Sybex Cissp 2024 Flashcards
(1098 cards)
What is the IEEE standard for WiMax?
802.16
What is InfiniBand over Ethernet (IBOE)?
InfiniBand over Ethernet (IBOE) refers to the encapsulation of InfiniBand traffic within Ethernet frames, allowing InfiniBand protocols to run over Ethernet networks. InfiniBand is a high‐performance and low‐latency interconnect technology commonly used in high‐performance computing (HPC) environments. IBOE provides a way to integrate InfiniBand technology into existing Ethernet infrastructures.
What is the range of valid values of keys for an algorithm called?
Key space
In which ring (layer) of the protection ring scheme do user applications reside?
Ring 3
What are covert channels?
A covert channel is a method that is used to pass information over a path that is not normally used for communication. Using a covert channel provides a means to violate, bypass, or circumvent a security policy undetected. Basic types are timing and storage.
What is a type of bar chart that shows the interrelationships over time between projects and schedules?
Gantt chart
Describe broadcast, multicast, and unicast communications.
A broadcast supports communications to all possible recipients. A multicast supports communications to multiple specific recipients. A unicast supports only a single communication to one recipient.
Name at least seven security management concepts and principles.
CIA Triad, confidentiality, integrity, availability, privacy, identification, authentication, authorization, auditing, accountability, and nonrepudiation
In which phase of the Software Capability Maturity Model do you often find hardworking people charging ahead in a disorganized fashion?
Initial
What is the typical process for a new employee to establish their identity?
New employees establish their identity with official documentation such as a passport, driver’s license, or birth certificate. HR personnel then begin the registration process, which includes creating an account for new employees. When biometric authentication is used, the registration process also collects biometric data. Identity proofing includes knowledge‐based authentication and cognitive passwords. These ask users a series of questions that only the user would know.
What are three remote access authentication mechanisms or AAA services?
RADIUS, DIAMETER, and TACACS+
What are due care and due diligence?
Due diligence is establishing a plan, policy, and process to protect the interests of an organization. Due care is practicing the individual activities that maintain the due diligence effort. Due diligence is knowing what should be done and planning for it; due care is doing the right action at the right time.
What is IDaaS?
Identity as a service, or identity and access as a service (IDaaS), is a third‐party service that provides identity and access management. IDaaS effectively provides SSO for the cloud and is especially useful when internal clients access cloud‐based software‐as‐a‐service (SaaS) applications.
What is condition monitoring?
Condition monitoring is monitoring and assessing the operational parameters, performance, and health of machinery, equipment, or systems in real time or periodically. The primary goal of condition monitoring is to identify any deviations from normal operating conditions that could indicate potential faults, defects, or deterioration. This proactive approach helps predict and prevent equipment failures, minimize downtime, and optimize maintenance strategies.
What is the process of authentication?
Authentication is the process of verifying or testing that a claimed identity is valid. Authentication requires information (i.e., authentication factors) from the subject that must exactly correspond to the identity indicated.
What is a static system?
A static system or static environment is a set of conditions, events, and surroundings that don’t change. In theory, once understood, a static environment doesn’t offer new or surprising elements. A static IT environment is any system that is intended to remain unchanged by users and administrators. The goal is to prevent or at least reduce the possibility of a user implementing change that could result in reduced security or functional operation.
When a penetration test team is privy only to what it itself can learn about the target organizations for the test, how might this team be described?
Zero‐knowledge team (performs black‐box testing or unknown environment testing)
What is DNSSEC?
DNSSEC (Domain Name System Security Extensions) is a security improvement to the existing DNS infrastructure. The primary function of DNSSEC is to provide reliable authentication between devices during DNS operations. DNSSEC has been implemented across a significant portion of the DNS system. Each DNS server is issued a digital certificate, which is then used to perform mutual certificate authentication.
What are the two requirements for acceptance of a trademark application?
The trademark must not be confusingly similar to another trademark, and it must not be descriptive.
What term describes a mathematical function that easily produces output values for each possible combination of inputs but makes it impossible to retrieve the input values?
One‐way function
What are the parameters of the HITECH data breach notification requirements?
Under the HITECH Breach Notification Rule, HIPAA‐covered entities that experience a data breach must notify affected individuals of the breach and must also notify both the Secretary of Health and Human Services and the media when the breach affects more than 500 individuals.
In what two ways can storage devices be accessed?
Randomly and sequentially
What form of access control can combine levels of security domains with compartments of additional control and isolation?
MAC (specifically, a hybrid MAC environment)
Define the various types of software license agreements.
Perpetual licenses, subscription licenses, open source licenses, freeware, enterprise license agreements (ELAs), end‐user license agreements (EULAs), concurrent use licenses, named user licenses, and cloud services license agreements.