CISSP Study by Adam

Card Set Information

Author:
adaml420
ID:
86560
Filename:
CISSP Study by Adam
Updated:
2011-06-12 23:41:49
Tags:
CISSP
Folders:

Description:
CISSP
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user adaml420 on FreezingBlue Flashcards. What would you like to do?


  1. Access Control
    Access control is any hardware, software, or organizational administrative policy or procedure that grants or restricts access, monitors and records attempts to access, identifies users attempting to access, and determines whether access is authorized.
  2. What is CISSP?
    Certified Information System Security Professional
  3. Preventive Access Control
    Preventive access control is deployed to stop unwanted or unauthorized activity from occurring.
  4. Deterrent Access Control
    Deterrent access control is deployed to discourage violation of security policies.
  5. Detective Access Control
    Detective access control is deployed to discover unwanted or unauthorized activity.
  6. Corrective Access Control
    Corrective access control is deployed to restore systems to normal after an unwanted or unauthorized activity has occurred.
  7. Recovery Access Control
    Recovery access control is deployed to repair or restore resources, functions, and capabilities after a violation of security policies.
  8. Compensation Access Control
    Compensation access control is deployed to provide various options to other existing controls to help enforce and support a security policy.
  9. Monitoring
    Monitoring the activities of subjects and objects, as well as of core system functions that maintain the operating environment and the security mechanisms, helps establish accountability on the system.
  10. Host-based IDS and Network-based IDS
    A host-based IDS watches for questionable activity on a single computer system. A network-based IDS watches for questionable activity being performed over the network medium, can be made invisible to users, and is ineffective on switched networks.
  11. Behavior-based IDS
    A behavior-based IDS can be labeled an expert system or a pseudo-artificial intelligence system because it can learn and make assumptions about events. In other words, the IDS can act like a human expert by evaluating current events against known events.
  12. Spoofing
    Spoofing grants the attacker the ability to hide their identity through misdirection. It is therefore involved in most attacks.
  13. Penetration test goal
    In a typical penetration testing scenario, the ultimate goal is to expose, inventory, and report any findings of vulnerability or weakness on the network.
  14. Gateway
    A gateway connects networks that are using different network protocols.
  15. Data Object name
    A data object is called a datagram or a packet in the Network layer. It is called a PDU in layers 5 through 7. It is called a segment in the Transport layer and a frame in the Data Link layer.
  16. Network hardware devices funtion at layer 1
    Network hardware devices that function at layer 1, the Physical layer, are hubs and repeaters.
  17. Attenuation
    Attenuation is the loss of signal strength and integrity over distance on a cable.
  18. Mesh Topologies
    Mesh topologies provide redundant connections to systems, allowing multiple segment failures without seriously affecting connectivity.
  19. Tunneling
    Tunneling is generally an inefficient means of communicating because all protocols include their own error detection, error handling, acknowledgment, and session management features, and using more than one protocol at a time just compounds the overhead required to communicate a single message.
  20. Tunneling (2)
    The tunneling process prevents security control devices from blocking or dropping the communication because such devices don’t know what the contents of the packets actually are.
  21. Authentication Header
    Authentication Header (AH) provides authentication, integrity, and nonrepudiation.
  22. ATM
    Asynchronous transfer mode (ATM) is a cell-switching technology rather than a packet-switching technology.
  23. Accountability
    Accountability is the ultimate goal of a process started by identification.
  24. Abstraction
    Abstraction describes putting similar elements into groups, classes, or roles that are assigned security controls, restrictions, or permissions as a collective.
  25. Residual Risk
    Residual risk is the risk that management has chosen to accept rather than mitigate.
  26. Qualitative Risk analysis
    The process of performing qualitative risk analysis involves judgment, intuition, and experience—in other words, opinions.
  27. Primary Key
    The primary key is selected from the pool of available candidate keys for each table.
  28. CMM Defined phase
    The Defined phase introduces formal, documented software development processes.
  29. MBR virus
    Master boot record (MBR) viruses infect the system’s boot sector and load when the system is started.
  30. Stealth virus
    Stealth viruses alter operating system file access routines so that when an antivirus package scans the system, it is provided with the information it would see on a clean system rather than with infected versions of data.
  31. Man-in-the-middle attack
    A man-in-the-middle attack occurs when a malicious user is positioned between the two endpoints of a communication’s link, intercepting and facilitating their communication session.
  32. Encrypted virus
    Encrypted viruses use a variety of cryptographic keys in conjunction with encryption and decryption routines to hide their code on the hard drive.

What would you like to do?

Home > Flashcards > Print Preview