CISSP Flash Cards, Questions and answers, rated A+
9 views 0 purchase
Module
CISSP
Institution
CISSP
CISSP Flash Cards, Questions and answers, rated A+
What are the three encryption algorithms supported by the Digital Signature Standard? - -DSA, RSA, and ECDSA
What ITU standard describes the contents of a digital certificate? - -X.509
What is the process by which you are issued a digit...
rated a what are the three encryption algorithms supported by the digital signature standard dsa
and ecdsa what itu standard describes the cont
Written for
CISSP
All documents for this subject (308)
Seller
Follow
QuickPass
Reviews received
Content preview
CISSP Flash Cards, Questions and
answers, rated A+
What are the three encryption algorithms supported by the Digital Signature Standard? - ✔✔-DSA, RSA,
and ECDSA
What ITU standard describes the contents of a digital certificate? - ✔✔-X.509
What is the process by which you are issued a digital certificate? - ✔✔-Enrollment
True or false? PEM provides protection against replay attacks. - ✔✔-False
What protocol uses the RSA encryption algorithm to provide encrypted mail support for a number of
common commercial email packages? - ✔✔-S/MIME
True or false? S-HTTP secures individual messages between a client and a server. - ✔✔-True
What cryptographic methods are used by the Secure Electronic Transaction (SET) protocol? - ✔✔-RSA
public key cryptography and DES private key cryptography in connection with digital certificates
What are the four components of IPsec? - ✔✔-Authentication Header (AH), Encapsulating Security
Payload (ESP), IP Payload Compression protocol (IPComp), and Internet Key Exchange (IKE)
What are some common reasons a certificate might need to be revoked? - ✔✔-The certificate was
compromised, the certificate was erroneously issued, the certificate details changed, the private key
was exposed, or there was a change of security association.
What technology allows multiple users to make use of the same process without interfering with each
other? - ✔✔-Multithreading
,What are some of the terms used to describe the CPU mode that gives access to the full range of
supported instructions? - ✔✔-System mode, privileged mode, supervisory mode, and kernel mode
What is the greatest security risk to RAM modules? - ✔✔-theft
What addressing scheme supplies the CPU with the actual address of the memory location to be
accessed? - ✔✔-Direct addressing
Magnetic/optical media devices are classified as what type of memory? - ✔✔-Secondary
Memory devices designed to retain their data when power is removed are known as
___________________. - ✔✔-nonvolatile
What two ways can storage devices be accessed? - ✔✔-Randomly and sequentially
What is another term often used for firmware? - ✔✔-Microcode
Where are the operating system-independent primitive instructions that a computer needs to start and
load the operating system stored? - ✔✔-BIOS or UEFI
What concept ensures that data existing at one level of security is not visible to processes running at
different security levels? - ✔✔-data hiding
What are the important factors in personnel management? - ✔✔-Hiring practices, ongoing job
performance reviews, and termination procedures
Why is antivirus protection important? - ✔✔-Viruses are the most common form of security breach in
the IT world. Any communications pathway can and is being exploited as a delivery mechanism for a
virus or other malicious code.
, What is need to know? - ✔✔-Need to know is the requirement to have access to, knowledge of, or
possession of data or a resource in order to perform specific work tasks.
What are due care and due diligence? - ✔✔-Due care is using reasonable care to protect the interest of
an organization. Due diligence is practicing the activities that maintain the due care effort.
How are security and illegal activities related? - ✔✔-A secure environment should provide mechanisms
to prevent the committal of illegal activities, which are actions that violate a legal restriction, regulation,
or requirement.
With what level of security precautions should backup media be treated? - ✔✔-Backup media should be
handled with the same security precautions as any other asset with the same data classification.
What are the goals of managing backup media? - ✔✔-Preventing disclosure, destruction, or alteration of
data
What are the processes that can be applied to used media in order to prepare the media for reuse in
various environments? - ✔✔-Erasing, clearing, and overwriting media that will be used in the same
classification environments; purging, sanitizing, and degaussing if media is used in different classification
environments
What are the classifications of security control types? - ✔✔-Preventive, deterrent, detective, corrective,
recovery, compensation, directive
What is the purpose of auditing? - ✔✔-To ensure compliance with security policy and to detect
abnormalities, unauthorized occurrences, or outright crimes
What types of activities are labeled as auditing? - ✔✔-Recording of event/occurrence data, examination
of data, data reduction, use of event/occurrence alarm triggers, log analysis, logging, monitoring, using
alerts, intrusion detection
What is the purpose of compliance testing? - ✔✔-To ensure that all of the necessary and required
elements of a security solution are properly deployed and functioning as expected
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller QuickPass. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £10.19. You're not tied to anything after your purchase.