100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CISSP Flash Cards, Questions and answers, rated A+ $12.49   Add to cart

Exam (elaborations)

CISSP Flash Cards, Questions and answers, rated A+

 9 views  0 purchase
  • Course
  • Institution

CISSP Flash Cards, Questions and answers, rated A+ What are the three encryption algorithms supported by the Digital Signature Standard? - -DSA, RSA, and ECDSA What ITU standard describes the contents of a digital certificate? - -X.509 What is the process by which you are issued a digit...

[Show more]

Preview 3 out of 27  pages

  • February 21, 2023
  • 27
  • 2022/2023
  • Exam (elaborations)
  • Questions & answers
avatar-seller
CISSP Flash Cards, Questions and
answers, rated A+

What are the three encryption algorithms supported by the Digital Signature Standard? - ✔✔-DSA, RSA,
and ECDSA



What ITU standard describes the contents of a digital certificate? - ✔✔-X.509



What is the process by which you are issued a digital certificate? - ✔✔-Enrollment



True or false? PEM provides protection against replay attacks. - ✔✔-False



What protocol uses the RSA encryption algorithm to provide encrypted mail support for a number of
common commercial email packages? - ✔✔-S/MIME



True or false? S-HTTP secures individual messages between a client and a server. - ✔✔-True



What cryptographic methods are used by the Secure Electronic Transaction (SET) protocol? - ✔✔-RSA
public key cryptography and DES private key cryptography in connection with digital certificates



What are the four components of IPsec? - ✔✔-Authentication Header (AH), Encapsulating Security
Payload (ESP), IP Payload Compression protocol (IPComp), and Internet Key Exchange (IKE)



What are some common reasons a certificate might need to be revoked? - ✔✔-The certificate was
compromised, the certificate was erroneously issued, the certificate details changed, the private key
was exposed, or there was a change of security association.



What technology allows multiple users to make use of the same process without interfering with each
other? - ✔✔-Multithreading

,What are some of the terms used to describe the CPU mode that gives access to the full range of
supported instructions? - ✔✔-System mode, privileged mode, supervisory mode, and kernel mode



What is the greatest security risk to RAM modules? - ✔✔-theft



What addressing scheme supplies the CPU with the actual address of the memory location to be
accessed? - ✔✔-Direct addressing



Magnetic/optical media devices are classified as what type of memory? - ✔✔-Secondary



Memory devices designed to retain their data when power is removed are known as
___________________. - ✔✔-nonvolatile



What two ways can storage devices be accessed? - ✔✔-Randomly and sequentially



What is another term often used for firmware? - ✔✔-Microcode



Where are the operating system-independent primitive instructions that a computer needs to start and
load the operating system stored? - ✔✔-BIOS or UEFI



What concept ensures that data existing at one level of security is not visible to processes running at
different security levels? - ✔✔-data hiding



What are the important factors in personnel management? - ✔✔-Hiring practices, ongoing job
performance reviews, and termination procedures



Why is antivirus protection important? - ✔✔-Viruses are the most common form of security breach in
the IT world. Any communications pathway can and is being exploited as a delivery mechanism for a
virus or other malicious code.

, What is need to know? - ✔✔-Need to know is the requirement to have access to, knowledge of, or
possession of data or a resource in order to perform specific work tasks.



What are due care and due diligence? - ✔✔-Due care is using reasonable care to protect the interest of
an organization. Due diligence is practicing the activities that maintain the due care effort.



How are security and illegal activities related? - ✔✔-A secure environment should provide mechanisms
to prevent the committal of illegal activities, which are actions that violate a legal restriction, regulation,
or requirement.



With what level of security precautions should backup media be treated? - ✔✔-Backup media should be
handled with the same security precautions as any other asset with the same data classification.



What are the goals of managing backup media? - ✔✔-Preventing disclosure, destruction, or alteration of
data



What are the processes that can be applied to used media in order to prepare the media for reuse in
various environments? - ✔✔-Erasing, clearing, and overwriting media that will be used in the same
classification environments; purging, sanitizing, and degaussing if media is used in different classification
environments



What are the classifications of security control types? - ✔✔-Preventive, deterrent, detective, corrective,
recovery, compensation, directive



What is the purpose of auditing? - ✔✔-To ensure compliance with security policy and to detect
abnormalities, unauthorized occurrences, or outright crimes



What types of activities are labeled as auditing? - ✔✔-Recording of event/occurrence data, examination
of data, data reduction, use of event/occurrence alarm triggers, log analysis, logging, monitoring, using
alerts, intrusion detection



What is the purpose of compliance testing? - ✔✔-To ensure that all of the necessary and required
elements of a security solution are properly deployed and functioning as expected

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller QuickPass. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79271 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling

Recently viewed by you


$12.49
  • (0)
  Add to cart