Question set 1 Flashcards

1
Q
  1. What is the CISSP Triad?
A

-CIA = 1. Confidentiality 2. Integrity 3. Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Definition of Confidentiality
A

Ensures that information is not compromised or shared amongst unauthorized participants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Definition of Integrity
A

Ensures that data is not damaged or modified while either in transit or storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Definition of Availability
A

Ensures that information is always available at the time authorized users need it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. What are the 3 times data is secured?
A
  1. In storage 2. In process 3. In transit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. General categories of controls
A

Administrative, technical, and physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Types of controls
A

Preventative, Deterrent, Corrective, Recovery, Detective, Directive, Compensation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Preventative control
A

stop attack before beginning. Ex: firewalls, fence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Deterrent control
A

discourage someone from trying. Ex: warning sign

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Corrective control
A

attack begins, but stops before damage occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Recovery control
A

attack happens and causes damage, but control reverses damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Detective control
A

-detects attack but doesn’t do anything about attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Directive control
A

procedures to follow. Normally an administrative control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Compensation control
A

No real control, but reaction after attack happens. Ex: insurance, lawyers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. What are some good operation security practices?
A

-separation of duties, job rotation, need to know, least privilege, personnel security, mandatory vacations, job action warnings or termination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Separation of Duties
A
  • Application of the principle of least privilege on administrative accounts
  • Ensures one person cannot compromise an organization’s security
17
Q
  1. Job rotation
A
  • more than one person fulfills task or position

- small group of cross-trained employees who switch jobs and access settings every 3 to 6 months

18
Q
  1. Need to know
A
  • Individuals should only have access to information they need to know in order to do their job
  • tied to least privilege
19
Q
  1. Principle of least privilege
A

-individuals should have just enough access to do the task at hand and nothing more

20
Q
  1. Due Diligence and Due Care
A
  • Due Diligence=Do Detect

- Due Care=Do Correct

21
Q
  1. Accountability
A
  • Link processes/users to certain actions

- prohibit shared accounts

22
Q
  1. Functions of change management
A
  • Ensure change is implemented in orderly manner
  • Analyze effect of the change
  • Reduce negative impact
23
Q
  1. Clipping Levels
A
  • number of permitted failures before locking out

- errors below clipping level are ignored or considered par for the course or normal

24
Q
  1. Data remanence
A
  • data left on media after the media has been erased or cleaned
25
Q
  1. Trusted recovery
A
  • occurs when the system detects an unsafe, unstable, or insecure state
  • blue screen is a good example