CISSP Flashcards
(140 cards)
fuzz test
black box
4GL
ColdFusion, Progress 4GL, SQL, PHP and Perl
Pentest
Plan, Reconnaissance, Scan(enumeration), Vulnerability assess, Exploit, Report
Real pentest attack
Plan, Reconnaissance, Scan(enumeration), Vul assess, Exploit, delete log/evidence, install backdoors
IPv6 Mac
EUI/MAC-64
if EUI/MAC-48 card used
add fffe
Relational Model: Rows
records or tuples
Relational Model: Rows represent
instances of the type of entity
Relational Model: Columns represent
values attributed to the instance
monolithic kernel
supervisor mode
brute force
key stretching (add time to password verification)
IAAA: authentication
password
IAAAA: identification
user name
Computer-aided software engineering (CASE)
Tools, workbenches, environments
ANN not true
use rule based program and a lot of IF/THEN statements
Transitive trust
A trust that can extend beyond two domains to other trusted domains in the forest.
Security Audit Logs (Audit trail) problems
- Logs are not reviewed on a regular and timely basis
- Audit logs and audit trails are not stored for a long enough time period
- Logs are not standardized or viewable by correlation toolsets - they are only viewable from the system being audited.
- Log entries and alerts are not prioritized
- Audit records are only reviewed for the bad stuff
FRAP (Facilitated Risk Analysis Process)
analyses one business unit, application, or system at a time in a roundtable brainstorm with internal employees. Impact analyzed, Threats, and Risks Prioritized.
Salt (salting):
Random data is used as an additional input to a one-way function that hashes a password or passphrase. The primary function of salts is to defend against dictionary attacks or a pre-compiled rainbow table attack.
SDLC project management software development methodologies models
Waterfall, Agile, Sashimi(waterfall with feedback), V-Shaped, Iterative, Spiral, Big Bang
SDLC
Software Development Life Cycle
PERT
Program Evaluation Review Technique
4th amendment
not protect anything search warranted
multifactor authentication online
username, password, and cookie