CISSP - Practice

  1. Triple DES key bit
    168 (3 x 56 key bit of DES)
  2. access control administration
    hybrid, centralized, decentralized
  3. clipping level
    baseline of normal activit
  4. # of layers in Ip/TCP model
  5. The columns of an access control matrix are known as
    "Access control Lists"
  6. Interim Reports
    used to communicate items that require immediate attention.
  7. Types of decision systems -

    Expert system - capabilities of a human

    neural network
  8. Strength of a cryptosystem is dependant on ..
    • 1) Secrecy of the key
    • 2) initialization vector
    • 3) algorithm
    • 4) length of key
  9. Boundary protection and security mechanism - firewall
  10. database model - networked

    Heirarchical data model

    distrubuted data model

    relational data model
    networked - all types of data models connected

    Heirarchical data model - one to many relationships

    distrubuted data model - many many relationships

    relational data model - one to one relatiohsips
  11. Jurisdiction of computer crimes
    - FBI and Secret Service
  12. Referential integrity mechanism

    Semantic Integrity Rules

    Transaction Management

    • Referential integrity mechanism - every tuple has a primary
    • key and that every primary key is related to an existing record

    • Semantic Integrity Rules - all structural and semantics
    • rules of database are not violated

    • Transaction Management - concurrent transactions can be
    • processed without encountering problems

    • Concurrency - database information is always correct and
    • uses the lock feature to protect cells during editing
  13. Common backup tape management systems
    • six-cartridge weekly backup principle
    • Tower of Hanoi
    • Grandfather, father son
  14. STATE of CPU
    • STATE of CPU
    • – Problem, Supervisor, User
  15. Which RAID level provides data mirroring?
    LEVEL 1
  16. Most effective implementation of encryption in hardware
    Symmetric stream
  17. a product that will utilize an algorithm such as AES which would be the strongest
    mode to select for default product operation?
    • the best mode to select for a product would be CTR. Failure to randomize the nonce, and
    • preventing nonce reuse will decrease the security of CTR mode.
  18. (ISO 15408)
    – EAL 7 –

    The Common Criteria (ISO 15408)
    indicates that a system has been formally verified, designed and tested

    • The Common Criteria (ISO 15408) - Establishing a common evaluation basis to be used
    • internationally to measure overall product security
  19. Data hiding is a required TCSEC criterion of module development for systems beginning at what criterion level?
  20. The most common forms of asymmetric key cryptography include -
  21. designed and optimized for use with a 32 bit microprocessor
  22. A security association - uniquely identified by a triple consisting of a
    • 1) Security Parameter Index (SPI),
    • 2) IP Destination Address
    • 3) security protocol (AH or ESP) identifier.
  23. IPSEC
    • access control
    • connectionless integrity
    • data origin authentication
    • session hi-jacking analysis
    • confidentiality
    • and limited traffic flow confidentiality
  24. To Prove Negligence:
    • A failure to perform a legally recognized obligation
    • An injury (financial or otherwise) must have occurred
    • Proximate causation must exist
  25. CHAP - Challenge Handshake Authentication Protocol (CHAP)
    protects a password from eavesdroppers and supports the encryption of communication
  26. Which of the following defines a disk drive
    system with 39 disks: 32
    disks of user storage and seven disks of error recovery coding?
    RAID 2
  27. Polyinstantiation
    • hide data from unauthorized users by allowing a
    • relation in a database to contain multiple tuples with the same primary
    • keys with each instance distinguished by a security level?
  28. Bell-LaPadula - Does not include data integrity
  29. Categories of Access Control:
    Deterrent, Preventative, detective, corrective, compensating, and recovery
  30. Three types of Access Control:
    Administrtive, Physical, Technical
  31. Fundamental disadvantage of biometrics:
    Revoking Credentials
  32. Disaster is not over until ...
    Critical business systems are recovered at the recovery site
  33. First step of BIA
    Understand your business
  34. Fiber optics are immune to wiretaps
Card Set
CISSP - Practice
CISSP Topics to learn after practice questions