CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

466 Diffie-Hellman – egress filtering


documentation, 12
chain of custody, 75
lessons learned, 392
postmortem review, 173
DoS (denial of service) attacks, 7, 12, 99,
161, 277, 322, 350, 388, 407, 437, 450
DOT (Department of Transportation), 333
downgrading media, 331
driver’s license numbers, category, 34
DRM (digital rights management), 333, 347
dry pipe system, 451
DSA (Digital Signature Algorithm), 339
DSL, 95, 213, 354
DSS (Digital Signature Standard), 339
DSSS (Direct Sequence Spread Spectrum),
81, 348
due care principle, 319, 410, 447
due diligence principle, 319, 410
durability, 397, 403, 406, 447
duress, 263, 392, 433
dynamic analysis, 439
dynamic packet filtering firewalls, 405
dynamic testing, 394, 432
DynamoDB database, 189

E
EAL1 evaluation assurance level, 61, 341
EAL2 evaluation assurance level, 220
EAL7 evaluation assurance level, 255, 430
EAP (Extensible Authentication Protocol),
255, 352, 431
authentication, 100
eavesdropping attacks, 141, 450
ECB (Electronic Codebook), 405
ECDSA (Elliptic Curve DSA), 339
ECE (ECN-Echo), 434
e-commerce, 118, 144, 211
Economic Espionage Act, 319
ECPA (Electronic Communications Privacy
Act), 435
EFS (Encrypting File System), 332
egress filtering, 207, 234, 389

Diffie-Hellman, 340
digital certificates, 67, 74, 75, 269, 346, 436
digital information, modulation, 99
digital signatures, 53, 56, 252, 340, 344,
419
encryption algorithms, 71
FIPS Digital Signature Standard, 53
nonrepudiation and, 428, 429
digital watermarks. See watermarks
direct evidence, 390
directional antennas, 433
directive access controls, 413, 445
directory indexing, 417
dirty reads, 398, 403
DISA (Direct Inward System Access), 89, 351
disaster recovery, 163, 232, 247, 389, 411,
426
completion, 164 –165
down time, 162
facility, 313
goals, 387
manmade disasters, 160
planning, 157
reviews, 268
test types, 311, 456
testing, 157, 168, 215
time, 218
types, 310
discovery phase, 150, 242, 374, 392, 418
discretionary access control, 426
disk drives, disposal, 173
disk mirroring, 169, 241
disposition, 38
distance-vector protocol, 84, 349
DKIM (Domain Keys Identified Mail), 358
DLL (Data Link Layer), 308, 454
DLP (data loss prevention), 30, 329, 331,
337, 391, 417
DMCA (Digital Millennium Copyright Act),
2, 219, 318, 413, 423, 441
DMZ, firewall architecture and, 95, 98
DNP3 protocol, 350
DNS (Domain Name System), 446
DNS poisoning, 349
Free download pdf