Random CISSP Flashcards

1
Q

Sniffing attack

A

A sniffing attack uses a sniffer (also called a packet analyzer or protocol analyzer) to capture data and can be used to read passwords sent across a network in cleartext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A side-channel attack

A

is a passive, noninvasive attack used against smart cards. Methods include power monitoring, timing, and fault analysis attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

role-based access control

A

A role-based access control policy grants specific privileges based on roles, and roles are frequently job based or task based.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Discretionary access controls

A

Discretionary access controls allow owners of information to control privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

mandatory access controls

A

mandatory access controls use labels to control privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Clipping levels

A

Clipping is a form of nonstatistical sampling that reduces the amount of logged data based on a clipping-level threshold.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Log analysis reviews

A

Log analysis reviews log information looking for trends, patterns, and abnormal or unauthorized events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Audit trails are considered to be what type of security control

A

Passive detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Audit trails

A

Audit trails are a passive form of detective security control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Synchronous token

A

A synchronous token generates one-time passwords and displays them in an LCD, and this password is synchronized with an authentication server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

asynchronous token

A

An asynchronous token uses a challenge-response process to generate the token.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Type 1 biometric error

A

A Type 1 error occurs when a valid subject is not authenticated and is also known as a false negative authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Type 2 biometric error

A

A Type 2 error occurs when an invalid subject is authenticated. This is also known as a false positive authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

crossover error rate

A

The crossover error rate (also called equal error rate) compares the rate of Type 1 errors to Type 2 errors and provides a measurement of the accuracy of the biometric system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the best choice to support federated identity management systems?

A

Service Provisioning Markup Language (SPML)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Service Provisioning Markup Language (SPML)

A

SPML is an XML-based framework used to exchange user information for single sign on (SSO) between organizations within a federated identity management system.

17
Q

Access control matrix

A

An access control matrix includes multiple subjects and objects and lists subjects’ access to various objects.

18
Q

federation

A

refers to a group of companies that share a federated identity management system for single sign-on.

19
Q

User entitlement audit

A

A user entitlement audit can detect when users have more privileges than necessary.

20
Q

A Type 2 authentication factor

A

is “something you have,” including a smart card, token device, or memory card.

21
Q

Type 3 authentication

A

is “something you are,” and some behavioral biometrics include “something you do.”

22
Q

Type 1 authentication

A

“something you know.”

23
Q

All of the following are needed for system accountability except for one. Which one is not needed?
A) Identification
B) Authentication
C) Auditing
D) Authorization

A

Authorization

24
Q

What type of access controls rely upon the use of labels?

A

Mandatory

25
Q

A VPN can be established over what types of connections?

A

A) Wireless LAN connection
B) Remote access dial-up connection
C) WAN link

26
Q

Which of the following IP addresses is not a private IP address as defined by RFC 1918?
A) 10.0.0.18
B) 169.254.1.119
C) 172.31.8.204
D) 192.168.6.43

A

The 169.254.x.x subnet is in the APIPA range, which is not part of RFC 1918.

27
Q

network segmentation

A

security practice of dividing a computer network into smaller, isolated segments to enhance security, manage traffic, and improve performance.

28
Q

4 types of network segmentation

A

Physical
Logical
Role-Based
Policy-Based

29
Q

Which of the following is not an example of network segmentation?
A) Intranet
B) DMZ
C) Extranet
D) VPN

A

VPN

30
Q

permanent virtual circuit (PVC)

A

A permanent virtual circuit (PVC) can be described as a logical circuit that always exists and is waiting for the customer to send data.

31
Q

Control Transparency

A

characteristic of a service, security control, or access mechanism it is unseen by users.

32
Q

addresses in RFC 1918

A

0.0.0.0-10.255.255.255, 172.16.0.0-172.31.255.255, and 192.168.0.0-192.168.255.255.

33
Q

Frame Relay

A

Frame Relay is a layer 2 connection mechanism that uses packet-switching technology to establish virtual circuits between the communication endpoints.

34
Q

Which of the following is not defined in RFC 1918 as one of the private IP address ranges that are not routed on the Internet?
A) 169.172.0.0-169.191.255.255
B) 192.168.0.0-192.168.255.255
C) 10.0.0.0-10.255.255.255
D) 172.16.0.0-172.31.255.255

A

169.172.0.0-169.191.255.255 is a public IP address range.

35
Q

Dynamic packet filtering

A

Dynamic packet-filtering firewalls enable the real-time modification of the filtering rules based on traffic content.

36
Q

Stateful inspection firewalls

A

Stateful inspection firewalls are able to grant a broader range of access for authorized users and activities and actively watch for and block unauthorized users and activities.

37
Q

IPSec

A

standards-based mechanism for providing encryption for point-to-point TCP/IP traffic.

38
Q
A