CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

462 baseline – CALEA (Communications Assistance to Law Enforcement)


encryption and, 356
scanning, 136
botnets, 168, 207, 393
attacks and, 176
identifying, 154
IoT (Internet of Things), 440
social media and, 382
Brewer-Nash model, 338
broadband, 354, 410
broadcast storms, 96
brute-force attacks, 105, 277–278, 360, 362,
406, 427
buffer overflow attacks, 61, 179, 372, 398
Burp Suite, 144, 377
bus topology, 357
business continuity planning, 4, 5, 11, 222,
244, 268, 304, 322, 427
actions, 15
approval, 15
goals, 443
refresher training, 248
senior managers and, 9
stakeholders, 17
training, 12, 263, 433
business continuity tasks, 12
business impact analysis, 6, 22, 320, 414
business logic errors, 301, 441
BYOD policy, 232

C
CA (certificate authority), 269
CaaS (computing as a service), 53, 338
cable modems, 95, 213, 354
cabling, 268, 305, 357, 436
1000BaseT network, 86
Category 3 UDP, 101
Ethernet, 222
fiber-optic, 453
length, 298
Caesar cipher, 63, 342
CALEA (Communications Assistance to
Law Enforcement), 324

differential, 158, 295, 447, 448
full, 158, 448
incremental, 263, 295, 448
logs, 141
restores and, 131
tapes, 36, 49, 157, 337
baseline, 32, 45, 322, 327, 328, 332, 389,
423, 448
BCP process, 282
bcrypt, 41, 334
Bell-LaPadula model, 58, 71, 77, 225, 240,
345, 347, 422, 455
benchmarks, CIS (Center for Internet
Security), 31
processes, 32
BGP (Border Gateway Protocol), 270, 437
BIA (business impact analysis), 319
Biba integrity model, 54, 60, 71, 72, 77, 109,
345, 347, 360
binary keyspaces, 340, 407, 423
biometric authentication, 122, 211,
288, 364
errors, 115
FA Rs, 111, 272
fingerprints, 318
FR Rs, 111
iris scans, 281, 442
palm scans, 368
reference profiles, 362
retina scans, 108
stored samples, 111
usability, 362
user acceptance, 112
BitLocker, 33, 35, 332
black box testing, 143, 182, 188, 208, 370,
371, 396, 399, 400, 408
blacklisting, 344, 392, 420, 433
Blowfish, 334, 344
blue box testing, 182, 188, 399, 400
Blue Screen of Death, 393
bluesnarfing attacks, 91, 352
Bluetooth
active scans, 373
best practices, 98
Free download pdf