Stuff from Exams I don't know #2 Flashcards

1
Q

Trusted Platform Module - Remote Attestation

A

TPM uses Remote Attestation to create a hash summary of they system configuration to verify that changes have not been made.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Trusted Platform Module - Binding and Sealing

A

Binding and Sealing are techniques used to encrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Is a centrallized log server sometimes called a Bastion Host?

A

Yes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Pre-action sprinkler system

A

Best option for a computer facility because it provides the opportunity to prevent the release of water.

A combination dry pipe/wet pipe system. The system exists as a dry pipe until the initial stages of a fire (smoke, heat, and so on) are detected and then the pipes are filled with water. The water is released only after the sprinkler head activation triggers are melted by sufficient heat. If the fire is quenched before the sprinklers are triggered, the pipes can be manually emptied and reset. This also allows for manual intervention to stop the release of water before sprinkler triggering occurs. Preaction systems are the most appropriate water-based system for environments that include both computers and humans in the same locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Two-person control

A

An example of M of N control.

In this case 2 people are required to both approve and take action for something to happen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Confinement (software development)

A

When a system restricts the access of a particular process to limit its ability to affect other processes running on the same system.

Example: Sandboxing, running in a VM, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

OpenID vs Oauth

A

OAuth provides access/authorization, while OpenID provides authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Real User Monitoring

A

AKA RUM: passive monitoring technique that records user interaction with an application or system to ensure performance and proper application behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Synthetic Monitoring

A

Uses simulated behavior against a system to monitor performance/behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Passive Monitoring

A

Monitors live network traffic in a passive way, i.e. mirrored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Military and intelligence attack

A

Goal is to obtain secret and restricted information from military or law enforcement systems. Targets the classified data that resides on systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ISO 27001 vs 27002

A

27001 is the standard for international information security management, and ISO 27002 is a supporting standard that guides how the information security controls can be implemented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which key is used to enforce referential integrity between database tables?

A

Foreign Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Split-response attack

A

Can be used to force a client to inadvertently download content that wasn’t intended.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DOM XSS Attack

A

DOM-based cross-site scripting is a type of cross-site scripting (XSS) where the attack takes advantage of the Document Object Model (DOM).

The DOM is an internal data structure that stores all of the objects and properties of a web page. For example, every tag used in HTML code represents a DOM object. Additionally, the DOM of a web page contains information about such properties as the page URL and meta information. Developers may refer to these objects and properties using JavaScript and change them dynamically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is an “Alternative system” a term?

A

Yes - in a BIA this refers to alternate/redundant resources, i.e. backup connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What type of access control does a NAC usually represent?

A

Risk-based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Pseudonymization vs Tokenization vs anonymization

A

Pseudonymization is simply replacing data with artificial identifiers.

Tokenization specifically uses a token/randomized string of characters as an identifier.

Anonymization - removes all relevant personal data so that it is theoretically impossible to identify the subect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Structured Walk-through vs Simulation test (DRP testing)

A

The simulation test is similar to the structured walk-through. Here the DRP team members are given a test scenario and asked to come up with an appropriate response. These response methods are then tested for efficiency. This may involve the scheduling around non-critical business activities and the use of some operational personnel.

The structured walk-through involves role-play by the DRP team of a disaster scenario already documented in the DR Policy. The DRP team members then review copies of the disaster recovery plan and discuss the appropriate responses or any problematic areas with that particular type of disaster.

20
Q

SOAR - runbook or playbook?

A

A runbook is how to complete a task, like resetting a user’s password. A playbook on the other hand, would contain multiple runbooks and is geared towards a bigger goal or scenario.

21
Q

Is extranet a term?

A

Yes, Extranet: This shares similarities with the INTRAnet — it’s a private network that uses Internet protocols and can be used to publish corporate web sites. The main difference is users outside of the organization have access to the system, such as business associates.

22
Q

audit trails

A

“Audit trails maintain a record of system activity both by system and
application processes and by user activity of systems and applications. In
conjunction with appropriate tools and procedures, audit trails can assist
in detecting security violations, performance problems, and flaws in
applications. This bulletin focuses on audit trails as a technical control
and discusses the benefits and objectives of audit trails, the types of
audit trails, and some common implementation issues.”

23
Q

UEM

A

Unified Endpoint Management

24
Q

Which OSI layers are associated with Data STreams

A

App, Presentation, Session.

These layers have streams.

Layers 2, 3, 4 have Frames, packets, segments, or datagrams

25
Q

MTD

A

Maximum tolerable downtime

26
Q

Is White box a term in software testing?

A

Yes. Refers to all code being available for analysis

27
Q

Is terrorism considered a disaster?

A

Yes, even though it’s rarely accounted for in policy

28
Q

Grey box software test

A

In a gray box test, the tester evaluates the software from a user perspective but has access to the source code as the test is conducted.

29
Q

ACID

A

Atomicity
Consistent
Isolation
Durable

30
Q

Does containerization reduce overhead?

A

Generally yes

31
Q

Edge Computing vs Fog Computing

A

Network design philosophy where the compute power and data are located as closely as possible. Often implemented with IIoT (industrial internet of things).

Other example could be EDR tooling. Peforms centralized computing of data collected by disparate sensors

32
Q

Business organization analysis

A

Step of building a BCP, The purpose is to identify all departments and individuals who have a stake in the process. i.e. they are stakeholders.

33
Q

SDLC (software)

A

Software Development Life Cycle. i.e. Agile, Waterfall, Spiral

34
Q

SDLC (Systems)

A

Systems Development Lifecycle

35
Q

What fire suppression system is the highest risk in a data center?

A

Wet pipe

36
Q

ISO 27001 vs 27002

A

ISO 27001 and ISO 27002 are related standards within the ISO/IEC 27000 series, but they serve different purposes. ISO 27001 specifies the requirements for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS), providing a framework for organizations to manage their information security risks. On the other hand, ISO 27002 offers guidelines and best practices for implementing specific security controls within the context of an ISMS, assisting organizations in selecting and implementing appropriate measures to address their information security risks as defined by ISO 27001.

37
Q

SAMM (Software)

A

SAMM is not specific to CISSP but is a framework developed by the Open Web Application Security Project (OWASP) to help organizations formulate and implement strategies for software security. It provides guidance on building and improving an organization’s software security posture by assessing and enhancing their software development and acquisition practices.

38
Q

Asset Tiers?

A

Tier zero is reserved for essential assets. These are assets that handle sensitive data and are always required to be available. An example would be a router or file server that an entire organization relies on.

A tier one asset is important, but not equally for every department—for some departments, it may be more important than for others. File shares or local network devices used by a group of employees would be an example of this. Workstations and phones would meet the criteria for a tier two classification. Tier two classifications generally describe non-critical assets that could impact an individual.

39
Q

Trusted Recovery Process

A

In CISSP, the Trusted Recovery Process refers to the establishment of a secure and verifiable method for restoring a system to a trusted state after a security incident. It focuses on maintaining the confidentiality, integrity, and availability of information during the recovery activities. This process involves validating the integrity of components, verifying software authenticity, and ensuring the absence of malicious alterations in the recovered state.

40
Q

Request Control, change control, release control

A

Request control involves the evaluation and management of requested changes or additions to a system or project. Change control is a broader process that encompasses the systematic handling of requested and unplanned changes, ensuring proper documentation, review, approval, and implementation. Release control extends the scope further by managing the deployment and distribution of changes, ensuring a coordinated and controlled release of new features, enhancements, or fixes into the production environment.

41
Q

Best location for data center on multi-level building

A

Middle floor.

42
Q

Most common risk associated with Cellular Hotspots

A

MITM/Rogue AP

43
Q

Distributed Control System

A

A distributed control system (DCS) is a network of PLCs, sensors, and supervisory computers. Generally, a DCS is process-specific and does not span large geographical areas, whereas a SCADA system controls multiple processes and can span large geographical areas.

44
Q

Real user monitoring (AKA Passive Monitoring)

A

Real user monitoring (RUM) analyzes the traffic or status of transactions for real user traffic. This is also known as passive monitoring.

45
Q

Reasonableness check

A

A reasonableness check ensures that data outputted from software falls within the specified boundaries. For example, ensuring that a person’s height is not negative or more than 10 feet.

46
Q

SAMM

A

Maintained by OWASP

Provides a framework for integrating security activities into the development and maintenance process.

Five Principals: Governance, design, implementation, verification, operations

47
Q

SAMM vs SW-CMM

A

SAMM’s main goal is to provide for a way to integrate security directly to the developmen tprocess.

SW-CMM’s goal is to provide a framework for assessing software maturity.