Shared Flashcard Set

Details

CISSP
Flash Cards created using information from the All in one Six Edition Exam Guide by Shon Harris
250
Other
Professional
09/19/2013

Additional Other Flashcards

 


 

Cards

Term
What is centralized access control administration?
Definition
One entity is responsible for overseeing access to all corporate resources.
Term
What is Sender Policy Framework? (SPF)
Definition
An email validation system designed to prevent email spam.
Term
What is Context-Dependent Access Control?
Definition
It is access decisions that are based on the context of a collection of information.
Term
What is Open Mail Relay?
Definition
An SMTP server configured in such a way that it allows anyone on the internet to send email through it.
Term
What is NAT?
Definition
Network Address Translation
Term
What is Email Spoofing?
Definition
It occurs when malicious users forge an email to make it appear to be from a legitimate source.
Term
What is SASL?
Definition
Simple Authentication and Security Layer.
Term
What is the difference between POP and IMAP?
Definition

POP is used for internet based email.

 

IMAP is used for corporate email accounts

Term
What does IMAP do?
Definition
Enable users to access mail on a mail server.
Term
What is IMAP?
Definition
Internet Message Access Protocol.
Term
What is a Fraggle attack?
Definition
DDoS attack using UDP Echo traffic.
Term
What is a Smurf Attack?
Definition
A DDoS attack that floods a target computer with spoofed broadcast ICMP packets.
Term
What are the two main componenets of SNMP?
Definition

Managers

 

Agents

Term
What Protocol does Traceroute use?
Definition
ICMP
Term
What is Content-Dependent Access Control?
Definition
Access to objects are determined by the content within the object.
Term
What is a capability table?
Definition
Specifies access rights a certain subject posseses pertaining to specific objects
Term
What are the two types of heirarchies in RBAC?
Definition

Limited-Only one level of hierarchy is allowed

 

General-Allows for many levels of hierarchies

Term
Describe MAC
Definition
System makes access decisions
Term
What is the difference between a memory card and a smart card?
Definition

A memory card holds information but can not process it

 

Smart cards hold information and have the necesdsary hardware and software to process that information

Term
What is the difference between synchronous and asynchonous token generating devices?
Definition

Asynchronous is based on challenge/response.

 

Synchronous is based on time or counter-driven mechanisms.

Term
What is MAC?
Definition
Mandatory Access Control.
Term
Describe DAC.
Definition
The owner of a file specifies which users can access the file.
Term
What is DAC?
Definition
Discretionary Access Control.
Term
What is the Key Distribution Center? (KDC)
Definition

It is the foundation of Kerberos Security.

 

It holds all users and services secret keys

 

It is the trusted authentication for all users.

Term
What is collusion?
Definition
Two or more people working together to carry out fraudulent activity.
Term
What is a data custodian responsible for?
Definition
Maintaining and protecting data.
Term
What is a data owner?
Definition
Member of management in charge of a specific business unit that is responsible for a specific subset of data.
Term
What is a security steering commitee?
Definition
Group responsible for making decision on tactical and strategic security issues within an organization.
Term
What are the four main goals of a risk analysis?
Definition

Identify assest

 

Identify vulnerability

 

Quantify probably of business impact

 

Provide economic balance between impact of threat and cost of cunter measure.

Term
What is an example of misuse of data?
Definition

Sharing trade secrets

 

Fraud


Espionage

 

Theft

Term
What is a fault tree analysis?
Definition
An approach that maps specific flaws to root causes in complex systems.
Term
What are examples of physical damage?
Definition

Fire

 

Water


Vandalism

Term
What is information risk management?
Definition
The process of identifying and assesing risk and reducing it to an acceptable level.
Term
What is AIC?
Definition

Availability

 

Integrity


Confidentiality

Term
What is FMEA?
Definition
It is a method of determining functions, identifying functional failures, and assesing causes of failure.
Term
What is AS/NZS 4360?
Definition
Australian risk management used to understand a companies financial capital, human safety, and business decision risks.
Term
What is an octave?
Definition
Operationally Critical Threat Asset and Vulnerability Evaluation.
Term
What is FRAP?
Definition
Facilitated Risk Analysis Process.
Term
What is SP 800-30?
Definition
Risk Management guide for information technology systems.
Term
What is delayed loss?
Definition
A loss that is secondary in nature and takes place well after a vulnerability is exploitated.
Term
What is ISO/IEC 27005?
Definition
International standard for how risk management should be carried out.
Term
What is loss potential?
Definition
What the company would lose if a threat was  exploitated.
Term
What is COSO?
Definition
International control used to secure U.S federal systems developed by NIST.
Term
What is CMMI?
Definition
Capability Maturity Model Intergration
Term
What is Six Sigma?
Definition

Process improvent methodology

 

Improves operation efficency

 

Developed by Motorola

 

Term
What is ITIL?
Definition
It is the De Facto standard of best practices
Term
What is the difference between COSO and COBIT?
Definition

COSO is a model for corporate governance

 

COBIT is for IT governance

Term
What is special publication 800-53?
Definition
It outlines controls that need to be in place to be compliant with FISA.
Term
Describe COBIT
Definition

Framework and set of control objectives developed by the ISACA

 

It defines goals for controls to properly manage IT and ensure it maps to business needs.

Term
What is COBIT?
Definition
Control Objectives for Information and Related Technology
Term
What is strategic alignement?
Definition
Business drivers and regulatory and legal requirements are being met by the security enterprise architecture.
Term
Describe Zachman Architecture Framework
Definition

One of the first enterprise architecture framework

It is a two dimensional model

It uses six basic communication interrogatives that intersect with different viewpoints

The goal of the framework is the look at the same organization from different views.

Term
Describe British Standard 7799
Definition

Developed in 1995 in U.K.

Outlines how information management systems should be built and maintained.

Term
What is a tear drop attack?
Definition
Involves sending managed IP fragments with-sized payload to the target machine.
Term
Describe APT
Definition
Network attack in which an authorized person gains access to a network and stays undetected for a long period of time.
Term
What is an APT?
Definition
Advanced Persistant Threat
Term
What is Super Zapping?
Definition
Using software to bypass normal security constraints to allow unathorized access to data.
Term
Describe GIGO
Definition
Computers can process unintended data reults and it will result in unintended/erroneous ouptut information
Term
Define GIGO
Definition
Garbage In Garbage Out
Term
What is API do?
Definition
Specifies how software components should interact with each other.
Term
Define API
Definition
Application Programming Interface.
Term
What is a clipping level?
Definition
An older term used to mean a threshold
Term
What is a compensating control?
Definition
A control that provides an alternative measure of control.
Term
What is a detective control?
Definition
A control that identifies incident activities and potential intruders.
Term
What is a recovery control?
Definition
A control intended to bring enviroment back to regular operations.
Term
What is a corrective control?
Definition
A control that fixes systems after an incident.
Term
What is a preventative control?
Definition
Intended to avoid an incident from occuring
Term
What is a deterrent?
Definition
Something intended to discourage a potential attacker.
Term
What are physical controls?
Definition
Items put into place to protect facilities/perspnel/resources
Term
What are administrative controls?
Definition

Soft Controls

Security Documentations

Risk Management

Personel Security

Term
What are technical controls?
Definition

Software/Hardware controls

 

Examples:Firewalls/IDS/Encryption

Term
What is a control?
Definition
A countermeasure put into place to mitigate potential risk.
Term
What is an exposure?
Definition
Instance of being exposed to loss.
Term
What is a threat?
Definition
Potential danager associated with exploitation of a vulnerability.
Term
What is a vulnerability?
Definition
A lack of a counter-measure or weakness in a counter-measure.
Term
What is social engineering
Definition
Gaining access by tricking somoene to divulge ensitive information.
Term
What is data throughput?
Definition
Actual amount of data carried over a connection.
Term
What is Teredo?
Definition
Transition mechanism for migrating from IPV4  to IPV6
Term
What is session hijacking?
Definition
Attack method that allows an attacker to overtake and control a communication session.
Term
What is a SYN Flood?
Definition
DoS attack where an attacker sends a succession of SYN packets with the goal of overwhelming a vicitms system.
Term
What is data hiding?
Definition
Use of segregation in design decisions to protect software from being comprimised.
Term
What is micro-architecture?
Definition
Specific design of a microprocessor which includes physical components.
Term
What is a logical address?
Definition
Indirect addressing used by processes within an operating system.
Term
What is an absolute address?
Definition
Hardware addresses used by the CPU.
Term
What is process isolation?
Definition
Protection mechanism provided by operating systems that can be implemented as encapsulation.
Term
What is a buffer overflow?
Definition
It takes place when too much data us accepted into a specific process.
Term
What is mode transition?
Definition
When the CPU has to change from processing code in user mode to kernal mode.
Term
What is cache memory?
Definition
Type of memory used for highspeed writing and reading activites.
Term
What is the goal of memory management?
Definition

Provide an abstraction level for the programmer

Maximizes performance with limited amount of memory

It protects the OS and applications loaded into the memory.

Term
What is a software deadlock?
Definition
Two processes can not complete their activities because they are both waiting for ther same system resources to be released.
Term
What is a process?
Definition
Program that is loaded in memory with an operating system.
Term
What is a maskable interupt?
Definition
Interrupt value assigned to a noncritical operating system activity.
Term
What is a nonmaskable interupt?
Definition
Interrupt value assigned to a critical operating system activity.
Term
What is pre-emptive multitasking
Definition
Used by operating systems to allow for computer resource time slicing.
Term
What is the difference between a running state and a ready state?
Definition

A running state-CPU is executing instructions and data

 

A ready state is waiting to send instructions to the CPU

Term
What is cooperative Multi-tasking?
Definition
Used in Windows 3.x and is required to process to voluntary release resources they are using.
Term
What is ISO/IEC 42010:2007
Definition
International standard that provides guidlines on how to create and maintain system architectures.
Term
What is the control unit?
Definition
Part of the CPU that oversees the collection of instructions and data from memory and how they are passed to the processing components of the CPU.
Term
What is aymmetric mode multiprocessing?
Definition
When a computer has two or more CPU's and one CPU is dedicated to a specific program while the other CPU carries out general proccessing procedures.
Term
What is symmetric mode multiprocessing?
Definition
When a computer has two or more CPU's and each CPU is being used in a load balancing method.
Term
What is a data bus?
Definition
Physical connections between processing components and memory segments
Term
What is an address bus?
Definition
Physical connections processing components.
Term
Describe Kernel Mode
Definition
Mode a CPU works in when carrying out more trusted instructions.
Term
Describe the user mode of a system
Definition
A protection mode that CPU works within when carrying out less trusted process instructions.
Term
What is a special register?
Definition
Temporary memory loaction that holds critical processing parameters.
Term
What is a stack?
Definition
Memory segment used by processes to communicate instructions and data to each other.
Term
What does a program counter do?
Definition
It contains the memory address of the next instruction to be fetched.
Term
What is a general register?
Definition
They are used to hold variables and tempoary results as the ALU works through its execution sets.
Term
Describe ALU
Definition
It performs the mathmatical functions and logical operations of data.
Term
What is an architecture description?
Definition
Collection of document types to convey an architecture in a formal setting.
Term
What is a view?
Definition
It is a representative of a whole system from the perspective of a related set of concerns.
Term
What is a stakeholder?
Definition
Individual with interests in a system.
Term
What is a single point of failure with in a Single Sign On implementation?
Definition
Authentication
Term
What is threat modeling?
Definition
It identifies potential threats and attack vectors.
Term
What is SPML?
Definition
It allows for the automation of user management.
Term
What technology allows users to remember just one password?
Definition
Password Synchronization
Term
What is a type I biometric error
Definition
System rejects an authorized individual.
Term
What is a type II biometric error?
Definition
An imposter was authenticated.
Term
What is XML?
Definition
Seto f rules for encoding documents in machine readable format to allow for interoperability between various web based technologies.
Term
What is a decentralized access control administration?
Definition
It gives control of access to the people closer to the resources.
Term
What are the main types of restricted interface measurements?
Definition

Menus and shells


Database views

 

Physically Constrained Interfaces

Term
What is a statistical based IDS?
Definition
A behavioral based system that builds a profile of an enviroment of normal activities.
Term
What is Availability?
Definition
Reliable and timely access to data and resources.
Term
What is an example of confidentiality?
Definition

Encryption for data at rest

 

Encryption for data in transit

 

Access controls

 

Term
What are example of Integrity?
Definition

Hashing

 

Configuration Management

 

Change Control

 

Access Control

 

Digital Signing

Term
What are examples of Availability?
Definition

RAID

 

Clustering


Load Balancing

 

Backups

 

Fail-Over Configurations

Term
What is SAS 70?
Definition
Internal controls audit carried out by a 3rd party.
Term
Name 3 policy types
Definition

Organizational

 

Issue-Specific

 

System-Specific

Term
Name 3 policy categories
Definition

Regulatory-Ensures an organizatin is following set by industry

 

Advisory-Advises employees to whichbehaviors should/should not take place within the organization

 

Informative-Not enforceable-Teaches employees about specific issues relevant to the company.

Term
What is a standard?
Definition
Mandatory activities actions or rules.
Term
What is the class B IP range?
Definition
128.0.0.0-191.255.255.255
Term
What is the range for a class C address?
Definition
192.0.0.0-223.255.255.255
Term
What is the range of class E IP addresses?
Definition
240.0.0.0-255.255.255.255
Term
What are registered ports?
Definition

Ports from 1024-49151

 

Can be registered with ICANN for a paticular use.

Term
What is the port range for well known ports?
Definition
0-1023
Term
What is the range for class D IP addresses?
Definition
224.0.0.0-239.255.255.255
Term
What port uses telnet?
Definition
23
Term
What port uses SMTP?
Definition
25
Term
What port is HTTP used on?
Definition
80
Term
What port uses SNMP?
Definition
161/162
Term
What ports uses FTP?
Definition
20/21
Term
What is the class A IP range?
Definition
0.0.0.0-127.255.255.255
Term
Describe fence height requirements
Definition

3-4 ft deters casual trespassers

 

6-7 too high to climb easily

 

8ft-Used for protecting critical areas

Term
Describe preaction water system
Definition

Similar to dry pipe/water is not held in pipes.

Water is realesed by using pressurized air.

Term
Describe a drypipe system
Definition
Water is not held in the pipes
Term
Describe a wetpipe system
Definition
System always contains water in the pipes and is discharged by temperature control-level sensors.
Term
Describe the four classes of gates
Definition

Class I-Residential

Class II-Commerical

Class III-Industrial

Class IV-Restricted(Prisions)

Term
What is a perimeter intrusion detection and assestment system? (PIDAS)
Definition
It is a type of fence with passive cable vibration sensors that sets of an alram if anything tries to cut or climb it.
Term
Describe activity support
Definition
Planned activities for the areas to be protected.
Term
Describe natural surviellance
Definition
Use and placement of physical enviromental features in personnel walkways.
Term
Describe natural access control
Definition
Guidance of people entering and leavign the space.
Term
What are the three main CPTED strategies?
Definition

Natural access control

Natural Surviellance

Natural Territorial Reinforcement

Term
What is target hardening?
Definition
Denying access through physical and artifical barriers.
Term
Where should a datacenter be located in a facility?
Definition
In the center of the building.
Term
What are three factors used in authentication?
Definition

Something a person knows

 

Something a person has

 

Something a person is

Term
What is a race condition?
Definition
Occurs when processes carryout tasks in an incorrect order
Term
What are logical access controls?
Definition
Technical tools used for identification authorization and accountability.
Term
What is COSO's main objective?
Definition
Prevention of a coporate environment that promotes financial fraud.
Term
What is ISO/IEC 27799?
Definition
Standard on how to protect personal health information.
Term
How do you calculate residual risk?
Definition
(Threat*Vulernability*Asset Value)*Control Gap
Term
What is ICMP used for?
Definition
It delivers status messages and repports errors and tests connectivity.
Term
What is ARP table cache poisoning?
Definition
Altering a systems ARP table so it contains incorrect information
Term
What is IMGP used for?
Definition
It reports multicast group memberships to routers.
Term
Define IGMP
Definition
Internet Group Management Protocol
Term
Describe Plenum cables
Definition
Cables that is jacketed with fire retarded plastic
Term
What is crosstalk
Definition
Signal on one channel of a transmission creates an undesired effect in another channel by interacting with it.
Term
Describe 10Base2
Definition

Called Thinnet

 

Uses Coaxial cable

 

Max length 185 meters.

Term
What is the difference between baseband an broadband?
Definition

Baseband uses the entire communication channel for its transmission

 

Broadband divides communication channel into indpendent subchannels

Term
What are salts?
Definition
Random values addes to the encryption process to add complexity and randomness
Term
What is Kerberos?
Definition

Authentication protocol that is the defualt authentication for Windows Server 2000/2003/2008

It is a sngle sign on system for distrbuted environments.

Term
What are cognitive passwords?
Definition
Fact or opinion based information used to verify an indiviuals information.
Term
The information technology security evaluation criteria was developed for what countries?
Definition
European
Term
What is the first level of the orange book that requires classifcation labeling?
Definition
B1
Term
Describe compartmented security mode
Definition
All users can access some data based on their need to know.
Term
Describe high security mode
Definition
Users can access some data.
Term
Describe dedicated security mode
Definition
A user has access to all information on the system
Term
What is the * integrity axiom
Definition
A subject cannot modify an object in higher integrity level
Term
What is the simple integrity axiom?
Definition
A subject cannot read data at a lower integrity level.
Term
What is the BIBA Model?
Definition
A formal state transition model that describes a set of access control rules designed to ensure data integrity
Term
What is the strong star property rule
Definition
Subject can perform read and write functions only to the objects at its same security level.
Term
Describe the * property rule
Definition
A subject cannot write to another object a lower security level
Term
What is the simple security rule?
Definition
A subject cannot read data at a higher security level.
Term
Describe the Bee La Padula Model
Definition

It define the concept of a secure state and necessary modes of access

 

Ensures information only flows in a manner that does not violate system policy

Term
What instruction governs MAC and DAC?
Definition
DOD 5200.28
Term
What is the maximum height a plant or hedge should be?
Definition
2.5 ft tall
Term
Describe a security kernel
Definition
It is a reference monitor.
Term
Define HDLC
Definition
High Level Data Link
Term
What is HDLC?
Definition
A protocol used for serial device to device communication.
Term
Define SDLC
Definition
Synchronous Data Link Control
Term
What is SDLC?
Definition
Protocol used in networks that use dedicate leased lines with permanent physical connections.
Term
Define PPP
Definition
Point-to-Point Protocol
Term
Define ISDN
Definition
Integrated Services Digital Network
Term
What is ISDN?
Definition
It is a technology that enables data and voice to travel over a medium in a digital manner.
Term
What is distance vector routing protocol
Definition
A routing protocol tthat calculates paths based on distance.
Term
What is Border Gateway Protocol?
Definition
It is a protocol that carries out core routing designs on the internet.
Term
What is a wormhole attack?
Definition
An attack that takes place when an attacker captures packets at one location in the network and tunnels them into another location for a second attacker to use against a target system.
Term
What is Spanning Tree protocol?
Definition
Network Protocol ensures a loop free topology.
Term
What is STP?
Definition
Spanning Tree Protocol
Term
What is source routing?
Definition
Allows a sender of a packet to specify the route the packet takes throught the network verus having the router determine the path.
Term
Define MPLS
Definition
Multiprotocol Label Switching
Term
What is MPLS?
Definition
A networking technology that directs data from one network node to the next based on short path labels.
Term
What is VLAN Hopping?
Definition
An exploit that allows an attacker on a VLAN to gain unauthorized access to a network.
Term
What is a bastion host?
Definition
It is a highly exposed device that is most likely to be target by attackers.
Term
Describe a screened host
Definition
A firewall that communicates directly with a perimeter router and the internal network.
Term
What is a screened subnet?
Definition
It is another layer of security that is used in the screened host architecture.
Term
Describe masquerading
Definition
An attacker modifies a packet header to have a source address of a host inside the network that is going to be attacked.
Term
What is an overlapping fragment attack?
Definition
It is used to subvert packet filters that do not reassemble packet fragments before inspection.
Term
Define OSPF?
Definition
Open Shortest Path First
Term
What is OSPF?
Definition
It uses link state algorithms to send out routing table information.
Term
What is IP fragmentation?
Definition
It is an exploitation of fragmentation and reassembly flaws within IP, which causes DoS.
Term
Describe the silent firewall rule.
Definition
It is a rule that drops "noisy" traffic without logging it. It is used to reduce log sizes.
Term
Describe the firewall stealth rule
Definition
It disallows access to firewall software from unauthorized systems.
Term
Describe the cleanup firewall rule
Definition
It is the last rule in the rule base that drops and logs any traffic that does not meet any other preceeding rules.
Term
Describe the negate firewall rule
Definition
It is used instead of using broad an premissive "any rules" and provides tighter permission rights.
Term
Describe a proxy server
Definition
It acts as an intermediary between clients that want to access certain services on a network.
Term
Define SMDS
Definition
Switched Multimegabit Data Service.
Term
What is a honeypot?
Definition
A computer that attempts to lure an attacker to it instead of actual production servers.
Term
What is an open proxy?
Definition
A proxy that can be used by anyone.
Term
What is a dual-homed firewall?
Definition
It is a device that has two interfaces between an untrusted network and trusted network to provide secure access.
Term
What is multiplexing?
Definition
It is a method of combining multiple channels of data over a single transmission path.
Term
Define ATM
Definition
Asynchronous Transfer Mode.
Term
What is a dedicated link?
Definition
It is one single link that is pre-established for the purpose of WAN communication.
Term
Define TDM
Definition
Time Division Multiplexing
Term
What is electronic data interchange? (EDI)
Definition
It is structured transmission of data between organizations.
Term
What is a value added network? (VAN)
Definition
It is a hosted EDI service that acts as an intermediary between business partners.
Term
What is metro ethernet?
Definition
It is a data link technology used in MANs to connect customer networks to larger service networks or the interne.
Term
Define LAN
Definition
Local Area Network
Term
Define WAN
Definition
Wide Area Network
Term
Define MAN
Definition
Metropolitian Area Network
Term
What are T carriers?
Definition
They are dedicated lines that can carry voice and data information over trunks lines.
Term
What is time division multiplexing?
Definition
Two or more but streams or signals are transferred apparently simultaneously as subchannel in one communication channel
Term
What is a channel service unit?
Definition
A line bridging device bridging for use with T carriers and is required by PTSN providers at digital interfaces that terminate in a DSU
Term
What is quality of service?
Definition
it is a capability that allows a protocol to distinguish between different classes of messages and assign priority levels.
Term
What is a constant bit rate?
Definition
Connection-oriented channel that provides a consistent data throughput for time sensitive applications.
Term
What is a variable bit rate?
Definition
It is a connection oriented channel used for delay insensitive applications.
Term
What is unspecified bit rate?
Definition
It is a connectionless channel that does not promise a specific data throughput rate.
Term
What is available bit rate?
Definition
It is a connection-oriented channel that allows the bit rate to be adjusted.
Term
What was the first protocol to provide true QoS?
Definition
ATM
Term
How many types of ISDN implementations are there?
Definition
3
Term
What are the types of ISDN?
Definition

BRI ISDN

 

PRI ISDN

 

BISDN

Term
Describe BRI ISDN
Definition
THis implementation operates over exisiting copper lines and provides digitl voice and data channels. It uses 144 Kbps bandwidth.
Term
Describe PRI ISDN
Definition
This implementation has 23 B channels and 1 D channel each using 64 Kbps. The total bandwidth euals one T-1 line at 1.544 Mbps.
Term
Describe Broadband ISDN
Definition
THis implentation can handle many different types of services simultaneously and is used in telecommunication backbones.
Term
Define DSL
Definition
Digital Subscriber Line
Term
Describe DSL
Definition
High speed connection that can provide 6 to 30 times higher bandwidth than ISDN. It can provide 52-Mbps transmission speed.
Term
How many types of DSL lines are there?
Definition
5
Term
What are the types of DSL lines?
Definition

Symmetric DSL

 

Asymmetric DSL

 

High-Bit-Rate DSL

 

Very High Data Rate DSL

 

Rate Adaptative DSL

Term
Describe Symmetric DSL
Definition
Data travels upstream and downstream at the same rate. Bandwidth ranges between 192Kbps and 1.1Mbps. Used mainly for business applications.
Term
Describe Asymmetric DSL
Definition
Data travels faster downstream. Used in residential areas.
Term
Describe High Bit Rate DSL
Definition
Provides T-1 speed without the use of repeaters. Requires two twisted of wires.
Supporting users have an ad free experience!