It’s not long now until the CISSP Flashcards iOS app is officially launched and I thought that while you wait you would like to try your hand at some Q&As based on some of the selected flashcards, if you want to be notified of the launch and take advantage of a special launch day price to unlock all 550+ flashcards in the iOS app be sure to leave your email address below!
[a] The likelihood that a threat will cause harm to an asset – the combination of a threat and a vulnerability.
[q] What does DREAD stand for?
[a] Damage potential, Reproducibility, Exploitability (how hard is the attack to perform), Affected users (as percentage of total users), Discoverability.
[q] What does MTD stand for?
[a] Maximum Tolerable Downtime.
[q] What act legislated the ‘prudent man rule’ in terms of information security?
[a] Federal Sentencing Guidelines.
[q] Which role has the responsibility of providing users access to a system?
[q] What is Kerchoff’s principle?
[a] That a system ought to be secure even if it’s details/formula are known.
[q] What is the formula to work out the number of keys required for n people using symmetric key cryptography?
[a] K = n*(n-1)/2
[q] What are the ranges of private IP addresses?
[a] 10.0.0.0-10.255.255.255, 172.16.0.0-172.31.255.255, 192.168.0.0-192.168.255.255
[q] What are polymorphic viruses?
[a] Modify themselves to in order to generate different signatures.
[q] What do the letters in ACID relate to in terms of databases/integrity?
[a] Atomicity – transactions are ‘all or nothing’ and can be rolled back, Consistency – transactions begin/end with the database in a consistent state, Isolation – transactions must not overlap, Durability – transactions are preserved (through logs)
[x] Exit text
(enter text or “Add Media”; double-click to format)
I hope you enjoyed these sample cards, if you’re interested in getting notified of the CISSP Flashcards iOS app launch to take advantage of the special launch price leave your email address below!