Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
30 Cards in this Set
- Front
- Back
Name the four Canons of the CISSP?
|
-Protect Society, Common Wealth, and the Infrastructure.
-Act Honorabley, Hoestly , Justly, and Responsibly & Legally. -Provide diligent and competent Service. -Advance and Protect the Profession. |
|
Name two methods of conducting a risk analysis?
Name two types of Qualitative Risk Analysis? |
1. Quanitative and Qualitative.
2. Spanning tree and ANZ 4360. |
|
The ANZ 4360 Risk analysis uses what to provide an assessment?
|
ANZ 4360 uses a chart with numbers and letters that intersect - the intersection depects a number/letter value that matches the level of risk.
|
|
What formula is used to get the ALE "Anual Loss Expectency?
|
Annual Loss Expectency = Single Loss Expectency x Annual Rate of exposure
|
|
How do you calculate the Sinlge Loss Expectancy SLE?
ARO and SLE mean what? |
Single Loss Expectancy = Asset value $ x Exposure Factor %.
Annual Rate of Occurance and Single Loss Expenctency. |
|
Name five good Practices?
|
1. Job Discriptions
2. Least Priviledge and Need to know. 3. Seperation of Duty 4. Job Rotation 5. Mandatory Vacations |
|
Of the five good practices what does - seperation of duty, Job Rotation, and Mandatory Vacations do?
|
Seperation of Duty - Forces Collusion.
Job Rotation - Breaks up Collusion. Manditory Vacations - Detects Fraud. |
|
What are the three Phases of Security Planning?
|
1. Strategic
2. Tactical 3. Operational |
|
Who provides Policy and how does it effect every day activity?
|
Senior Mangagement Provide Policy (Broad in Scope).
Mid Level Management Provide Standards. Team leads provide Baselines, Procedures, and Guidelines. |
|
What Does ISO 27001 provide?
|
A best practices guide for Information Security Management.
|
|
Name SIX Enterprise Level Architecture Processes?
|
TQM - Is about Planning.
ITIL = Managing Quality. COBIT = Control Points. Six Sigma = Managing Skills and Disciplines. CMM/CMMI = Maturing Processes ISO = Standards |
|
Mirrowing is also known as what?
What is electornic Vaulting? |
Disk Shadowing.
Transfering Data off Site via electronic Communication lines. |
|
What is Remote Journelling?
|
Saving Data to a local location and alternative site in a parallel process. This process does not use a batch process.
|
|
Does a full backup remove the archive bit?
What Legal responsiblity does management have conserning Disaster Revocery? |
No.
Due Care. |
|
Name a two Backup methods?
|
1. Incremental = This method is considered best - removes archive bit and only copies those files that have been changed or modified.
Diferencial = Backs up all files modified since last full backup doesn not remove Archive bit. |
|
What can be done to protect against Traffic Analysis?
|
Traffic Padding
|
|
What can be done to protect against a teardrop attack?
What can be done to protect against a fake login screen?. What can be done to protect against a WinNuk attack? |
Patching and ingress filtering.
IDS. Patch or upgrade to a modern OS. |
|
What can be done to protect against a ping of death?
What can be done to protect against War Dialing? |
Patch and ingress filtering.
Do not publisixe phone numbers, modem pools, tighten access control of modems. |
|
Name five steps in penetration testing?
|
1. Discovery - fingerprinting the OS.
2. Enumeration = Port Scanning. 3. Vulnerbility Mapping = ID all vulnerbilities. 4. Exploiting the vulnerbility. 5. Report to Management. |
|
Discressionary Access controls uses what to keep track of objects and assets?
|
ACL = access cotrol list
|
|
MAC - Manditory Access Control uses what to identify classifications.
|
Security Labels.
|
|
Name eight types of attacks?
|
1. Man in the middle
2. Sniffing 3. War dialing 4. Ping of Death 5. WinNuk 6. Fake Logon Screen 7. Teardrop 8. Traffic Analysis |
|
What are the three counter measures used in emuation security?
|
1. Tempest.
2. White noise. 3. Control zones. |
|
A trojan can be used to do install what type of vulnerbilites?
|
Keystroke Monitor
|
|
Zeroization is the process of what?
|
Writing null values over the media device numberous times to insure the data is not available.
|
|
A behavoir based IDS is known as what?
What system must learn the netwokr and creates alot of false positives? |
Statistical based and anomally based IDS.
Bahavior based. |
|
A state based IDS looks for suspicous procedures while a bahoior based IDS?
|
Compares curret traffic to a Reference Model.
|
|
Signature base IDS is also refered to as what?
|
Rule Based IDS
|
|
Name four types of IDS systems?
|
1. Network
2. Host 3. Signature 4. Hehavior Based |
|
In a Network Based IDS, what is the network card set?
SESAME means what? |
1. Permisucous Mode.
1. Secure European System for Application ina multi vender environment. |