• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/30

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

30 Cards in this Set

  • Front
  • Back
Name the four Canons of the CISSP?
-Protect Society, Common Wealth, and the Infrastructure.
-Act Honorabley, Hoestly , Justly, and Responsibly & Legally.
-Provide diligent and competent Service.
-Advance and Protect the Profession.
Name two methods of conducting a risk analysis?

Name two types of Qualitative Risk Analysis?
1. Quanitative and Qualitative.

2. Spanning tree and ANZ 4360.
The ANZ 4360 Risk analysis uses what to provide an assessment?
ANZ 4360 uses a chart with numbers and letters that intersect - the intersection depects a number/letter value that matches the level of risk.
What formula is used to get the ALE "Anual Loss Expectency?
Annual Loss Expectency = Single Loss Expectency x Annual Rate of exposure
How do you calculate the Sinlge Loss Expectancy SLE?

ARO and SLE mean what?
Single Loss Expectancy = Asset value $ x Exposure Factor %.
Annual Rate of Occurance and Single Loss Expenctency.
Name five good Practices?
1. Job Discriptions
2. Least Priviledge and Need to know.
3. Seperation of Duty
4. Job Rotation
5. Mandatory Vacations
Of the five good practices what does - seperation of duty, Job Rotation, and Mandatory Vacations do?
Seperation of Duty - Forces Collusion.
Job Rotation - Breaks up Collusion.
Manditory Vacations - Detects Fraud.
What are the three Phases of Security Planning?
1. Strategic
2. Tactical
3. Operational
Who provides Policy and how does it effect every day activity?
Senior Mangagement Provide Policy (Broad in Scope).
Mid Level Management Provide Standards.
Team leads provide Baselines, Procedures, and Guidelines.
What Does ISO 27001 provide?
A best practices guide for Information Security Management.
Name SIX Enterprise Level Architecture Processes?
TQM - Is about Planning.
ITIL = Managing Quality.
COBIT = Control Points.
Six Sigma = Managing Skills and Disciplines.
CMM/CMMI = Maturing Processes
ISO = Standards
Mirrowing is also known as what?

What is electornic Vaulting?
Disk Shadowing.

Transfering Data off Site via electronic Communication lines.
What is Remote Journelling?
Saving Data to a local location and alternative site in a parallel process. This process does not use a batch process.
Does a full backup remove the archive bit?

What Legal responsiblity does management have conserning Disaster Revocery?
No.

Due Care.
Name a two Backup methods?
1. Incremental = This method is considered best - removes archive bit and only copies those files that have been changed or modified.

Diferencial = Backs up all files modified since last full backup doesn not remove Archive bit.
What can be done to protect against Traffic Analysis?
Traffic Padding
What can be done to protect against a teardrop attack?

What can be done to protect against a fake login screen?.

What can be done to protect against a WinNuk attack?
Patching and ingress filtering.

IDS.

Patch or upgrade to a modern OS.
What can be done to protect against a ping of death?

What can be done to protect against War Dialing?
Patch and ingress filtering.

Do not publisixe phone numbers, modem pools, tighten access control of modems.
Name five steps in penetration testing?
1. Discovery - fingerprinting the OS.
2. Enumeration = Port Scanning.
3. Vulnerbility Mapping = ID all vulnerbilities.
4. Exploiting the vulnerbility.
5. Report to Management.
Discressionary Access controls uses what to keep track of objects and assets?
ACL = access cotrol list
MAC - Manditory Access Control uses what to identify classifications.
Security Labels.
Name eight types of attacks?
1. Man in the middle
2. Sniffing
3. War dialing
4. Ping of Death
5. WinNuk
6. Fake Logon Screen
7. Teardrop
8. Traffic Analysis
What are the three counter measures used in emuation security?
1. Tempest.
2. White noise.
3. Control zones.
A trojan can be used to do install what type of vulnerbilites?
Keystroke Monitor
Zeroization is the process of what?
Writing null values over the media device numberous times to insure the data is not available.
A behavoir based IDS is known as what?

What system must learn the netwokr and creates alot of false positives?
Statistical based and anomally based IDS.

Bahavior based.
A state based IDS looks for suspicous procedures while a bahoior based IDS?
Compares curret traffic to a Reference Model.
Signature base IDS is also refered to as what?
Rule Based IDS
Name four types of IDS systems?
1. Network
2. Host
3. Signature
4. Hehavior Based
In a Network Based IDS, what is the network card set?

SESAME means what?
1. Permisucous Mode.

1. Secure European System for Application ina multi vender environment.