CISSP Flashcards
(51 cards)
What is the relationship between our Business Continuity Plan (BCP) and our Disaster Recovery Plan (DRP)?
The DRP is a sub-plan of the BCP.
BCP (Business Continuity Plan)
- DRP - DisasterRecovery Plan
- COOP - Continuity Of Operations Plan
- CCP - Crisis Communication Plan
- CIPP - Critical Infrastructure Protection Plan
- CIRP - Cyber Incident Response Plan
- ISCP - Information System Contingency Plan
- OEP - Occupant Emergency Plan
What does “scoping” mean?
scoping - To pick and choose which parts of the standard or framework we want to implement.
In a “White Box” test, what information would we have?
the software
source code
data structures
variables
What is the extranet?
Connected private intranets often between business partners or parent/child companies.
Quantitative Risk Analysis
cost to risk:
AV (Asset Value) - Monetary Value
EF - Exposure Factor - % of Value Lost
ARO - Annual Rate of Occurence - How often per year will it occur
PRIMARY reaon we would chose to use hash functions?
Integrity - One Way hash functions.
A variable-ength plaintext is hashed into a fixed-length value hash or MD (Message Digest). It is used to prove the Integrity of the data has not changed. Even changing a comma in a 1000 page document will produce an entirely new hash.
mitigate injection attacks (OWASP A1) on our web servers. What can we implement to help with that?
A1 Injection. Can be any code injected into user forms, often seen is SQL/LDAP. Attackers can do this because our software does not use: Strong enough input validation and data type limitations input fields. Input length limitations. The fix is to do just that, we only allow users to input appropriate data into the fields, only letters in names, numbers in phone number, have dropdowns for country and state (if applicable), we limit how many characters people can use per cell,
How long are copyrighted materials protected after the creator’s death?
Copyright © applies to books, art, music, software and much more. It is automatically granted and lasts 70 years after creator’s death or 95 years after creation by/for corporations.
If we want to implement a type of encryption that uses discrete logarithms, which of these could we choose?
Elliptic Curve Cryptography (ECC) is a one-way function that uses discrete Logarithms applied to elliptical curves. Much stronger per bit than normal discrete Logarithms.
Which type of networking circuits would we use to ensure the traffic ALWAYS uses the same path?
Circuit switching - Expensive, but always available; used less often. A dedicated communications channel through the network. The circuit guarantees the full bandwidth. The circuit functions as if the nodes were physically connected by a cable.
Which generation of programming languages often use a graphical user interfaces and drag and drops for generating the actual code?
4th Generation languages (4GL): Often uses a GUI, drag and drop, and then generating the code, often used for websites, databases and reports.
We are adding hashing to our passwords. Which of these is a hashing function we could consider?
RIPEMD: Developed outside of defense to ensure no government backdoors. 128, 256, 320 bit hashes. Not widely used. No longer secure.
We have decided to change the type of hashing we use to a newer version that is collision resistant. What happens when a hash collision occurs?
When 2 hashes of different data provide the same hash it is called a collision. It is possible, but very unlikely.
Key Benefit of QoS
QoS (Quality of Service) gives specific traffic priority over other traffic; this is most commonly VoIP (Voice over IP), or other UDP traffic needing close to real time communication. Other non real time traffic is down prioritized; the 0.25 second delay won’t be noticed.
We want to find the right mix of confidentiality, integrity and availability. Which of these is NOT one of the CIA triad opposite?
Aggregation.
The CIA (Confidentiality, Integrity, Availability) Triad: Confidentiality - We keep our data and secrets secret. Integrity - We ensure the data has not been altered. Availability - We ensure authorized people can access the data they need, when they need to.
Which type of authentication is the WORST to have compromised, because we are unable to reissue it?
Something you are - Type 3 Authentication (Biometrics): Lost passwords and ID cards can be replaced with new different ones. Biometrics can’t. You can’t change your fingerprints; once compromised they are always compromised.
If we are looking for information on a specific systems hardware, which of our plans could we find that in?
DRP (Disaster Recovery Plan): Often the “how” and system specific, while the BCP is more “what” and non-system specific. This is the process of creating the short-term plans, policies, procedures and tools to enable the recovery or continuation of vital IT systems in a disaster. It focuses on the IT systems supporting critical business functions, and how we get those back up after a disaster. DRP is a subset of our BCP. We look at what we would do if a we get hit with a Distributed Denial Of Service (DDOS) attack, if a server gets compromised, if we experience a power outage, etc.
Which of these types of memory keeps the data they store, as long as they have power and the data is NOT overwritten?
SRAM (Static RAM): Fast and expensive. Uses latches to store bits (Flip-Flops). Does not need refreshing to keep data, keeps data until power is lost. This can be embedded on the CPU.
Health care systems in the US must be HIPAA compliant. What is HIPAA an abbreviation of?
HIPAA is the Health Insurance Portability and Accountability Act.
Which of these countermeasures would be effective against rainbow tables?
Salt (Salting): Random data that is used as an additional input to a one-way function that “hashes” a password or passphrase. The primary function of salts is to defend against dictionary attacks or a pre-compiled rainbow table attack. Rainbow Tables: Pre-made list of plaintext and matching ciphertext, often passwords and matching hashes. A table can contain millions of pairs.
At the quarterly leadership conference, you are talking about threats to our environments and one of the participants asks you to define what a threat is. Which of these could be your answer?
Threat – A potentially harmful incident (Tsunami, Earthquake, Virus, etc.)
In a Business Impact Analysis (BIA) assessment, which of these statements would be acceptable?
MTD (Maximum Tolerale Downtime) ? RTO (recovery time objective) + WRT (Work Recovery Time): The time to rebuild the system and configure it for reinsertion into production must be less than or equal to our MTD.
Which of these, is NOT a phase of our Disaster Recovery Planning (DRP) lifecycle?
DRP has a lifecycle of Mitigation, Preparation, Response and Recovery. Mitigation: Reduce the impact, and likeliness of a disaster. Preparation: Build programs, procedures and tools for our response. Response: How we react in a disaster, following the procedures. Recovery: Reestablish basic functionality and get back to full production.
What is the difference between freeware and shareware?
Freeware: Actually free software, it is free of charge to use. Shareware: Fully functional proprietary software that is initially free to use. Often for trials to test the software, after 30 days you have to pay to continue to use.