CISSP Flashcards

(80 cards)

1
Q

ISO 27001

A

ISMS Requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ISO 27002

A

Code of practice for ISM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ISO 27003

A

ISMS-Implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ISO 27004

A

ISM Measurement and Metrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ISO 27005

A

IS Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ISO 27006

A

Audit and Certification of ISMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ISO 42010

A

System und Softwarearchitektur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NIST 800-37

A

Risk-Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IPSec

A

AH, ESP, IKE (Oakley, ISAKMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Asymmetrische Verfahren

A

RSA, DSA
ECC, EL-Gamal
DH und Knapsack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Stream-Cipher

A

RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Number of Keys Symmetric

A

n(n-1)

/2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Number of Keys Asymmetric

A

2n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Key-Length DES

A

56 Bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DES: ECB-Mode

A

Electronic Code Book -> 64 Bit Blocks

Blockweise, Muster erkennbar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DES: CBC-Mode

A

Cipher Block Chaining -> 64 Bit Blocks

IV beim ersten Schritt, danach Cypher-Text als XOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DES: CFB-Mode

A

Cipher Feedback

Stream-Version von CBC, vorherige Fehler werden weitergetragen, Key-Generierung mit Ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DES: OFB-Mode

A

Output Feedback

Stream-Version von CBC, Fehler werden nicht weitergetragen, Key-Generierung mit Plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DES: CTR-Mode

A

Counter

Wie OFB, bessere Performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Metasploit

A

Pentesting-Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Nessus

A

Vulnerability-Scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

NMAP

A

Netzwerk-Mapper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Rainbow-Table

A

Hashed-Passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

SMURF

A

ICMP-Echo Request with spoofed Address are sent to the Broadcast-Address of the target Network -> All devices are Pinged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Bluesnarfing
Taking data from the device
26
Bluejacking
Sending unsolicited messages
27
Fraggle
UDP-Echo Request with spoofed Address are sent to the Broadcast-Address of the target Network -> All devices are Pinged
28
ICMP-Flood
Flooding the target-network with ICMP-Packets
29
Man-in-the-Middle
Intercepting traffic for taking over the session or reading data
30
Meet-in-the-Middle
Encryption-Attack from Both sides: Encrypting a message and decrypting a Ciphertext
31
DNS-Poisoning
Changing entries in the DNS-Table for re-routing to malicious websites
32
Session-Hijacking (Session token interception)
Übernahme eines Session-Tokens (nur bei unverschlüsselter Übertragung)
33
SYN-Flood
Öffnen von TCP-Verbindungen (SYN)
34
Teardrop
Sending of Malformed Packets
35
UDP-Flood
Flooding the target-network with UDP-Packets
36
Replay
Encrypted Message is intercepted and then sent again in order to open initiate new session.
37
Birthday
Seeking to generate the same hash for a different message
38
Chosen Plaintext
Plaintext of Attackers choice can be encrypted for analysis
39
Chosen Ciphertext
Chosen portions of a ciphertext can be decrypted for analysis
40
Known Plaintext
Encrypted text and Plaintext are available
41
Ciphertext Only
Only Ciphertext is available
42
Defense Replay
Timestamps and Sequence numbers
43
Defense Smurf
Dropping ICMP-Packets
44
Defense Fraggle
Block distributed Broadcast
45
Defense SYN-Flood
Stateful Inspection Firewall
46
Defense Buffer Overflow
Input Validation
47
Real Evidence
Tangible or physical Objects
48
Circumstancial Evidence
Circumstances
49
Direct Evidence
Testimony of Witness
50
Corroborative Evidence
Support for a fact
51
Hearsay Evidence
Second Hand Evidence
52
Secondary Evidence
Copies of Originals
53
Trademark
Name, Logo, Symbol or Image
54
Copyright
Protects the form of expression in artistic, musical, or literary works
55
Trade Secret
Business-Proprietary Information, that is important for the business to compete
56
Patent
Right to use, make or sell a product or method
57
SOX
Sarbanes-Oxley - Financial information of publicly traded Organizations
58
GLBA
Gramm-Leach-Bliley Act - PII-Protection
59
FISMA
Requirement to implement a IS-Program for Federal Agencies
60
Bell-La-Padula
Confidentiality Simple security: no read up *-Property: no write down Strong * Property: if read+write are granted, then only at the same level -> Subjects and Objects classification must be equal
61
Clark-Wilson
Enforces well-formed transactions through the access triple: User->Transformation procedure->Data Item
62
Biba
Integrity Simple integrity: no read down * Integrity: no write up Invocation property: Niedriger kann höher nicht callen
63
Brewer-Nash
Chinese Wall model
64
TCSEC
Orange Book
65
XSS
Cross-Site-Scripting -> Scripts in Input-Forms - non-persistent (bounce) - persistent - DOM
66
COBIT
IS best practices for Organizations (von ISACA)
67
Data Remanence
Residual Data on magnetic discs
68
Degaussing
Deleting Data on magnetic discs with a magnetic field
69
Erasing
Deleting the catalogue link (FAT-Table)
70
Clearing
Overwriting
71
Purging
Overwriting + another method (degaussing, etc.)
72
Sanitization
Purge data completely without destroying the media
73
Security-Mode: Dedicated
All users must have clearance, access permissions and need to know for everything on the system
74
Security-Mode: System high
All users must have clearance, access permissions and need to know for some things on the system
75
Security-Mode:Compartmented
All users must have clearance
76
Multilevel
Nothing
77
Multitasking
Alternating tasks (subprograms) on a single processor
78
Multiprogramming
Alternating programs on a single processor
79
Multiprocessing
Excecutes multiple programs on several processors
80
Multithreading
Executing multiple concurrent tasks within one process