Sybex Cissp
100 questions across 0 topics. Use the find bar or section chips to jump to what you need.
Detective Access Controls
Security guards, supervising users, incident investigations, IDS's
Physical Access Controls
Guards, fences, motion detectors locked doors, sealed windows, lights, backups, cable protections, laptop locks, swipe cards,dogs, CCTV, mantraps alarms
3 Recognized Authentication Factors
What you: Have, Know, Are
Cognitive Password
Series of ?'s about facts or predefined responses that only the subject should know (ex. What's your birthday...etc.)
8 Biometric Factors
Fingerprints, face scans, iris scans, retina scans, palm topography, palm geography, heart/pulse pattern, voice pattern, signature dynamics, keystroke patterns
Issues related to user acceptance of biometric enrollment and throughput rate
Enrollment times longer than two minutes are unacceptable; subjects will typically accept a throughput rate of about six seconds or faster
What Access Control technique employs security labels
Mandatory Access Controls
The Bell-LaPadula, Biba, and Clark-Wilson access control models were all designed to protect a single aspect of security. Name the corresponding aspect for each model.
Bell-LaPadula protects confidentiality, Biba and Clark-Wilson protect integrity
3 types of subjects and their roles in a security environment
The user access objects on a system to perform a work task, the owner is liable for protection of data, the data custodian is assigned to classify and protect data
Why is separation of duties and responsibilities a common security practice?
It prevents any single subject from being able to circumvent or disable security mechanisms
Principle of Least Privilege
Subjects should be granted only the amount of access to objects that is required to accomplish their assigned work tasks.
4 Key principles upon which access control relies
Identification, Authentication, Authorization, Accountability (IAAA)
How are domains related to Decentralized Access Control?
A domain is a realm of trust that shares a common security policy. This is a form of decentralized access control
Why is monitoring an important part of a security policy?
It's used to watch for security policy violations and to detect unauthorized or abnormal activities
What are the functions of an IDS
To automate the inspection of audit logs, and real time system events, detects intrusion attempts, and watches for violations of confidentiality, integrity, and availability
Pros and Cons of Host Based IDS
Can: Pinpoint resources compromised by a malicious user Can't: Detect network only attacks or on other systems, has difficulty detecting DoS attacks, and can be detected by intruders
Pros and Cons of Network Based IDS
Can: Montior a large network, can be hardened against attack. Can't: handle large data flows, doesn't work well on switched networks, can't pinpoint compromised resources
Differences between knowledge based and behavior based detections methods used by IDS
Knowledge based uses a signature database and tries to match monitored events to that database. Behavior based learns about the normal activities on your system through watching and learning
What is a honey pot and what is it used for?
Honey pots are face networks used to lure intruders in order to create sufficient audit trails for tracking them down and prosecuting.
How does penetration testing improve your system's security
Penetration testing is a good way to accurately judge the security mechanisms deployed by an org.
What is a DoS attack
An attack that prevents the system from receiving, processing, or responding to legitimate traffic or requests for resources and objects
What is a spoofing attack
The attacker pretends to be someone or something other than whom or what they are. They often replace the valid source and/or dest. IP address with node numbers with false ones.
What are countermeasures to spoofing?
Patching the OS and Software, enabling source/dest. verification on routers, and employing IDS to detect and block attacks
What is a Man in the Middle Attack?
An attack in which a malicious user is positioned between the two endpoints of a communication link
What is a replay or playback attack?
It is similar to hijacking. A malicious user records the traffic between a client and a server and then retransmits them to the server with slight variations of the time stamp and source IP address
What is a sniffer attack?
Any activity that results in a malicious user obtaining information about a network or the traffic over that network
What is a spamming attack?
Directing floods of messages to a victim's email inboxes or other messaging system. Such attacks cause DoS issues by filling up storage space and preventing legitimate messages from being delivered.
What are some countermeasures to common attack methods?
Patching software, reconfiguring security, employing Firewalls, updating filters, using IDSs improving security policy, using traffic filters, improving physical access control, using system monitoring/auditing
Name the 7 Layers of the OSI Model
Application(7), Presentation(6),Session(5),Transport(4), Network(3), Data Link(2), Physical(1) (APSTNDP)
List the security features offered by the network layer of the OSI model
The Network Layer (Layer 3) offers confidentiality, authentication and integrity
What is the max throughput and max usable distance for 10Base2 cable
Throughput = 10MBps Distance = 185 Meters
Three Common Network TECHNOLOGIES
Ethernet, Token Ring, FDDI
Name the Common Network TOPOLOGIES
Ring, bus, star, and mesh
What are the four layers of the TCP/IP protocols and how do they relate to the OSI Model layers?
The four layers of TCP/IP are application (layers 5-7 of OSI) Host to Host (layer 4 of OSI) Internet (layer 3 of OSI) and Network Access (layers 1 and 2 of OSI)
The 5 generation type of firewalls
Static packet filtering, application level gateway, stateful inspection, dynamic packet filtering, and kernel proxy
5 Networking device types other than firewalls
Routers, switches, hubs, repeaters, bridges, gateways, proxies
What is a proxy and what is it used for?
Any system that performs a function or requests a service on behalf of another system. Proxies are most often used to provide clie3nts with Internet access while protecting their identity
Name at least 10 network and protocol security mechanisms
IPSec, SKIP, SWIPE,SSL,S/MIME, SET,PEM,PGP,PPP,SLIP,PPTP,L2TP,CHAP,PAP,RADIUS, TACACS,S-RPC
Name at least 6 protocol services used to connect to LAN and WAN communication technologies
Frame Relay, SMDS,X.25,ATM,HSSI,SDLC,HDLC,ISDN
How are PVC, SVC, DTE, and DCE used in a Frame Relay Network?
Frame relay requires the use of DTE and a DCE at each connection point. PVC is always available; SVC is established using the best paths currently available
What are 3 remote access authentication mechanisms?
RADIUS, TACACS, S-RPC
What is tunneling and why is it used?
A process that protects the contents of packets by encapsulating them in another protocol. This creates the logical illusion of communications tunnel through an untrusted intermediary network.
What is a VPN?
A communication tunnel that provides point to Point transmission of both authentication and data traffic over an intermediary network.
What are the 4 primary VPN protocols?
PPTP,L2F,L2TP,and IPSec
What are the two modes available through IPSec and what do they do?
Transport mode, the IP packet data is encrypted but the header is not. Tunnel mode the entire IP packet is encrypted and a new header is added to govern transmission through the tunnel.
What is NAT?
Network Address Translation allows the private IP addresses defined in RFC 1918 to be used in a private network while still being able to communicate with the Internet
What is transparency?
A characteristic of a service, security control, or access mechanism that ensures it is unseen by users.
What are some important aspects to consider when designing email security?
Nonrepudiation, access control, message integrity, source authentication, verified delivery, acceptable use policies, privacy , management, and backup and retention policies
What is the most serious threat to Email?
Email is the most common delivery mechanism for viruses, worms, Trojans, documents with destructive macros, and other malicious code
What are possible mechanisms for adding security to email?
S/MIME, MOSS, PEM, and PGP
What are elements of effective user training against social engineering attacks?
Always err toward caution whenever communications are odd or unexpected. Always request proof of identity. Classify information for voice communications. Never change passwords over the phone.
What are the most common threats against communications systems?
DoS, eavesdropping, impersonation, replay, and modification
What are countermeasures to eavesdropping?
Maintaining physical access security, using encryption, employing one-time authentication methods
What is an ARP attack?
The modification of ARP mappings. WHen ARP mappings are falsified, packets are not sent to their proper dest. ARP mappings can be attacked through spoofing. Spoofing provides false MAC's for requested IP's.
What is privacy?
Prevention of unauthorized intrusion, knowledge that information deemed personal or confidential won't be sheared with unauthorized entities, freedom from being observed without consent
What are the requirements for Accountability?
Identification, authentication, authorization and auditing
What is nonrepudiation?
It prevents a subject from claiming not to have sent a message, not to have performed an action, or not to have been the cause of an event.
What is layering?
Layering is simply the use of multiple controls in a series. The use of a multi-layered solution allows for numerous controls to be brought to bear against whatever threats come to pass.
How is abstractions used?
Abstraction is used to collect similar elements into groups, classes, or roles that are assigned security controls, restrictions, or permissions.
What is data hiding ?
Data hiding is preventing data from being known by a subject. Keeping a database from being accessed by unauthorized visitors is a form of data hiding.
What is Change control or change management?
A mechanism used to systematically manage change. Typically, it involves extensive logging, auditing, and monitoring of activities related to security controls and security solutions
What are the goals of change mgmt?
Changes implemented in orderly manner, formalized testing, changes can be reversed, users informed of changes, changes systematically analyzed, negative impact of changes minimized.
What is data classification?
The primary means by which data is protected based on categories of secrecy, sensitivity, or confidentiality
What criteria are used to classify data?
Usefulness, timeliness, value or cost, maturity or age, lifetime or expiration period, disclosure damage assessment, modification damage assessment, national security implications, storage
What is the gov/military data classification scheme?
TS,S,C,SBU,U
What is the commercial business/private sector classification scheme?
Confidential, private, sensitive, public
Name 7 security mgmt concepts and principles.
CIA Triad, confidentiality, integrity, availability, privacy, identification, authentication, authorization, auditing, accountability, and nonrepudiation
What are the elements of a termination procedure policy?
Have at least one witness; escort terminated employee off the premisses immediately; collect identification, access, or security devices; perform exit interview; disable network account
What is the function of the data owner security role?
Classifying information for protection within the security solutions
What is the data custodian security role?
Implementing the prescribed protection defined by the security policy and upper mgmt.
What is the function of the auditor security role?
For testing and verifying that security policy is properly implemented and the derived security solutions are adequate.
What should the documents that make up a formalized security structure include?
Policies, standards, baselines, guidelines, and procedures
What is generally involved in the process of risk management?
Analyzing an environment for risks, evaluating each risk as to its likelihood and damage, assessing the cost of countermeasures, and creating a cost/benefit report to present to upper mgmt.
What should be considered when establishing the value of an asset?
Cost of purchase, development, maintenance, acquisition, and protection; value to owners/users/competitors; equity value; market valuation; liability of asset loss; and usefulness
Name at least 5 possible threats that should be evaluated when performing a risk analysis.
Viruses; buffer overflows; coding errors; user errors; intruders; natural disasters; equipment failure; misuse of data, resources, or services; loss of data; physical theft
What is single loss expectancy, and how is it calculated?
The cost associated with a single realized risk against a specific asset. SLE = asset value (AV)(exposure factor (EF)). The SLE is expressed in a dollar value.
What is annualized loss expectancy?
the possible yearly cost of all instance of a specific realized threat against a specific asset ALE = single loss expectancy (SLE) (annualized rate of occurence(ARO))
What are the basic distinctions between qualitative and quantitative risk analysis
Quantitative assigns real dollar figures to the loss of an asset. Qualitative assigns subjective and intangible values to the loss of and asset.
What are the 4 possible responses by upper/sr. mgmt to risk?
Reduce/mitigate, assign/transfer, accept, or reject/deny
What is residual risk?
Once countermeasures are implemented, the risk that remains is resiudal risk. It's the risk that mgmt has chosen to accept rather than mitigate
What is total risk?
The amount of risk an org. would face if no safeguards were implemented. A formula for total risk is (threats)(vulnerabilities)(asset value) = total risk
What is the controls gap?
The diff between total risk and residual risk. The amount of risk that is reduced by implementing safeguards.
What are the 3 levels of security?
Awareness, training, education.
What are the 3 types of plans employed in security mgmt planning?
A strategic plan is a long term plan that is fairly stable, the tactical plan is a midterm plan that provides more details, operational plans are short term and highly detailed.
How many primary keys can each database table have?
One.
What type of malicious code spreads through the sharing of infected media?
Viruses
What term is used to describe intelligent code objects that perform actions on behalf of a user
Agent
What term is used to describe code sent by a server to a client for execution on the client machine?
Applet
What language by Sun Microsystems is often used for applet programming and development?
Java
What type of database key enforces relationships between tables?
A foreign key.
What security principle ensures that multiple records are created in a database table for viewing at different security levels?
Polyinstantiation
What process evaluates the technical and nontechnical security features of an IT system?
Certification and Accreditation
What type of accreditation evaluates the systems and applications at a specific self-contained location?
Site accreditation
In which phase of the Software Capability Model do you often find hard-working people charging ahead in a disorganized fashion?
Initial
In which layer of the ring protection scheme do user applications reside?
Layer 3
What system mode requires that the system process only one classification level at a time and all system users have clearance and need to know that information
Dedicated security mode.
What is another term for the Master Boot record?
Boot sector.
What type of virus embeds itself in application documents?
Macro Virus
What can AV programs do when they encounter a virus infection?
Delete, disinfect or quarantine.
What type of virus modifies itself each time it infects a new system in an attempt to avoid detection?
Polymorphic Virus
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials