelines that are used to create secure applications and services.
Which CISSP domain focuses on using secure coding practices, which are a set of recommended guidelines that are used to create secure applications and services?
Software Development Security.
Which CISSP domain is the following an example of?
If one of your partner teams is creating a new mobile app, then you may be asked to advise on the password policies or ensure that any user data is properly secured and managed.
Software Development Security.
Password attack?
Which domain do they fall under?
An attempt to access password-secured devices, systems, networks, or data.
Communication and network security domain.
Social Engineering Attack?
Which domain do they fall under?
A manipulation technique that exploits human error to gain private information, access, or valuables.
Security and Risk Management Domain.
Physical attack?
Which domain do they fall under?
Security incident that affects not only digital but also physical environments where the incident is deployed.
Asset Security Domain.
Adversarial Artificial Intelligence?
Which domain(s) does it fall under?
A technique that manipulates artificial intelligence and machine learning technology to conduct attacks more efficiently.
Communication and network security OR
Identity and access management.
Supply-Chain Attack?
Which domain(s) do they fall under?
Targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed.
Security and Risk Management.
Security Architecture and Engineering.
Security Operations Domain.
Cryptographic Attack?
Which domain do they fall under?
Affects secure forms of communication between a sender and intended recipient.
Communication and Network Security.
Advanced Persistent Threats (APTs)?
What are their typical intentions and motivations?
These attackers have significant expertise accessing an organization’s network without authorization.
Damaging critical infrastructure, such as the power grid and natural resources.
Gaining access to intellectual property, such as trade secrets or patents.
Insider Threats?
What are their typical intentions and motivations?
These attackers abuse their authorized access to obtain data that may hard an organization.
Sabotage.
Corruption.
Espionage.
Unauthorized.
These attackers abuse their authorized access to obtain data that may hard an organization.
Insider threats.
These attackers have significant expertise accessing an organization’s network without authorization.
Advanced Persistent Threats.
Hacktivists?
What are their typical intentions and motivations?
Threat actors that are driven by a political agenda.
Demonstrations.
Propaganda.
Social Change Campaigns.
Fame.
Threat actors that are driven by a political agenda.
Hacktivists.
What are the three main category of hackers?
Authorized (ethical hackers).
Semi-authorized hackers (researchers).
Unauthorized hackers (unethical hackers).
Authorized (ethical) hackers?
Follow a code of ethics and adhere to the law to conduct organizational risk evaluations. Motivated to safeguard people and organizations from malicious threat actors.