CISSP Assessment answers Flashcards
(62 cards)
Detective access controls are used to discover (and document) unwanted and unauthorised activity.
Strong password choices are difficult to guess, unpredictable, and of specified minimum lengths to ensure that password entries cannot be computationally determined. They may be randomly generated and utilize all the alphabetic, numeric, and punctuation characters; they should never be written down or shared; they should not be stored in publicly accessible or generally readable locations; and they shouldn’t be transmitted in the clear.
Network-based IDSs are usually able to detect the initiation of an attack or the ongoing attempts to perpetrate an attack (including denial of service, or DoS).
Not all instances of DoS are the result of a malicious attack. Errors in coding OSs, services, and applications have resulted in DoS conditions. Some examples of this include a process failing to release control of the CPU or a service consuming system resources out of proportion to the service requests it is handling. Social engineering and sniffing are typically not considered DoS attacks.
Network hardware devices, including routers, function at layer 3, the Network layer.
Dynamic packet-filtering firewalls enable the real-time modification of the filtering rules
based on traffic content.
A VPN link can be established over any other network communication connection. This could be a typical LAN cable connection, a wireless LAN connection, a remote access dial-up connection, a WAN link, or even an internet connection used by a client for access to the office LAN.
A Trojan horse is a form of malware that uses social engineering tactics to trick a victim into installing it—the trick is to make the victim believe that the only thing they have downloaded or obtained is the host file, when in fact it has a malicious hidden payload.
The components of the CIA Triad are confidentiality, availability, and integrity.
Privacy is not necessary to provide accountability.
Group user accounts allow for multiple people to log in under a single user account. This allows collusion because it prevents individual accountability.
The data owner must first assign a security label to a resource before the data custodian can secure the resource appropriately.
The Managed phase of the SW-CMM involves the use of quantitative development metrics. The Software Engineering Institute (SEI) defines the key process areas for this level as Quantitative Process Management and Software Quality Management.
Layers 1 and 2 contain device drivers but are not normally implemented in practice. Layer 0 always contains the security kernel. Layer 3 contains user applications. Layer 4 does not exist.
The SYN packet is first sent from the initiating host to the destination host. The destination host then responds with a SYN/ACK packet. The initiating host sends an ACK packet, and the connection is then established.
Parameter checking is used to prevent the possibility of buffer overflow attacks.
The ~ OR symbol represents the OR function, which is true when one or both of the
input bits are true.
Transposition ciphers use an encryption algorithm to rearrange the letters of the plain- text message to form a cipher text message.
The MD5 algorithm produces a 128-bit message digest for any input.
Iterative is not one of the composition theories related to security models. Cascading, feedback, and hookup are the three composition theories.
The collection of components in the TCB that work together to implement reference monitor functions is called the security kernel.
The more complex a system, the less assurance it provides. More complexity means more areas for vulnerabilities to exist and more areas that must be secured against threats. More vulnerabilities and more threats mean that the subsequent security provided by the system is less trustworthy.
Ring 0 has direct access to the most resources; thus user mode is not an appropriate label because user mode requires restrictions to limit access to resources.
Examples of detective controls are audit trails, logs, CCTV, intrusion detection systems, antivirus software, penetration testing, password crackers, performance monitoring, and CRCs.