CISSP #1 Flashcards

(45 cards)

1
Q

Access control: directive

A

used to define appropriate use and behavior within an organization with regard to that organization’s systems and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access control: deterrent

A

used to dissuade potential attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access control: preventive

A

used to stop potential attacks by preventing users from performing specific actions or functions on a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Access control: compensating

A

used to supplement directive access controls, such as company policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Access control: detective

A

used to monitor or send alerts about malicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Access control: corrective

A

used to repair damage caused by malicious events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Access control: recovery

A

used to restore a system to a normal state after malicious activity has occurred.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Brownout

A

long period of low voltage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Sag

A

short period of low voltage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

blackout

A

long period of power loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

fault

A

short period of power loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Policies

A

Provide a high-level overview of the company’s security posture, creating the basic framework upon which a company’s security program is based. Contains mandatory directives an employee must follow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Standards

A

Define the technical aspects of a security program, including hardware and software. These are mandatory things.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Procedures

A

Low-level guides that explain how to accomplish a task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Baselines

A

Minimum level of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Guidelines

A

Provide helpful bits of advice to employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Quartz Lamps

A

high wattage and immediately cast a bright white light. most appropriate for security lighting that requires quick and near-daylight brightness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Mercury vapor lights

A

slow to full brightness. typically for continuous or emergency security lighting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Sodium vapor lights

A

emit a soft yellow light and are best used in foggy conditions

20
Q

Fluorescent lights

A

sensitive to temperature and are best suited for indoor uses

21
Q

Configuration management steps:

A
  1. Baselining 2. Patch management 3. Vulnerability management
22
Q

Change management steps:

A
  1. Requests 2. Impact assessment 3. Approval/Disapproval 4. Build and test 5. Notification 6. Implementation 7. Validation 8. Documentation
23
Q

Bell-Lapadula model

A

Confidentiality; uses Simple Security Property and the * security property.

24
Q

Simple security property

A

no read up policy

25
* security property
no write down policy
26
Biba model
Integrity; uses Simple Integrity Axiom and the * Integrity Axiom
27
Simple integrity axiom
no read down policy
28
* integrity axiom
no write up policy
29
Clark-Wilson model
Integrity; requires subjects to use programs to access objects
30
Brewer-Nash model
Chinese Wall; focused on avoiding conflicts of interest, not ensuring confidentiality.
31
Reference monitor
OS kernel function that determines whether a subject with a specific clearance level can access an object of a different classification level
32
Abstraction
the process of hiding the operational complexity of a system from the system's user
33
process isolation
involves the use of object encapsulation or time multiplexing to logically segregate processes so that one process does not interfere with another process
34
Secure memory management
involves the use of other techniques, such as layering, data hiding, and processor states, to protect data that is stored in memory from being corrupted.
35
hashing algorithm (definition)
used to create a fixed-length value called a hash, which is the result of a mathematical calculation performed on a particular data set. By comparing two hash values for the same file, you can determine whether the file has been tampered with.
36
Symmetric key types
AES; RC5;
37
Hashing algorithms
MD5; SHA;
38
Hashing algorithms
MD5; SHA;
39
TEMPEST
collaborative program between the US and UK that examines electromagnetic leaks and makes recommendations on how to mitigate them
40
protocol data units
Transport = segments; network = packets; data link = frames; physical = bits
41
DES Modes of operation (in order of best to worst)
Counter; Cipher Block Chaining; Cipher Feedback; Output Feedback; Electronic Code Book
42
SQL Revoke
specified user's access rights will be removed; in addition, all users who have been granted access by the specified user will also have their access rights removed.
43
TCSEC
Security evaluation standard known as the Orange Book. Created by the DoD in 1980s.
44
ITSEC
European set of security evaluation criteria that is based on TCSEC and is used internationally.
45
International Common Criteria
international standard that is used to test the security of IT products; it uses a hierarchy of current state-of-the-art requirements to test security.