CISSP Flash Cards
(689 cards)
- What are some examples of detective access controls?
Security guards, supervising users, incident investigations, and intrusion detection systems
- What are some examples of physical access controls?
Guards, fences, motion detectors, locked doors, sealed windows, lights, backups, cable protection, laptop locks, swipe cards, dogs, CCTV, mantraps, and alarms
- What are the three commonly recognized authentication factors?
Something you know, something you have, and something you are
- What is a cognitive password?
A series of questions about facts or predefined responses that only the subject should know (for example, what is your birth date? What is your mother’s maiden name?)
- Name at least eight biometric factors.
Fingerprints, face scans, iris scans, retina scans palm topography, palm geography, heart/pulse pattern, voice patter, signature dynamics, keystroke patterns
- What are the issues related to user acceptance of biometric enrollment and throughput rate?
Enrollment times longer than 2 minutes are unacceptable; subjects will typically accept a throughput rate of about 6 seconds or faster.
- What access control technique employs security labels?
Mandatory access controls. Subjects are labeled as to their level of clearance. Objects are labeled as to their level of classification or sensitivity.
- The Bell-LaPadula, Biba, and Clark-Wilson access control models were all designed to protect a single aspect of security. Name the corresponding aspect for each model.
Bell-Lapadula: Protects confidentiality
Biba and Clark-Wilson: protect integrity
Name the three types of subjects and their roles in a security environment.
The user accesses objects on a system to perform a work task; the owner is liable for protection of data; the data custodian is assigned to classify and protect data.
- Explain why the separation of duties and responsibilities is a common security practice.
It prevents any single subject from being able to circumvent or disable security mechanisms.
- What is the principle of least privilege?
Subjects should be granted only the amount of access to objects that is required to accomplish their assigned work tasks.
- Name the four key principles upon which access control relies.
Identification, authentication, authorization, accountability
- How are domains related to decentralized access control?
A domain is a realm of trust that shares a common security policy. This is a form of decentralized access control.
- Why is monitoring an important part of a security policy?
Monitoring is used to watch for security policy violations and to detect unauthorized or abnormal activities.
- What are the functions of an intrusion detection system (IDS)?
An IDS automates the inspection of audit logs and real-time system events, detects intrusion attempts, and watched for violations of confidentiality, integrity, and availability.
- What are the pros and cons of a host-based IDS?
It can pinpoint resources compromised by a malicious user. It can’t detect network-only attacks or attacks on other systems, has difficulty detecting DoS attacks, and can be detected by intruders.
- What are the pros and cons of a network-based IDS?
It can monitor a large network and can be hardened against attack. It may be unable to handle large data flows, requires a central view of traffic, and can’t pinpoint compromised resources.
- What are the differences between knowledge-based and behavior-based detection methods used by IDS?
Knowledge-based uses a signature database and tries to match monitored events to that database. Behavior-based learns about the normal activities on your system through watching and learning.
- What is a honeynet, and what is it used for?
Honeynets are fake networks used to lure intruders in order to create sufficient audit trails for tracking them down and prosecuting. Honeynets contain no real or sensitive data.
- How does penetration testing improve your system’s security?
Penetration testing is a good way to accurately judge the security mechanisms deployed by an organization.
- What is a denial-of-service attack?
An attack that prevents the system from receiving, processing, or responding to legitimate traffic or requests for resources and objects.
- What is a spoofing attack?
The attacker pretends to be someone or something other than whom or what they are. They can spoof identities, IP addresses email addresses, and phone numbers. They often replace the valid source and/or destination IP address and node numbers with false ones.
- What are countermeasures to spoofing attacks?
Countermeasures to spoofing attacks include patching the OS and software, enabling source/destination verification on routers, and employing an IDS to detect and block attacks.
- What is a man-in-the-middle attack?
An attack in which a malicious user is positioned between the two endpoints of a communication’s link