CISSP Trouble Areas Flashcards
(180 cards)
What protocol manages security associations used by IPSec?
ISAKMP
What is a Smurf attack?
Large number of ICMP packets are broadcasted to a network
A tunnel is normally used to connect what types of systems?
Hosts and networks
For a process, can it operate as a subject, object, both, or neither?
Both subject or object
How many rounds of encryption are required for Rijandael for a key of 192 bits?
11
What are some VoIP security issues?
Caller ID falsification, vishing, SPIT
Personal Area Network (PAN) is associated with what wireless standard?
802.15 Bluetooth
What security protocol automatically performs reauthentication of the client throughout a session to detect session hijacking?
CHAP
For port addresses, what are considered the “well-know” ports?
0-1,023
What is a teardrop attack?
Attacker exploits a bug in the OS related to re-sequencing packets. Attacker sends numerous specially crafted packets to the system, which causes the system to freeze or crash.
Once a system is compromised, what type of access control is used to restore the system to a previous known good state?
Corrective access control
What symmetric encryption protocol does WPA2 use?
AES
What symmetric encryption protocol does WPA use?
TKIP
What symmetric encryption protocol does WEP use?
RC4
What standard does all public email comply with?
X.400
What approach uses math algorithms to analyze data and develop models that may be used to predict future activities?
Data mining
What is the difference between anti-virus removal and cleaning?
Removal only deletes the malicious software, whereas cleaning will try to restored changes made by the malicious software
What control is used to guide the security implementations of an organization?
Directive control
What is the cardinality of a table?
How many entries (rows) in the table
According to standard, what is the largest ICMP packet allowed?
65,536
What network device can be described as a protocol translator?
Gateway
On what port does DHCP operate?
Port 68
What database principle ensures that data is written in an all-or-nothing manner?
Atomicity
What access control is used to repair or restore capability, functionality, or resources following a violation of security policy?
Recovery access control