IT CertificationsComprehensive Study Set

Sunflower Cissp

93 questions across 0 topics. Use the find bar or section chips to jump to what you need.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Confidentiality

ANSWER

protecting data or a resource from being altered in an unauthorized fashion

QUESTION 2

integrity

ANSWER

fault tolerance and recovery procedures - depends on business and value to business

QUESTION 3

Availability

ANSWER

ensuring that a subject is who he says he is - Unique user name, account number etc OR an issuance keycard - must be non descriptive you can't see what someone can do by the name - First piece of credentials

QUESTION 4

identification

ANSWER

password, phrase key token, pin - looking at access control matrix /comparing security labels - Stacking of authorizations is called Authorization Creep, too much rights is called excessive privileges - Granted privileges and system granted default access - default no access, give only access that's needed NEED TO KNOW - Second piece of credentials - Strong Authentication if you use 2 out of the three authentications know, has, is AKA 2-factor authentication - Something a person KNOWS, HAS, IS knowledge, ownership, characteristics

QUESTION 5

Authentication

ANSWER

testing of evidence of users identity

QUESTION 6

Accountability

ANSWER

each subject is uniquely identified and actions are recorded

QUESTION 7

Authorization

ANSWER

rights and permissions granted

QUESTION 8

privacy

ANSWER

level of confidentiality and privacy protections

QUESTION 9

Controls Prime objective

ANSWER

is to reduce the effects of security threats and vulnerabilities to a tolerable level

QUESTION 10

risk analysis

ANSWER

process that analyses threat scenarios and produces a representation of the estimated Potential loss

QUESTION 11

Types of controls

ANSWER

Physical, Technical and Administrative

QUESTION 12

Information Classification why?

ANSWER

Not all data has same value, demonstrates business commitment to security, Identify which information is most sensitive and vital

QUESTION 13

Classification criteria

ANSWER

Criteria Value, age, useful life, personal association

QUESTION 14

Levels of classification military

ANSWER

Unclassified - Sensitive but unclassified answers to test, Healthcare - Confidential some damage- Secret Serious damage- Top Secret Grave damage

QUESTION 15

Private sector classifications

ANSWER

Public - Sensitive - Private - Confidential

QUESTION 16

Security Awareness

ANSWER

Losses staff members pose more threat than external hackers loss of money stolen equipment, loss of time work hours loss off reputation declining trusts and loss of resources bandwidth theft

QUESTION 17

Losses

ANSWER

Policies is the first and highest level of documentation Very first is called Senior management Statement of Policy, Stating importance, support and commitment Types - Regulatory required due to laws, regulations, compliance and specific industry standards!) - Advisory not mandatory but strongly suggested - Informative to inform the reader

QUESTION 18

Security policies, standards and guidelines

ANSWER

has classifications and defines level of access and method to store and transmit information

QUESTION 19

information policy

ANSWER

has Authentications and defines technology used to control information access and distribution

QUESTION 20

Security policies

ANSWER

lists hard software to be used and steps to undertake to protect infrastructure

QUESTION 21

SYSTEM security policy

ANSWER

Specify use of specific technologies in a uniform way

QUESTION 22

Standards

ANSWER

same as standards but not forced to follow

QUESTION 23

Guidelines

ANSWER

Detailed steps to perform a task

QUESTION 24

Procedures

ANSWER

Minimum level of security

QUESTION 25

Baseline

ANSWER

ultimate responsibility

QUESTION 26

Roles and responsibilities Senior Manager

ANSWER

functional responsibility

QUESTION 27

Information security Officer

ANSWER

Strategic, develops policies and guidelines

QUESTION 28

Security Analyst

ANSWER

Responsible for asset - Determine level of classification - Review and change classification - Can delegate responsibility to data custodian - Authorize user privileges

QUESTION 29

owner

ANSWER

Run regular backups/restores and validity of them - Insuring data integrity and security C I A Maintaining records in accordance to classification - Applies user authorization

QUESTION 30

custodian

ANSWER

Uses information as their job - Follow instructions in policies and guidelines - Due care prevent open view by e.g. Clean desk) - Use corporation resources for corporation use

QUESTION 31

end user

ANSWER

examines security controls

QUESTION 32

Auditor

ANSWER

FISMA(federal agencies) Phase 1 categorizing, selecting minimum controls, assessment Phase 2: create national network of secures services to assess

QUESTION 33

Legislative drivers FISMA federal agencies

ANSWER

8 elements reassessments owners have responsibilities. Benefits: consistent; comparable; repeatable

QUESTION 34

NIST

ANSWER

Determine impact of the threat and risk of threat occurring

QUESTION 35

Risk Management GOAL

ANSWER

Primary risk assessment, mitigation methodology Secondary data collection and sources for risk analysis

QUESTION 36

Risk Management activities

ANSWER

Inherent chance of making an error with no controls in place Control chance that controls in place with prevent, detect or control errors Detection chance that auditors won't find an error Residual risk remaining after control in place Business concerns about effects of unforeseen circumstances Overall combination of all risks aka Audit risk

QUESTION 37

Types of Risk

ANSWER

Helps to gather the elements that you will need when the actual Risk Analysis takes place.

QUESTION 38

Preliminary Security Examination (PSE)

ANSWER

Steps: Identify assets, identify threats, and calculate risk. Qualitative HAPPY FACES - Higher level , brainstorming, focus groups etc

QUESTION 39

Risk Management -ANALYSIS -Qualitative

ANSWER

Quantitative VALUES!! - SLE single Loss Expectancy = Asset Value Times Exposure factor (% lost of asset) - ALE (Annual loss expectancy) = SLE Times ARO (Annualized Rate of occurrence)

QUESTION 40

Risk Management -quantitative

ANSWER

Accept, mitigate-reduce by implementing controls calculate costs Assign insure the risk to transfer it Avoid stop business activity Loss= probability Times cost

QUESTION 41

Risk remedies

ANSWER

Planning and information gathering - Access internal controls - Compliancy testing - Substantive tests - Finalize the audit

QUESTION 42

Risk-Based Audit Approach

ANSWER

flow of information between a subject and an object CONTROL security features that control how users and systems

QUESTION 43

Access Control

ANSWER

active entity that requests access to an object or data within the object user, program

QUESTION 44

Subject

ANSWER

Is a passive entity that contains information computer, database, file, program

QUESTION 45

object

ANSWER

assurance that information is not disclosure to unauthorized programs, users, processes • encryption, logical and physical access control, • The data needs to be classified

QUESTION 46

Controls-Administrative

ANSWER

Preventive: hiring policies, screening security awareness also called soft-measures! - Detective: screening behavior, job rotation, review of audit records

QUESTION 47

Controls- Technical -aka Logical

ANSWER

Preventive: protocols, encryption, biometrics smartcards, routers, firewall. Detective: IDS and automatic generated violation reports, audit logs.

QUESTION 48

Physical Controls

ANSWER

Preventive: fences, guards, locks - Detective: motion detectors, thermal detectors video cameras

QUESTION 49

Operational controls

ANSWER

Detective, Preventive PASSWORDS TOO Corrective restore controls Restore control ( restore resources deterrents

QUESTION 50

Controls-Types- Mandatory access control

ANSWER

Authorization depended on security labels which indicate clearance and classification of objects Military Restriction: need to know can apply. Lattice based is part of it! A as in mAndatory Rule based access control. Objects are: files, directories and devices

QUESTION 51

Discretionary Access Control

ANSWER

Access through ACL's. Discretionary can also mean: Controlled access protection object reuse, protect audit trail. User directed access control identity based and hybrid based are also forms of discretionary Identity Based AC

QUESTION 52

Non-discretionary access control

ANSWER

A central authority determines what subjects have access based on policies. Role based/task based. Also lattice based can be applied greatest lower, least upper bounds apply

QUESTION 53

Something a user knows -PASSWORDS

ANSWER

cheap and commonly used password generators user chooses own do triviality and policy checking

QUESTION 54

One-time password aka dynamic password

ANSWER

used only once

QUESTION 55

Static password

ANSWER

Same for each logon

QUESTION 56

Passphrase

ANSWER

easiest to remember. Converted to a virtual password by the system

QUESTION 57

Cognitive password:

ANSWER

easy to remember like your mother's maiden name

QUESTION 58

Hacking

ANSWER

access password file - brute force attack try many different characters aka exhaustive - dictionary attack try many different words - Social engineering convince an individual to give access - Rainbow Tables tables with passwords that are already in hash format

QUESTION 59

password checker and password hacker

ANSWER

both programs that can find passwords checker to see if its compliant, hacker to use it by the hacker

QUESTION 60

hashing encryption

ANSWER

On windows system with utility SYSKEY. The hashed passwords will be encrypted in their store LM hash and NT Hash - some OS's use Seed SALT or NONCE, random values added to the encryption process to add more complexity

QUESTION 61

Something a user has

ANSWER

Key, swipe card, access card, badge PASSWORDS. tokens

QUESTION 62

Static Password Token

ANSWER

owner authenticates to token, token authenticates to the information system

QUESTION 63

Synchronous (TIME BASED) dynamic

ANSWER

uses time or a counter between the token and the authentication server, secure-ID is an example

QUESTION 64

asynchronous NOT TIME BASED

ANSWER

server sends a nonce random value This goes into token device, encrypts and delivers a one-time password, with an added PIN its strong authentication

QUESTION 65

Challenge/response token

ANSWER

generates response on a system/workstation provided challenge

QUESTION 66

Something a user is

ANSWER

What you do: behavioral What you are: physical

QUESTION 67

Biometrics

ANSWER

Most expensive - Acceptable 2 minutes per person for enrollment time - Acceptable 10 people per minute throughput time - IRIS is the same as long as you live - TYPE 1 error: False rejection rate FRR - TYPE 2 error: False Acceptance rate FAR - CER Crossover Error Rate or EER Equal Error rate, where FRR = FAR. The lower CER/ERR the more accurate the system.

QUESTION 68

zephyr chart =

ANSWER

iris scan

QUESTION 69

Finger print: stores full fingerprint

ANSWER

one- to-many identification

QUESTION 70

finger scan only the features

ANSWER

one to one identifications

QUESTION 71

scan most widely used today ?

ANSWER

Finger print

QUESTION 72

Acceptability Issues in biometrics

ANSWER

privacy, physical, psychological

QUESTION 73

Fingerprints

ANSWER

made up of ridge endings and bifurcations exhibited by the friction ridges and other detailed characteristics that are called minutiae

QUESTION 74

Retina Scans

ANSWER

Scans the blood-vessel pattern of the retina on the backside of the eyeball

QUESTION 75

Iris Scans

ANSWER

Scan the colored portion of the eye that surrounds the pupil.

QUESTION 76

Facial Scans

ANSWER

Takes attributes and characteristics like bone structures, nose ridges, eye widths, forehead sizes and chin shapes into account.

QUESTION 77

Palm Scans

ANSWER

The palm has creases, ridges and grooves throughout it that are unique to a specific person.

QUESTION 78

Hand Geometry

ANSWER

The shape of a person's hand the length and width of the hand and fingers measures hand geometry.

QUESTION 79

voice print

ANSWER

Distinguishing differences in people's speech sounds and patterns

QUESTION 80

Signature Dynamics

ANSWER

Electrical signals of speed and time that can be captured when a person writes a signature

QUESTION 81

Keyboard dynamics

ANSWER

Captures the electrical signals when a person types a certain phrase.

QUESTION 82

Hand Topology

ANSWER

Looks at the size and width of an individual's hand and fingers.

QUESTION 83

Single Sign On SSO.

ANSWER

Advantage: ability to use stronger passwords, easier administration, less time to access resources. Disadvantage: once a key is compromised all resources can be accessed. Thin client is also a single sign on approach

QUESTION 84

single sign-on (SSO)-KERBEROS

ANSWER

Kerberos addresses Confidentiality and integrity and authentication, not availability

QUESTION 85

Kerberos Is based on

ANSWER

on symmetric key cryptology and is not a propriety control

QUESTION 86

KERBEROS time is:

ANSWER

Critical

QUESTION 87

What is included in windows now replaced NTLM=NT-LAN Managed?

ANSWER

KERBEROS

QUESTION 88

Passwords are never exchanged only hashes of passwords in what SSO?

ANSWER

KERBEROS

QUESTION 89

KERBEROS-benefits?

ANSWER

inexpensive, loads of OS's mature protocol

QUESTION 90

Kerberos Disadvantages

ANSWER

takes time to administer, can be bottleneck or single point of failure

QUESTION 91

What is the term realm in Kerberos?

ANSWER

indicates an authentication administrative domain. Its intention is to establish the boundaries within which an authentication server has the authority to authenticate a user, host or service.

QUESTION 92

KDC Key Distribution Center does what?

ANSWER

grants tickets to client for specific servers. Knows all secret keys of all clients and servers from the network

QUESTION 93

Client authenticates to the ?

ANSWER

KDC

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials