Give us your feedback!
Question:
Match the following terms and definitions
Response:
Intended to discourage a potential attacker
Deterrent
Intended to avoid an incident from happening
Preventive
Fixes component or systems after an incident has occurred
Recovery
Intended to bring the environment back to production levels
Corrective
Identify an incidents activities
Detective
Alternate measures of control
Compensating
Clark-Wilson focuses primarily on:
Address Integrity
Accessibility
Availability
Confidentialty
Authentication
More key terms from Chapter 2
Weakness or lack of a countermeasure
Vulnerability
Entity that can exploit a vulnerability
Threat agent
The danger of having a vulnerability exploited
Threat
The probability of a threat being realized
Risk
Presence of a vulnerability which exposes the organization
Exposure
Match the following cryptology tools and technologies
One-time pads
Manual
Still in use in some instances. Recall, one-time pads are the most secure approach
Enigma machine
Electro-mechanical
Electrical lights, mechanical crank/spinwheel
AES, RSA Algorithms
Electronic
I know, you wanted to think "digital" but technically, electronic works as well
Cipherdisks
Mechanical
Think ceasar's spin wheel here
Single photon emissions
Quantum cryptography
used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night
Determining whether a subject can log into a system is an example of
Authorization
Accountability
Match the following terms to definitions
Training, configuration management of documentation, risk management
Administrative controls
Firewalls, IDS, encryption
Technical controls
Lighting, Fencing, guard patrols
Physical Controls
Which of the following is immediately above the Data Link Layer in the OSI model:
Transport
Network
Presentation
Datalink
Session
Bell-La Padula focuses primarily on:
Data Integrity
Which of the following is NOT an example of biometric identification?
Ear shape/pattern
Voice
Hand shape/pattern
Retinal imagery
Which of the following packet switched networks is best suited to support fully meshed VPNs?
SMDS
Frame Relay
MPLS
ATM
SONET
A WAN is
the Westinghouse Address Naming convention
one of the Wilson-Adder Need types
a Wide Area Network
a Working Authentication Name
a Wide Array Node
Which of the following have the best CER?
Badge Scanning
Hand scanning
Finger scanning
Iris Scanning
Which OSI layer includes the LLC and MAC sub-layers?
Data Link
Physical
"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as
Rijndael's Challenge
Diffe-Hillman's Axiom
Kerckhoff's Principle
Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.
Moore's Law
Which of the following is NOT a RAW authentication protocol?
EAP
LDAP
CHAP
PAP