Shared Flashcard Set

Details

CISSP Part 2
Flash cards made from the second half of the Shon Harris AIO 6th edition.
203
Other
Professional
09/30/2013

Additional Other Flashcards

 


 

Cards

Term
Define SIP
Definition
Session Initiation Protocol
Term
Describe SIP
Definition
It is a signaling protocol used for controlling communication as in voice and video calls over IP-based networks.
Term
Describe Vishing
Definition
Social engineering activity over the telephone system.
Term
Describe H.323
Definition
It is a standard that addresses call signaling and control multimedia transport and control, and bandwidth control for point to point and multipoint conferences.
Term
Define RTP
Definition
Real Time Transport Protocol
Term
Describe RTP
Definition
It is used to transmit audio and video over IP-based networks.
Term
What is War Dialing?
Definition
A program is used to automatically scan a list of telephone numbers to search for computers for the purpose of exploitation and hacking.
Term
Define VPN
Definition
Virtual Private Network
Term
What is a VPN?
Definition
A secure private connection through an untrusted network.
Term
Define PPTP
Definition
Point to Point Tunneling Protocol
Term
Define L2TP
Definition
Layer 2 Tunneling Protocol
Term
Define HAIPE
Definition
High Assurance Internet Protocol Encryptor
Term
What is HAIPE?
Definition
It is a type I encryption device that is based on IPSec with additional restrictions, enchancements, and capabilities.
Term
Define SSL
Definition
Secure Socket Layer
Term
What is IPSec transport adjacency?
Definition
It is when a VPN uses more than one security protocol.
Term
What is iterated tunneling?
Definition
It occurs when an IPSec tunnel is tunneled through IPSec tunnel.
Term
Describe a SSL Portal VPN
Definition
An individual uses a single SSL connection to a web site to securely access multiple network services.
Term
Define PAP
Definition
Password Authentication Protocol
Term
Describe PAP
Definition
It is used by remote users to authenticate over PPP conections.
Term
What is one of the most unsecure authentication method?
Definition
PAP
Term
How are PAP credentials sent?
Definition
They are sent cleartext (no encryption)
Term
Define CHAP
Definition
Challenge Handshake Authentication Protocol
Term
Describe CHAP
Definition

It addresses vulnerabilties found in PAP.

 

It uses a challenge/response mechanism to authenticate users.

 

 

Term
Define EAP
Definition
Extensible Authentication Protocol
Term
How are signals measured?
Definition
They are measured by frequency and amplitudes.
Term
Describe 802.11b
Definition
It  has a tranfer rate of 11Mbps and is 2.4Ghz.
Term
Describe 802.11a
Definition
It uses OFDM and works in the 5Ghz band.
Term
Describe 802.11e
Definition
Provides QoS and supports multimedia traffic in wireless transmissions.
Term
Describe 802.11g
Definition
54Mbps 2.4Ghz
Term
Define FHSS
Definition
Frequency hopping spread spectrum
Term
Describe FHSS
Definition
It takes the total amount of bandwidth and splits it into smaller subchannels.
Term
Define DSSS
Definition
Direct Sequence Spread Spectrum
Term
Describe DSSS
Definition
It applies  sub-bits to a message and uses all of the available frequencies at the same time.
Term
Define OFDM
Definition
Orthogonal Frequency-Division Multiplexing
Term
Describe OFDM
Definition
It is a digital multicarrier modulation scheme that compacts multiple modulated carriers thightly together reducing required bandwidth.
Term
Define War Driving
Definition
It occus when one or more people walk or drive around with a wireless device equipped with software to identify AP's and break into them.
Term
What is a footprint?
Definition
It is the area covered by the satellite.
Term
What is the sender of information called?
Definition
The ground station.
Term
What are the two main microwave transmission technologies?
Definition

Satellite

 

Terrestrial

Term
What transmission is ground to orbiter to ground
Definition
Satellite
Term
What transmission is ground to ground?
Definition
Terrestrial
Term
What is Bluesnarfing
Definition
It is unathorized access from a wireless device through a Bluetooth connection.
Term
Define FDMA
Definition
Frequency Division Multiple Access
Term
Describe FDMA
Definition

It was the earliest multiple access technology.

 

The available frequency is divided into sub-bands and one channel is assigned to each subscriber.

Term
Define CDMA
Definition
Code Division Multiple Access
Term
Describe cell phone cloning
Definition
A regular cellphone is stolen and then reprogrammed with someone elses credentials.
Term
Define SPIM
Definition
Instant Messaging Spam
Term
How many layers are in the OSI model?
Definition
7
Term
What layer do routers work on?
Definition
3
Term
Describe layer 5
Definition
It is the session layer and it sets up, maintains, and breaks down the dialog between two applications.
Term
Describe layer 2
Definition
The data link layer prepares data for the network medium by framing it.
Term
Describe layer 1
Definition
It provides physical connections for transmission and performs the electrical encoding of data.
Term
What is a protocol?
Definition
it is a set of rules that dictates how computers communicate over networks.
Term
What are the two main protocols at the transport layer?
Definition

TCP

 

UDP

Term
Describe TCP
Definition
It is a connection oriented protocol that sends and recieves acknowledgments.
Term
Describe UDP
Definition
It is a connectionless protocol that does not recieve acknowledgements.
Term
Describe a proxy firewall
Definition
It is the middleman of communication. It does not allow anyone to connect directly to a protected host within the internal network.
Term
Describe an Application proxy firewall
Definition
It provides high security and has full application layer awareness. They can have poor performance, limited application support, and poor scalability.
Term
What packet switched WAN technologies use virtual circuits?
Definition

X.25

 

Frame Relay

Term
How does TKIP provide more proection for WLAN environments?
Definition
It adds more keying material.
Term
Why are swithced infrastructures safer than routed networks?
Definition
It is more idfficult to sniff traffic since computers have virtual provate connections.
Term
What kind of proxy can not make access decisions based on protocol commands?
Definition
Circuit proxies.
Term
What takes place at the data link layer?
Definition
End to end communication.
Term
What takes place at the session layer?
Definition
Dialog control.
Term
What is the four step DHCP lease process?
Definition

Discover

Offer

Request

Acknowledge

Term
What is used to shield networks from unauthenticated DHP clients?
Definition
DHCP snooping
Term
What is cryptography?
Definition
A method of storing and transmitting data in a form that only those it is intended for can read and process.
Term
What is Cryptology?
Definition
The study of cryptanalysis and cryptography.
Term
What is Cryptanalysis?
Definition
It is the science of studying and breaking the secrecy of the encryption process.
Term
What is encryption?
Definition
Transforming readable data into a form that appears to be random and unreadable.
Term
What is a cryptosystem?
Definition
A system or product that provides encryption and decryption.
Term
What is an algorithm?
Definition
It is a set of rules that dictates how enciphering and deciphering takes place.
Term
What comprises a cryptosystem?
Definition

Software

 

Protocols

 

Alogrithms

 

Keys

Term
What services do cryptosystems provide?
Definition

Confidentiality

 

Integrity

 

Authentication

 

Authorization

 

Nonrepudiation

 

Term
What is a work factor?
Definition
It is an estimate of the effort and resources it would take an attacker to penetrate a cryptosystem.
Term
What is a Cipher?
Definition
It is another name for algorithm.
Term
What is a key?
Definition
It is a sequence of bits used as instructions that govern the acts of cryptograhic functions within an algorithm.
Term
What is a keyspace?
Definition
It is a range of possible values to construct keys.
Term
What is scytale cipher?
Definition
It is an ancient encryption tool that is used  type of paper and rod used by Greek military factions.
Term
What is Kerckhoff's principal?
Definition
It is a concept that an algorithm should be known and only the keys should be kept secret.
Term
What is a number generator used for?
Definition
It is used to create a stream of random values and must be seeded by an initial value.
Term
What is steganography?
Definition
It is a method of hiding data in another media type so the existenance of the data is concealed.
Term
What is a one time pad?
Definition
it is an encryption method that is impossible to crack if carried out properly.
Term
What is a running key cipher?
Definition
It is a substituition cipher that creates keystream values, commonly from agreed-upon text passages to be used for encryption purposes.
Term
What is transposition?
Definition
It is an encryption method that shifts values.
Term
What is a Key Derivation Functions
Definition
It is the generation of secret keys (subkeys) from an initial value.(master key)
Term
What are the strengths of symmetric algorithms?
Definition

It is faster than asymmetric alogrithms.

It is hard to break if using a large key size.

Term
What are the weakness of symmetric algorithms?
Definition

It requires a secure mechanism to deliver keys properly

 

Each pair of users needs a unique key making key management tedious.

 

It provides confidentiality but not authenticity or nonrepudiation.

Term
Define DRP
Definition
Disaster Recovery Plan
Term
Define BCP
Definition
Business Continuity Plan
Term
Define BCM
Definition
Business Continuity Management
Term
What is a BCP Policy?
Definition
It supplies the framework for and governance of designing and building the BCP effort.
Term
Define BIA
Definition
Business Impact Analysis
Term
What is a BIA?
Definition
It is a functional analysis in which a team collects data through interviews and documentary sources.
Term
Define MTD
Definition
Maximum Tolerable Downtime
Term
Define MTPD
Definition
Maximum period time of disruption
Term
Define RTO
Definition
Recovery Time Objective
Term
Define WRT
Definition
Work Recovery Time
Term
Describe RTO
Definition
It is the earliest time period and service level within which a business process must be restored after a disaster to aviod unacceptable consequences.
Term
Describe WRT
Definition
It is the remainder of the overall MTD value.
Term
Define RPO
Definition
Recovery Point Objective
Term
Describe RPO
Definition
It is the acceptable amount of data loss measured in time.
Term
What is a non-disaster?
Definition
It is a disruption in service due to a device malfunction or failure.
Term
What is a disaster?
Definition
It is an event thar causes the entire facility to be unusable for an entire day or more.
Term
What is a catastrophe?
Definition
It is a major disruption that destorys the facility altogether.
Term
Define MTBF
Definition
Mean Time Between Failure
Term
Define MTTR
Definition
Mean Time to Repair
Term
Describe the MTBF
Definition
It is the estimated lifetime of a piece of equipment.
Term
Describe MTTR
Definition
It is the estimate of how long it will take to fix a piece of equipment and get it back in production.
Term
Describe a Hot Site
Definition
It is a facility that is leased or rented and is fully configured and ready to operate within a few hours.
Term
Describe a Warm Site
Definition

It is a leased facility that is partially configured with some equipment.

 

It is the most widely used model.

 

 

Term
Describe a Cold Site
Definition

It is a leased or rented facility that supplies the basic environment, but none of the equipment or additional services.

 

It may take weeks to get the site to get activated.

Term
What is a reciprocal agreement?
Definition
It is an agreement with another company to allow a company to establish an off site facility.
Term
Describe a rolling hot site
Definition
It is a mobile hot site where a large truck is turned into a working area.
Term
Describe remote journalism
Definition
It is another method of transmiitng data off-site.
Term
Define HA
Definition
High Availability
Term
Define HA
Definition
It is a combination of technology and processes that work together to ensure some specific thing is always up and running.
Term
What is BS 25999
Definition
The standard for Business Continuity Management (BCM)
Term
What is a checklist test?
Definition
Copies of the plan are are handed out to each functional area for examiniation to ensure the plan properly deals with the areas needs and vulnerabilities.
Term
What is a structured walk-through test?
Definition
The representatives from each functional or department get together and walkthrough the plan from begining to end.
Term
What is a simulation test?
Definition
It is a a practice execution of the plan.
Term
What is a parallel test?
Definition
It is where some system are run at the alternate site during the test.
Term
What is a full interuption test?
Definition
It is a test where regular operations are stopped and processing is moved to the alternate site.
Term
What is a computer assisted crime?
Definition
It is where a computer was used as a tool to carry out a crime.
Term
What is a computer targeted crime?
Definition
It is an incident where a computer was the victim of an attack to harm it and its owners.
Term
What is a trade secret?
Definition
It is something that is proprietary to a company and important for its survival and profitability.
Term
Define NDA
Definition
Non Disclosure Agreement.
Term
What is a trademark?
Definition
It is used to protect a word associated with a company.
Term
What is freeware?
Definition
Software that is publicly available free of charge.
Term
What is Shareware?
Definition

It is used by vendors to market their software.

 

It is a free trial of software.

Term
Define SPA
Definition
Software Protection Agency
Term
Define FAST
Definition
Federation Against Software Theft
Term
Define PII
Definition
Personally Identifiable Information
Term
What is the Sarbanes-Oxley Act (SOX)
Definition
It provides requirements for how companies must track, manage, and report financial information.
Term
When was the Computer Fraud and Abuse Act written?
Definition
1986. It was amended in 1988, 1994, 1996, 2001, 2002, and 2008.
Term
What is the Computer Fraud and Abuse Act?
Definition

It is the law in regards to:

 

Knowingly accessing a computer without authorization in order to obtain national security data.

 

Intentionally accessing a computer without authorization

 

Intending to defraud or obtain anything of value from an IS.

Term
What is minimum capital requirements?
Definition
Measures the risk and spells out the calculation for determining the minimum capital required.
Term
Define FISMA
Definition
Federal Information Security Management Act of 2002
Term
What is FISMA?
Definition

It requires every federal agency to create an aagency wide security program to protect information systems.

 

Annual reviews must be conducted.

Term
What are the requirements of FISMA?
Definition

Inventory of information systems

 

Category information and information systems according to risk level

 

Security controls

 

Risk assesment

 

Systsem security plan

 

Certification and accrediation

 

Continous monitoring

Term
What is the Economic Espionage Act of 1996?
Definition

It provides the necesssary structure when dealing with espionage cases, and defines trade secrets to be technical, business, engineering, scientific, or financial.

 

Allowd FBI to begin investigating industiral and corporate espionage cases.

Term
Define REP
Definition
Reasonable Expectation of Privacy.
Term
What is proximate cause?
Definition

It is an act or omission that naturally and directly produces a consequence.

 

It refers ro causes that lead directly to a particular result.

 

Can be seen as negligence in a court of law.

Term
What are the stages of incident response?
Definition

Triage

 

Investigation

 

Containment

 

Analysis

 

Tracking

 

Recovery

Term
What is triage in the incident response process?
Definition
It is the inital sceening to dtermine if an event is an incident.
Term
Wha occurs during the Containment process in incident response processes?
Definition

Damage mitigation takes place.

 

The containment strategy is based on the category of attack.

 

 

Term
What occurs during the Tracking process in incident response processes?
Definition
During this stage it is determined whether the source of the incident was internal or external and how the offender gained access to the network.
Term
What occurs during the Recovery process in incident response processes?
Definition
Necessary fixes are implemented to ensure that type of incident can not occir again.
Term
What is computer forensics?
Definition
It is specialized techniques for the recovery, authentication, and analysis of electronic data for the purposes of a digitial criminal investigation.
Term
What are the different types of assesments an investigator can perform?
Definition

Network Analysis

Communication Analysis

Log Analysis

Path Tracing

 

Media Analysis

Disk imaging

MAC time analysis

Content Anaylsis

 

Software Analysis

Reverse engineering

Malicious code review

Exploit review

 

Hardware analysis

Dedicated appliance attack points

Firmware and dedicated memory inspections

Embeded operating systems analysis

Term
What are the steps of the forensic investigation process?
Definition

Identification

 

Preservation

 

Collection

 

Examination

 

Analysis

 

Presentation

 

Decision

Term
What is a chain of custody?
Definition
It is a history that shows how evidence was collected, analyzed, transported, and preserved in order to be presented in court.
Term
What is hearsay?
Definition
Second hand evidence
Term
What is computer-related documents considered?
Definition
Hearsay
Term
What is best evidence?
Definition

Primary evidence used in a trial because it provdes the most reliability.

 

 

Example would be an orignal signed contract.

Term
What is Secondary Evidence?
Definition

It is not viewed as reliable in proving innocence or guilt.

 

Examples are oral evidence, and copies of original documents.

Term
What is Direct Evidence?
Definition

It can prove a fact by itself and does not need supporting information.

 

Example is a witness to a crime.

Term
What is Conclusive Evidence?
Definition
It is irrefutable and connot be contradicted. It does not require corroboration.
Term
What is Corroborative Evidence?
Definition
It is supportive evidence to prove an idea or point.
Term
What is the opinion rule?
Definition
It dictates that a witness must testify to only the facts of the issue and not their opinion of the facts.
Term
What is hearsay evidence?
Definition
It pertains to oral or written evidence presented in court that is secondhand and has no firsthand proof of accuracy or reliability.
Term
What is a salami attack?
Definition
It is an attack in which the attacke commits several smal crimes with the hope that the overall larger crime will go unnoticed.
Term
What is data diddling
Definition
It is the alteration of existing data.
Term
What is password Sniffing?
Definition
It is sniffing network traffic with the hope of capturing passwords being sent between computers.
Term
What is CyberSquatting?
Definition
It takes place when someone purchases a domain name with the goal of hurting a company with a similar domain name or to carry out extortion.
Term
Define IAB
Definition
Internet Architecture Board.
Term
What is a mixed law system?
Definition
It uses two or more legal systems.
Term
What are logon banners used for?
Definition
They are used to inform users what could happen if they do not follow rules pertaining to using company resources.
Term
Define MOM
Definition
Motive Opportunity Means
Term
What are the stages of the System Development Life Cycle?
Definition

Initiation-Need for a new system is defined.

 

Acquisition/Development- System is created or purchased.

 

Implementation- New system is installed

 

Operation/Maintenance- System is used and cared for

 

Disposal- System is removed from production

Term
Define SLDC
Definition
System Development Life Cycle
Term
What are the requirements of SDLC?
Definition

Requirement gathering- Determine why software is being created, what it will do, and for who it will be created for.

 

Design- Deals with how the software will accomplish the goals identified

 

Development- Programming software code to meet specifications laid out in design phase.

 

Testing- Validation software to ensure goals are met.

 

Release- Deploying the software and ensuring it is properly configured.

Term
How many privacy impact ratings are there?
Definition
3
Term
What is the P1 privacy impact rating?
Definition

High Privacy Risk.

 

The product or service sotres or transmits Personally Identifiable Information (PII)

Term
What is the P2 Privacy Impact rating?
Definition

Moderate Privacy risk.

 

The sole behavior that affects privacy in the feature, product, or service is a one-time user initiated anonymous data transfer.

Term
What is the P3 Privacy Impact Rating?
Definition

Low Privacy Risk.

 

No behaviors exist within the product that affect privacy.

 

No anonymous or personal data is transferred.

Term
What is an attack surface?
Definition
It is what is available to be used by an attacker against the product itself.
Term
What is an attack surface analysis?
Definition
It is used to identify and reduce the amount of code and functionality accessible to untrusted users.
Term
What is dynamic analysis?
Definition
It is the evaluation of  a program in real time.
Term
What is the difference between verification and validation?
Definition

Verification determines if the product accurately represents and meets specifications.

 

Validation dterimes if the product provides the necessary solution for the intended real-world problem.

Term
What is a Zero-Day vulnerability?
Definition
They are vulnerabilities that do not currently have a resolution.
Term
What is fuzzing?
Definition
It is a technique used to discover flaws and vulnerabilities in software.
Term
Define SOW
Definition
Statement of Work
Term
What is a SOW
Definition
It describes the product and customer requirements.
Term
Define WBS
Definition
Work Breakdown Structure
Term
What is WBS?
Definition
A project management tool used to define and group a projects individual work elements in an organized manner.
Term
What is Software Escrow?
Definition
Storing of the source code of software with a third party escrow agent.
Term
What is change control?
Definition
The process of controlling the changes that take place during the life cycle of a system and documenting the necessary change control activities.
Term
What is Software Configuration Management
Definition
It identifies the attributes of software at various points in time, and perofrms a methodical control of changes
Term
What is a garbage collector?
Definition
It ism blocks of memory that were once allocated but are no longer in use and deallocates the blocks and marks them as free.
Term
Define COM
Definition
Component Object Model
Term
What is COM?
Definition
A model developed by Microsoft that allows for interprocess communication between applications potentially written in different programming languages.
Term
Define OLE
Definition
Object Linking and Embedding
Term
What is OLE?
Definition
It provides a way for objects to be shared on a local computer and to use COM as their foundation.
Term
What is Data Warehousing?
Definition
It combines data from multiple databases or data sources into a large database for the purpose of providing more extensive information retrieval and data analysis.
Term
What is an Artifical Neural Network?
Definition
A mathematical or computational model based on the nueral structure of the brain.
Term
What is a Macro Virus?
Definition
It is a virus written in one of these macro language and is platform independent.
Term
What is a Compression Virus
Definition
It is a virus that appends itself to a executable on the system.
Term
What is a Script Virus
Definition
It is files that are executed by an interpreter.
Term
What is a Tunneling Virus?
Definition
It is a type of virus that attempts to install itself under the antivirus program.
Supporting users have an ad free experience!