CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

478 RADIUS (Remote Access Dial In User Service) – risk


relational databases, 205, 401
permanence, 292
release control, 454
remediation, 139
Remediation phase, incident handling, 443
remnant data, 426
remote access, screen scraping, 85
remote journaling, 438
remote systems, ping, 90
remote wipe tools, 455
repeaters, 350
replay attacks, 2, 318, 412
reporting phase, 425
repudiation threats, 321
Request for Proposal, 401
Request for Protocol, 130
Requesting Authority, 221
residual bytes, 328
residual data, 247
resource-based access controls, 109, 361
response, 15
RESTful API, 199
restores from backups, 131
restricted interfaces, 104
retail sales, 236, 265
retention, 48
retina scans, 108, 360
RFID (Radio Frequency IDentification), 386
right to be forgotten, 318
right to erasure, 318
rights, 261, 434
Rijndael block cipher, 457
ring protection model, 63, 267, 296–297
ring topology, 92, 349
RIP (Routing Information Protocol), 270,
355, 437
OSI model and, 96
risk, 323, 325, 440
data at rest, 32–33
determining, formula, 13
formula, 13
threat and, 453
threat modeling, 3
transferring, 327, 441
vulnerability and, 453

RADIUS (Remote Access Dial In User
Service), 124, 349, 360
Cisco network, 235
encryption, 119
monitoring, 109
RAID (Redundant Array of Independent
Disks), 5, 320, 322
disk mirroring, 169, 241, 404
disk striping with parity, 222
disks, 214
disks required, 171
level 1, 389
level 5, 319
rainbow table attacks, 56, 105, 211, 363,
409, 424
RAM (random access memory), 41, 417
ransomware, 194–195, 320, 402
RARP (Reverse Address Resolution
Protocol), 86, 350
RBAC (rule-based access control) system,
449
RDBMS, 193
RDNs (relative distinguished names),
124
read permissions, 204
Ready state, 341, 438
record retention, 48, 332, 337, 443, 449
recovery, 153, 163, 280
automated, 452
databases, 164
manual, 381
trusted recovery process, 303
reduction analysis, 325
referential integrity, 394
database keys, 180
registration, 364, 424, 435
regression testing, 142, 373, 376, 395, 399,
400, 439
regulations, 3–4, 16, 21
Computer Security Act of 1987, 13
intellectual property, 5, 10
investigations, 152
privacy rights, 11
trademarks, 8
regulatory investigations, 381
Free download pdf