CISSP Flashcards

(66 cards)

1
Q

ISC2 Code of Ethics: Preamble

A

The safety and welfare of society and the common good, duty to our principals, and duty to each other requires that we adhere, and be seen to adhere, to the highest ethical standards of behavior.

Therefore, strict adherence to this Code is a condition of certification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ISC2 Code of Ethics: Canons

A

1) Protect society, the common good, necessary public trust and confidence, and the infrastructure.

2) Act honorably, honestly, justly, responsibly, and legally.

3) Provide diligent and competent service to principals.

4) Advance and protect the profession.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OSI Layers

A

7 Application
6 Presentation
5 Sessions
4 Transport
3 Network
2 Data Link
1 Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

OSI: Application

A

Network Process to Application
Application Firewall
HTTP/S
DNS
SSH
SNMP
FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

OSI: Presentation

A

Data representation and encryption.
XML
JPEG
ANSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

OSI: Session

A

Interhost communication and session management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

OSI: Transport

A

End-to-end connection with error correction and detection
TCP/UDP
iSCSI (SAN

Uses segments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OSI: Network

A

Local addressing, routing and delivery of packets.
Routers
Packet Filtering Firewalls
IP Addresses
ICMP
NAT

Uses Bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

OSI: Data Link

A

Physical addressing and reliable point-to-point connection.
Switches
Bridges
MAC Addresses
Point-to-Point Protocol (PPP)
Point-to-Point Protocol over Ethernet (PPPoE)
ARP

Uses Frames.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

OSI: Physical

A

Media, Signal and Binary Transmission

Uses Bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TCP/IP Model

A

Application
Transport
Internet
Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Incident Response

A

Preparation
Detection
Response
Mitigation
Reporting
Recovery
Remediation
Lessons Learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cyber Kill Chain: Recon

A

Identify vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cyber Kill Chain

A

Recon
Weaponization
Delivery
Exploit
Installation
Command & Control (C&C)
Actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cyber Kill Chain: Weaponization

A

Create Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cyber Kill Chain: Delivery

A

Transmits weapon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Cyber Kill Chain: Exploit

A

Exploit vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Cyber Kill Chain: Installation

A

Installs persistent access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Cyber Kill Chain: C&C

A

Persistent access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Cyber Kill Chain: Actions

A

Achieve goal, exfiltrate data, ransomware, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

IR: Preparation

A

Developing IR process, team members, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

IR: Detection

A

Triage
Identify an adverse event - an incident - and begin dealing with it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

IR: Response

A

Triage
IR Team is activated and begin impact assessment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

IR: Mitigation (Containment)

A

Action/Investigation
Minimize damage or impact from the incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
IR: Reporting
Action/Investigation Happens throughout incident response.
26
IR: Recovery
Recovery Return to normal Getting back to business as usual.
27
Remediation
Recovery Prevention methods such as implementing fixes and improvements to systems, processes to prevent similar incidents.
28
IR: Lessons Learned
Recovery Improve processes and try to prevent future incidents.
29
Layer / Lattice-based Models
Bell-LaPadula Biba
30
Bell-LaPadula
Confidentiality Simple security property, “no read up”. Star (*) property, “no write down”. Strong star property: read and write.
31
Biba
Integrity Simple integrity property: “no read down” Star (*) integrity property: “no write up” Invocation property: can’t send information to someone that is rated at a higher layer.
32
Rule-Based Models
Information Flow Clark-Wilson Brewer-Nash (Chinese Wall) Graham-Denning Harrison-Ruzzo-Ullman
33
Information Flow Model
Help address unintentional covert channels.
34
Clark-Wilson Model
Integrity Rules of Integrity Well-Formed Transactions: Good, consistent, validated data. Separation of Duties Access Triple: Subject | Program | Object
35
Brewer-Nash (The Chinese Wall) Model
Preventing conflicts of interest.
36
Graham-Denning
Integrity Specific rules for allowing subjects to access objects.
36
ISO 27001
Provides best practice recommendations for a functional security department. Organizations can be certified against ISO 27001
36
Harrison-Ruzzo-Ullman Model
Integrity Adds Generic Rights, rights applied to everyone universally.
36
ISO 27002
Implementation guidance for ISO 27001
37
ISO 27001 - Annex A
Where the domains and controls are listed.
38
Symmetric Cryptography Advantages
Fast/Efficient Strong
39
Symmetric Cryptography Disadvantages
Key Distribution Scalability No authenticity, integrity, or nonrepudiation
40
Symmetric Cryptography
Same key has to be at both ends to decrypt and encrypt.
41
Asymmetric Cryptography
Different keys that decrypt and encrypt at both ends.
42
DES
Weak Symmetric key: 56 Block 64
43
IDEA
Strong Key: 128 Block: 64
44
3DES
Strong Key: 168=112 Block: 64 Susceptible to meet in the middle attack.
45
AES
Very Strong Key: 128, 192, 256 Block: 128
46
Asymmetric Advantages
Solves key exchange problem Enables digital signatures and other services, like authenticity (proof of origin), confidentiality, and access control Solves scalability
47
Asymmetric Disadvantages
Significantly slower Requires large key sizes
48
RSA
Math: Factoring
49
Ellipitic Curve (ECC)
Math: Discrete logarithm ECC uses shorter keys than RSA for same level of security.
50
Diffie-Hellman
Math: Discrete Logs Only used for Key Exchange.
51
ElGamal
Asymmetric key encryption algorithm for public-key cryptography which is based on Diffie-Hellman key exchange.
52
DSA (Digital Signature Algorithm)
Uses a different algorithm for signing and encryption than RSA, yet provides the same level of security. Key generation has two phases.
53
FTP
Port 20/21
54
Secure Shell (SSH)
Port 22
55
SMTP
Port 25 Port 587 is secure via TLS
56
NTP (Time)
Port 37
57
DNS
Port 53
58
TFTP
Port 69
59
HTTP
Port 80
60
SNMP
Port 161
61
SNMP Trap
Port 162
62
Border Gateway Protocol (BGP)
Port 179
63