Random CISSP Flashcards

(38 cards)

1
Q

Sniffing attack

A

A sniffing attack uses a sniffer (also called a packet analyzer or protocol analyzer) to capture data and can be used to read passwords sent across a network in cleartext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A side-channel attack

A

is a passive, noninvasive attack used against smart cards. Methods include power monitoring, timing, and fault analysis attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

role-based access control

A

A role-based access control policy grants specific privileges based on roles, and roles are frequently job based or task based.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Discretionary access controls

A

Discretionary access controls allow owners of information to control privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

mandatory access controls

A

mandatory access controls use labels to control privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Clipping levels

A

Clipping is a form of nonstatistical sampling that reduces the amount of logged data based on a clipping-level threshold.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Log analysis reviews

A

Log analysis reviews log information looking for trends, patterns, and abnormal or unauthorized events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Audit trails are considered to be what type of security control

A

Passive detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Audit trails

A

Audit trails are a passive form of detective security control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Synchronous token

A

A synchronous token generates one-time passwords and displays them in an LCD, and this password is synchronized with an authentication server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

asynchronous token

A

An asynchronous token uses a challenge-response process to generate the token.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Type 1 biometric error

A

A Type 1 error occurs when a valid subject is not authenticated and is also known as a false negative authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Type 2 biometric error

A

A Type 2 error occurs when an invalid subject is authenticated. This is also known as a false positive authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

crossover error rate

A

The crossover error rate (also called equal error rate) compares the rate of Type 1 errors to Type 2 errors and provides a measurement of the accuracy of the biometric system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the best choice to support federated identity management systems?

A

Service Provisioning Markup Language (SPML)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Service Provisioning Markup Language (SPML)

A

SPML is an XML-based framework used to exchange user information for single sign on (SSO) between organizations within a federated identity management system.

17
Q

Access control matrix

A

An access control matrix includes multiple subjects and objects and lists subjects’ access to various objects.

18
Q

federation

A

refers to a group of companies that share a federated identity management system for single sign-on.

19
Q

User entitlement audit

A

A user entitlement audit can detect when users have more privileges than necessary.

20
Q

A Type 2 authentication factor

A

is “something you have,” including a smart card, token device, or memory card.

21
Q

Type 3 authentication

A

is “something you are,” and some behavioral biometrics include “something you do.”

22
Q

Type 1 authentication

A

“something you know.”

23
Q

All of the following are needed for system accountability except for one. Which one is not needed?
A) Identification
B) Authentication
C) Auditing
D) Authorization

A

Authorization

24
Q

What type of access controls rely upon the use of labels?

25
A VPN can be established over what types of connections?
A) Wireless LAN connection B) Remote access dial-up connection C) WAN link
26
Which of the following IP addresses is not a private IP address as defined by RFC 1918? A) 10.0.0.18 B) 169.254.1.119 C) 172.31.8.204 D) 192.168.6.43
The 169.254.x.x subnet is in the APIPA range, which is not part of RFC 1918.
27
network segmentation
security practice of dividing a computer network into smaller, isolated segments to enhance security, manage traffic, and improve performance.
28
4 types of network segmentation
Physical Logical Role-Based Policy-Based
29
Which of the following is not an example of network segmentation? A) Intranet B) DMZ C) Extranet D) VPN
VPN
30
permanent virtual circuit (PVC)
A permanent virtual circuit (PVC) can be described as a logical circuit that always exists and is waiting for the customer to send data.
31
Control Transparency
characteristic of a service, security control, or access mechanism it is unseen by users.
32
addresses in RFC 1918
0.0.0.0-10.255.255.255, 172.16.0.0-172.31.255.255, and 192.168.0.0-192.168.255.255.
33
Frame Relay
Frame Relay is a layer 2 connection mechanism that uses packet-switching technology to establish virtual circuits between the communication endpoints.
34
Which of the following is not defined in RFC 1918 as one of the private IP address ranges that are not routed on the Internet? A) 169.172.0.0-169.191.255.255 B) 192.168.0.0-192.168.255.255 C) 10.0.0.0-10.255.255.255 D) 172.16.0.0-172.31.255.255
169.172.0.0-169.191.255.255 is a public IP address range.
35
Dynamic packet filtering
Dynamic packet-filtering firewalls enable the real-time modification of the filtering rules based on traffic content.
36
Stateful inspection firewalls
Stateful inspection firewalls are able to grant a broader range of access for authorized users and activities and actively watch for and block unauthorized users and activities.
37
IPSec
standards-based mechanism for providing encryption for point-to-point TCP/IP traffic.
38