CISSP Practice question #205

What is the relationship between plaintext and ciphertext is called?
A: Confusion.
B: Diffusion.
C: Substition.
D: Permutation.

CBK 3: Security Engineering
Source: ThorTeaches.com practice tests – https://www.udemy.com/user/thorpedersen/

Answer


A: Confusion is the relationship between the plaintext and ciphertext; it should be as random (confusing) as possible.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #204

Prior to us deploying honeypots and honeynets who should sign off on the deployment?
A: Our HR and payroll team.
B: Senior management.
C: The engineer deploying it.
D: A judge.

CBK 1: Security and Risk Management
Source: ThorTeaches.com practice tests – https://www.udemy.com/user/thorpedersen/

Answer


B: Get approval from senior management and your legal department before deploying honeypots or honey nets, legal would know the legal ramifications and senior management are ultimately liable. Both can pose legal and practical risks.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #203

We have implemented different types of anti-virus throughout our organization. Which type of anti-virus can produce a lot of false positives?
A: Heuristic.
B: Signature.
C: Formal.
D: Embedded.

CBK 3: Security Engineering
Source: ThorTeaches.com practice tests – https://www.udemy.com/user/thorpedersen/

Answer


A: Antivirus Software – tries to protect us against malware. Heuristic (Behavioral) based – looks for abnormal behavior – can result in a lot of false positives.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #202

Which of these protocols is the most commonly used for remote management of routers and switches?
A: Kerberos.
B: RADIUS.
C: DIAMETER.
D: LDAP.

CBK 5: Identity and Access Management
Source: ThorTeaches.com practice tests – https://www.udemy.com/user/thorpedersen/

Answer


B: RADIUS (Remote Authentication Dial-In User Service): A networking protocol that provides centralized Authentication, Authorization, and Accounting management for users who connect and use a network service. Widely used by ISP’s (Internet service providers) and large organizations to manage access to IP networks, AP’s, VPN’s, Servers, 802.1x, … Uses a client/server protocol that runs in the application layer, and can use either TCP or UDP as transport. Network access servers, the gateways that control access to a network, usually contain a RADIUS client component that communicates with the RADIUS server. Use UDP ports 1812 for authentication and 1813 for accounting, can use TCP as the transport layer with TLS for security.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #201

Which subplan would we look at in our Business Continuity Plan (BCP) for dealing with the press and alerting employees about disasters?
A: COOP.
B: CCP.
C: OEP.
D: CIRP.

CBK 7: Security Operations
Source: ThorTeaches.com practice tests – https://www.udemy.com/user/thorpedersen/

Answer


B: Crisis Communications Plan: A subplan of the CMP. How we communicate internally and externally during a disaster. Who is permitted to talk to the press? Who is allowed to communicate what to whom internally?

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

Cybersecurity Tech Accord

The Cybersecurity Tech Accord is a public commitment among 34 global companies to protect and empower civilians online and to improve the security, stability and resilience of cyberspace.

Signing pledge to fight cyberattacks, 34 leading companies promise equal protection for customers worldwide

Companies across every layer of internet communication vow to defend against misuse of their technology; promise to protect all customers regardless of nationality, geography or attack motivation.

REDMOND, Wash. — April 17, 2018 — On Tuesday, 34 global technology and security companies signed a Cybersecurity Tech Accord, a watershed agreement among the largest-ever group of companies agreeing to defend all customers everywhere from malicious attacks by cybercriminal enterprises and nation-states. The 34 companies include ABB, Arm, Cisco, Facebook, HP, HPE, Microsoft, Nokia, Oracle, and Trend Micro, and together represent operators of technologies that power the world’s internet communication and information infrastructure.

“The devastating attacks from the past year demonstrate that cybersecurity is not just about what any single company can do but also about what we can all do together.” said Microsoft President Brad Smith. “This tech sector accord will help us take a principled path towards more effective steps to work together and defend customers around the world.”

The companies made commitments in four areas.

Stronger defense
The companies will mount a stronger defense against cyberattacks. As part of this, recognizing that everyone deserves protection, the companies pledged to protect all customers globally regardless of the motivation for attacks online.

No offense
The companies will not help governments launch cyberattacks against innocent citizens and enterprises, and will protect against tampering or exploitation of their products and services through every stage of technology development, design and distribution.

Capacity building
The companies will do more to empower developers and the people and businesses that use their technology, helping them improve their capacity for protecting themselves. This may include joint work on new security practices and new features the companies can deploy in their individual products and services.

Collective action
The companies will build on existing relationships and together establish new formal and informal partnerships with industry, civil society and security researchers to improve technical collaboration, coordinate vulnerability disclosures, share threats and minimize the potential for malicious code to be introduced into cyberspace.

The companies may have adhered to some or all of these principles prior to the accord, or may have adhered without a public commitment but this agreement represents a public shared commitment to collaborate on cybersecurity efforts. The Tech Accord remains open to consideration of new private sector signatories, large or small and regardless of sector, who are trusted, have high cybersecurity standards and will adhere unreservedly to the Accord’s principles.

“The real world consequences of cyber threats have been repeatedly proven. As an industry, we must band together to fight cybercriminals and stop future attacks from causing even more damage,” said Kevin Simzer, Chief Operating Officer, Trend Micro.

The victims of cyberattacks are businesses and organizations of all sizes, with economic losses expected to reach $8 trillion by 2022.* Recent cyberattacks have caused small businesses to shutter their doors, hospitals to delay surgeries and governments to halt services, among other disruptions and safety risks.

The Tech Accord will help to protect the integrity of the one trillion connected devices we expect to see deployed within the next 20 years,” said Carolyn Herzog, General Counsel, Arm. “It aligns the resources, expertise and thinking of some of the world’s most important technology companies to help to build a trusted foundation for technology users who will benefit immensely from a more security connected world.”

Companies that signed the accord plan to hold their first meeting during the security-focused RSA Conference taking place in San Francisco, and will focus on capacity building and collective action. Future actions may include jointly developed guidelines or broadly deployed features, as well as information sharing and partnering to combat specific threats to make the online world a safer place for people and businesses everywhere — and uphold the promise and benefit technology offers society.

 


* Losses are cumulative over five year, 2017 – 2022. James Moar; Juniper Research: The Future of Cybercrime & Security: Enterprise Threats & Mitigation 2017-2022 (April 25, 2017); https://www.juniperresearch.com/researchstore/innovation-disruption/cybercrime-security/enterprise-threats-mitigation

https://cybertechaccord.org/

 

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

Polyverse raises $2 million to stop cyberattackers in their tracks

Alexander Gounares
Alexander Gounares

A Seattle area startup by the name of Polyverse believes it has developed new technology to stop cyberattackers in their tracks, and it has raised $2 million in fresh funding to protect organizations’ server and cloud applications from end-to-end.

The funding follows a $1 million round last summer. Polyverse is led by Alex Gounares, who previously served as CTO of AOL and corporate vice president at Microsoft. Prior to starting Polyverse, Gounares was CEO of Concurix Corporation, which he sold earlier this year to San Mateo, Calif.-based Strongloop in a deal of undisclosed size.

Kirkland-based Polyverse uses what it calls “moving target defense” to prevent cyberattacks, storing data in an array of containers instead of storing millions of records in a few databases. The company claims this system “completely undermines the economics of cybercrime,” making it so “cyberthieves must endlessly rethink their attack strategies.”

Polyverse also says the the technology — which integrates with existing hardware and software systems — self heals, creating new containers in a method that’s similar to wiping a hard disk.

Containers are continuously created from last known good state and put into use servicing requests,” the company writes in a white paper. “After a brief time (typically five seconds), containers are then garbage collected. Any malware that may have been inserted is thus automatically removed. Among other advantages, this makes it far more difficult for cyberattackers to execute advanced-persistent-threat (APT) attacks.

SpringRock Ventures led the round, with SpringRock’s Kirsten Morbeck noting in a release that “Polyverse has an exceptional team building on a paradigm shift in cybersecurity.” Polyverse employs just under 20 people.

Source: www.geekwire.com/2016/polyverse-raises-2-million-stop-cyberattackers-tracks/

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #200

We are implementing governance standard and control frameworks focused on internal risk analysis. What should we implement?
A: COBIT.
B: ITIL.
C: COSO.
D: FRAP

CBK 1: Security and Risk Management
Source: ThorTeaches.com practice tests

Answer


D: FRAP (Facilitated Risk Analysis Process) analyses one business unit, application or system at a time in a roundtable brainstorm with internal employees. Impact analyzed, Threats and Risks Prioritized.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #199

Which of these are not considered useful in authentication?
A: Something you are.
B: Something you know.
C: Something you believe.
D: Something you have.

CBK 1: Security and Risk Management
Source: ThorTeaches.com practice tests

Answer


C: Something you know – Type 1 Authentication (passwords, pass phrase, PIN etc.). Something you have – Type 2 Authentication (ID, Passport, Smart Card, Token, cookie on PC etc.). Something you are – Type 3 Authentication (and Biometrics) (Fingerprint, Iris Scan, Facial geometry etc.). Somewhere you are – Type 4 Authentication (IP/MAC Address). Something you do – Type 5 Authentication (Signature, Pattern unlock).

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #198

Rearranging the plaintext is called?
A: Confusion.
B: Diffusion.
C: Substitution
D: Permutation.

CBK 3: Security Engineering
Source: ThorTeaches.com practice tests

Answer


D: Permutation (transposition) provides confusion by rearranging the characters of the plaintext.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading
1 2 3 34