|
(ISC)2® CISSP® Certified Information Systems Security Professional Official Study Guide |
|
|
Introduction |
|
xxxvii | |
Assessment Test |
|
lix | |
|
Chapter 1 Security Governance Through Principles And Policies |
|
|
1 | (42) |
|
|
3 | (1) |
|
Understand and Apply Security Concepts |
|
|
4 | (9) |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
7 | (1) |
|
DAD, Overprotection, Authenticity, Non-repudiation, and AAA Services |
|
|
7 | (4) |
|
|
11 | (2) |
|
|
13 | (1) |
|
Evaluate and Apply Security Governance Principles |
|
|
14 | (2) |
|
|
15 | (1) |
|
|
15 | (1) |
|
Manage the Security Function |
|
|
16 | (7) |
|
Alignment of Security Function to Business Strategy, Goals, Mission, and Objectives |
|
|
17 | (2) |
|
|
19 | (2) |
|
Organizational Roles and Responsibilities |
|
|
21 | (1) |
|
Security Control Frameworks |
|
|
22 | (1) |
|
Due Diligence and Due Care |
|
|
23 | (1) |
|
Security Policy, Standards, Procedures, and Guidelines |
|
|
23 | (3) |
|
|
24 | (1) |
|
Security Standards, Baselines, and Guidelines |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
26 | (5) |
|
|
26 | (2) |
|
Determining and Diagramming Potential Attacks |
|
|
28 | (1) |
|
Performing Reduction Analysis |
|
|
28 | (2) |
|
Prioritization and Response |
|
|
30 | (1) |
|
Supply Chain Risk Management |
|
|
31 | (2) |
|
|
33 | (1) |
|
|
33 | (3) |
|
|
36 | (1) |
|
|
37 | (6) |
|
Chapter 2 Personnel Security And Risk Management Concepts |
|
|
43 | (70) |
|
Personnel Security Policies and Procedures |
|
|
45 | (10) |
|
Job Descriptions and Responsibilities |
|
|
45 | (1) |
|
Candidate Screening and Hiring |
|
|
46 | (1) |
|
Onboarding: Employment Agreements and Policies |
|
|
47 | (1) |
|
|
48 | (1) |
|
Offboarding, Transfers, and Termination Processes |
|
|
49 | (3) |
|
Vendor, Consultant, and Contractor Agreements and Controls |
|
|
52 | (1) |
|
Compliance Policy Requirements |
|
|
53 | (1) |
|
Privacy Policy Requirements |
|
|
54 | (1) |
|
Understand and Apply Risk Management Concepts |
|
|
55 | (26) |
|
Risk Terminology and Concepts |
|
|
56 | (2) |
|
|
58 | (2) |
|
Identify Threats and Vulnerabilities |
|
|
60 | (1) |
|
|
60 | (6) |
|
|
66 | (3) |
|
Cost vs. Benefit of Security Controls |
|
|
69 | (3) |
|
Countermeasure Selection and Implementation |
|
|
72 | (2) |
|
Applicable Types of Controls |
|
|
74 | (2) |
|
Security Control Assessment |
|
|
76 | (1) |
|
Monitoring and Measurement |
|
|
76 | (1) |
|
Risk Reporting and Documentation |
|
|
77 | (1) |
|
|
77 | (2) |
|
|
79 | (2) |
|
|
81 | (15) |
|
Social Engineering Principles |
|
|
83 | (2) |
|
|
85 | (1) |
|
|
85 | (1) |
|
|
85 | (2) |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
90 | (1) |
|
Impersonation and Masquerading |
|
|
91 | (1) |
|
Tailgating and Piggybacking |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
93 | (1) |
|
|
94 | (1) |
|
|
94 | (2) |
|
Establish and Maintain a Security Awareness, Education, and Training Program |
|
|
96 | (4) |
|
|
97 | (1) |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
98 | (1) |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
101 | (5) |
|
|
106 | (1) |
|
|
107 | (6) |
|
Chapter 3 Business Continuity Planning |
|
|
113 | (30) |
|
Planning for Business Continuity |
|
|
114 | (1) |
|
Project Scope and Planning |
|
|
115 | (6) |
|
|
116 | (1) |
|
|
117 | (2) |
|
|
119 | (1) |
|
Legal and Regulatory Requirements |
|
|
120 | (1) |
|
|
121 | (7) |
|
|
122 | (1) |
|
|
123 | (2) |
|
|
125 | (1) |
|
|
126 | (2) |
|
|
128 | (1) |
|
|
128 | (3) |
|
|
129 | (1) |
|
|
129 | (2) |
|
Plan Approval and Implementation |
|
|
131 | (5) |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
132 | (1) |
|
|
132 | (4) |
|
|
136 | (1) |
|
|
137 | (1) |
|
|
138 | (1) |
|
|
139 | (4) |
|
Chapter 4 Laws, Regulations, And Compliance |
|
|
143 | (36) |
|
|
144 | (3) |
|
|
144 | (2) |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
147 | (21) |
|
|
147 | (5) |
|
Intellectual Property (IP) |
|
|
152 | (6) |
|
|
158 | (1) |
|
|
158 | (2) |
|
|
160 | (8) |
|
|
168 | (1) |
|
|
169 | (2) |
|
Contracting and Procurement |
|
|
171 | (1) |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
174 | (5) |
|
Chapter 5 Protecting Security Of Assets |
|
|
179 | (40) |
|
Identifying and Classifying Information and Assets |
|
|
180 | (8) |
|
|
180 | (2) |
|
Defining Data Classifications |
|
|
182 | (3) |
|
Defining Asset Classifications |
|
|
185 | (1) |
|
Understanding Data States |
|
|
185 | (1) |
|
Determining Compliance Requirements |
|
|
186 | (1) |
|
Determining Data Security Controls |
|
|
186 | (2) |
|
Establishing Information and Asset Handling Requirements |
|
|
188 | (11) |
|
|
189 | (1) |
|
|
189 | (1) |
|
Marking Sensitive Data and Assets |
|
|
190 | (2) |
|
Handling Sensitive Information and Assets |
|
|
192 | (1) |
|
Data Collection Limitation |
|
|
192 | (1) |
|
|
193 | (1) |
|
|
193 | (1) |
|
|
194 | (3) |
|
Ensuring Appropriate Data and Asset Retention |
|
|
197 | (2) |
|
|
199 | (5) |
|
Digital Rights Management |
|
|
199 | (1) |
|
Cloud Access Security Broker |
|
|
200 | (1) |
|
|
200 | (1) |
|
|
201 | (1) |
|
|
202 | (2) |
|
|
204 | (4) |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
206 | (1) |
|
Data Processors and Data Controllers |
|
|
206 | (1) |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
208 | (1) |
|
|
208 | (3) |
|
Comparing Tailoring and Scoping |
|
|
209 | (1) |
|
|
210 | (1) |
|
|
211 | (1) |
|
|
211 | (2) |
|
|
213 | (1) |
|
|
214 | (5) |
|
Chapter 6 Cryptography And Symmetric Key Algorithms |
|
|
219 | (44) |
|
Cryptographic Foundations |
|
|
220 | (18) |
|
|
220 | (3) |
|
|
223 | (1) |
|
Cryptographic Mathematics |
|
|
224 | (6) |
|
|
230 | (8) |
|
|
238 | (6) |
|
|
238 | (1) |
|
|
239 | (2) |
|
Asymmetric Key Algorithms |
|
|
241 | (3) |
|
|
244 | (1) |
|
|
244 | (11) |
|
Cryptographic Modes of Operation |
|
|
245 | (2) |
|
|
247 | (1) |
|
|
247 | (1) |
|
International Data Encryption Algorithm |
|
|
248 | (1) |
|
|
249 | (1) |
|
|
249 | (1) |
|
|
249 | (1) |
|
Advanced Encryption Standard |
|
|
250 | (1) |
|
|
250 | (1) |
|
Comparison of Symmetric Encryption Algorithms |
|
|
251 | (1) |
|
|
252 | (3) |
|
|
255 | (1) |
|
|
255 | (1) |
|
|
256 | (1) |
|
|
257 | (1) |
|
|
258 | (5) |
|
Chapter 7 Pki And Cryptographic Applications |
|
|
263 | (46) |
|
|
264 | (7) |
|
|
264 | (1) |
|
|
265 | (2) |
|
|
267 | (1) |
|
|
268 | (1) |
|
Diffie-Hellman Key Exchange |
|
|
269 | (1) |
|
|
270 | (1) |
|
|
271 | (4) |
|
|
272 | (1) |
|
|
273 | (1) |
|
|
273 | (1) |
|
Comparison of Hash Algorithm Value Lengths |
|
|
274 | (1) |
|
|
275 | (2) |
|
|
276 | (1) |
|
Digital Signature Standard |
|
|
277 | (1) |
|
Public Key Infrastructure |
|
|
277 | (7) |
|
|
278 | (1) |
|
|
279 | (1) |
|
|
280 | (3) |
|
|
283 | (1) |
|
Asymmetric Key Management |
|
|
284 | (1) |
|
|
285 | (1) |
|
|
285 | (12) |
|
|
285 | (1) |
|
|
286 | (4) |
|
|
290 | (2) |
|
Steganography and Watermarking |
|
|
292 | (2) |
|
|
294 | (1) |
|
|
295 | (2) |
|
|
297 | (4) |
|
|
301 | (1) |
|
|
302 | (1) |
|
|
303 | (1) |
|
|
304 | (5) |
|
Chapter 8 Principles Of Security Models, Design, And Capabilities |
|
|
309 | (44) |
|
|
310 | (10) |
|
|
311 | (1) |
|
|
312 | (2) |
|
|
314 | (1) |
|
|
314 | (2) |
|
|
316 | (1) |
|
|
317 | (2) |
|
|
319 | (1) |
|
|
319 | (1) |
|
Techniques for Ensuring CIA |
|
|
320 | (2) |
|
|
320 | (1) |
|
|
320 | (1) |
|
|
321 | (1) |
|
|
321 | (1) |
|
|
321 | (1) |
|
Understand the Fundamental Concepts of Security Models |
|
|
322 | (15) |
|
|
323 | (2) |
|
|
325 | (1) |
|
|
325 | (1) |
|
|
326 | (1) |
|
|
326 | (1) |
|
|
327 | (1) |
|
|
328 | (2) |
|
|
330 | (3) |
|
|
333 | (1) |
|
|
334 | (1) |
|
|
335 | (1) |
|
|
335 | (1) |
|
|
335 | (1) |
|
Harrison-Ruzzo-Ullman Model |
|
|
336 | (1) |
|
Select Controls Based on Systems Security Requirements |
|
|
337 | (4) |
|
|
337 | (3) |
|
|
340 | (1) |
|
Understand Security Capabilities of Information Systems |
|
|
341 | (2) |
|
|
341 | (1) |
|
|
342 | (1) |
|
|
342 | (1) |
|
|
343 | (1) |
|
|
343 | (1) |
|
|
343 | (1) |
|
|
343 | (1) |
|
|
344 | (3) |
|
|
347 | (1) |
|
|
348 | (5) |
|
Chapter 9 Security Vulnerabilities, Threats, And Countermeasures |
|
|
353 | (94) |
|
|
354 | (1) |
|
Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements |
|
|
355 | (17) |
|
|
356 | (14) |
|
|
370 | (2) |
|
|
372 | (3) |
|
|
372 | (3) |
|
|
375 | (1) |
|
|
375 | (3) |
|
Large-Scale Parallel Data Systems |
|
|
376 | (1) |
|
|
377 | (1) |
|
|
378 | (1) |
|
Industrial Control Systems |
|
|
378 | (2) |
|
|
380 | (2) |
|
High-Performance Computing (HPC) Systems |
|
|
382 | (1) |
|
|
383 | (2) |
|
|
385 | (1) |
|
Embedded Devices and Cyber-Physical Systems |
|
|
386 | (7) |
|
|
387 | (1) |
|
|
388 | (1) |
|
|
389 | (1) |
|
Elements Related to Embedded and Static Systems |
|
|
389 | (1) |
|
Security Concerns of Embedded and Static Systems |
|
|
390 | (3) |
|
|
393 | (1) |
|
|
394 | (1) |
|
|
395 | (2) |
|
|
397 | (8) |
|
|
399 | (1) |
|
|
400 | (1) |
|
Software-Defined Everything |
|
|
400 | (3) |
|
Virtualization Security Management |
|
|
403 | (2) |
|
|
405 | (1) |
|
|
406 | (1) |
|
|
406 | (20) |
|
Mobile Device Security Features |
|
|
408 | (12) |
|
Mobile Device Deployment Policies |
|
|
420 | (6) |
|
Essential Security Protection Mechanisms |
|
|
426 | (2) |
|
|
426 | (1) |
|
|
427 | (1) |
|
|
427 | (1) |
|
Common Security Architecture Flaws and Issues |
|
|
428 | (4) |
|
|
428 | (2) |
|
Attacks Based on Design or Coding Flaws |
|
|
430 | (1) |
|
|
431 | (1) |
|
|
431 | (1) |
|
|
432 | (1) |
|
|
433 | (7) |
|
|
440 | (1) |
|
|
441 | (6) |
|
Chapter 10 Physical Security Requirements |
|
|
447 | (48) |
|
Apply Security Principles to Site and Facility Design |
|
|
448 | (4) |
|
|
448 | (1) |
|
|
449 | (1) |
|
|
450 | (2) |
|
Implement Site and Facility Security Controls |
|
|
452 | (24) |
|
|
453 | (1) |
|
|
454 | (1) |
|
Server Rooms/Data Centers |
|
|
455 | (3) |
|
Intrusion Detection Systems |
|
|
458 | (2) |
|
|
460 | (2) |
|
|
462 | (1) |
|
|
462 | (1) |
|
|
463 | (1) |
|
Restricted and Work Area Security |
|
|
464 | (1) |
|
|
465 | (5) |
|
Fire Prevention, Detection, and Suppression |
|
|
470 | (6) |
|
Implement and Manage Physical Security |
|
|
476 | (8) |
|
Perimeter Security Controls |
|
|
477 | (4) |
|
Internal Security Controls |
|
|
481 | (2) |
|
Key Performance Indicators of Physical Security |
|
|
483 | (1) |
|
|
484 | (1) |
|
|
485 | (3) |
|
|
488 | (1) |
|
|
489 | (6) |
|
Chapter 11 Secure Network Architecture And Components |
|
|
495 | (86) |
|
|
497 | (7) |
|
|
497 | (1) |
|
|
498 | (1) |
|
Encapsulation/Deencapsulation |
|
|
498 | (2) |
|
|
500 | (4) |
|
|
504 | (1) |
|
Analyzing Network Traffic |
|
|
505 | (1) |
|
Common Application Layer Protocols |
|
|
506 | (2) |
|
Transport Layer Protocols |
|
|
508 | (1) |
|
|
509 | (7) |
|
|
511 | (3) |
|
|
514 | (2) |
|
Internet Protocol (IP) Networking |
|
|
516 | (3) |
|
|
516 | (1) |
|
|
517 | (2) |
|
|
519 | (1) |
|
|
519 | (1) |
|
|
519 | (2) |
|
Secure Communication Protocols |
|
|
521 | (1) |
|
Implications of Multilayer Protocols |
|
|
522 | (4) |
|
|
523 | (1) |
|
Voice over Internet Protocol (VoIP) |
|
|
524 | (1) |
|
Software-Defined Networking |
|
|
525 | (1) |
|
|
526 | (1) |
|
|
527 | (16) |
|
|
529 | (1) |
|
|
529 | (1) |
|
|
530 | (1) |
|
|
531 | (2) |
|
Wi-Fi Protected Setup (WPS) |
|
|
533 | (1) |
|
|
534 | (1) |
|
Wireless Antenna Management |
|
|
534 | (1) |
|
|
535 | (1) |
|
General Wi-Fi Security Procedure |
|
|
535 | (1) |
|
|
536 | (3) |
|
|
539 | (4) |
|
Other Communication Protocols |
|
|
543 | (1) |
|
|
544 | (1) |
|
Content Distribution Networks (CDNs) |
|
|
545 | (1) |
|
Secure Network Components |
|
|
545 | (24) |
|
Secure Operation of Hardware |
|
|
546 | (1) |
|
|
547 | (2) |
|
|
549 | (1) |
|
|
550 | (6) |
|
|
556 | (3) |
|
Cabling, Topology, and Transmission Media Technology |
|
|
559 | (1) |
|
|
559 | (4) |
|
|
563 | (2) |
|
|
565 | (1) |
|
|
566 | (3) |
|
|
569 | (1) |
|
|
570 | (4) |
|
|
574 | (1) |
|
|
575 | (6) |
|
Chapter 12 Secure Communications And Network Attacks |
|
|
581 | (56) |
|
Protocol Security Mechanisms |
|
|
582 | (4) |
|
|
582 | (3) |
|
|
585 | (1) |
|
|
585 | (1) |
|
Secure Voice Communications |
|
|
586 | (4) |
|
Public Switched Telephone Network |
|
|
586 | (1) |
|
Voice over Internet Protocol (VoIP) |
|
|
586 | (2) |
|
|
588 | (1) |
|
|
589 | (1) |
|
Remote Access Security Management |
|
|
590 | (3) |
|
Remote Access and Telecommuting Techniques |
|
|
591 | (1) |
|
Remote Connection Security |
|
|
591 | (1) |
|
Plan a Remote Access Security Policy |
|
|
592 | (1) |
|
|
593 | (2) |
|
|
593 | (1) |
|
Instant Messaging and Chat |
|
|
594 | (1) |
|
|
595 | (1) |
|
Virtual IPs and Load Persistence |
|
|
596 | (1) |
|
Active-Active vs. Active-Passive |
|
|
596 | (1) |
|
|
596 | (6) |
|
|
597 | (2) |
|
Understand Email Security Issues |
|
|
599 | (1) |
|
|
599 | (3) |
|
|
602 | (8) |
|
|
603 | (1) |
|
|
604 | (2) |
|
|
606 | (1) |
|
Split Tunnel vs. Full Tunnel |
|
|
607 | (1) |
|
|
607 | (3) |
|
Switching and Virtual LANs |
|
|
610 | (4) |
|
Network Address Translation |
|
|
614 | (4) |
|
|
616 | (1) |
|
|
617 | (1) |
|
Automatic Private IP Addressing |
|
|
617 | (1) |
|
|
618 | (2) |
|
|
620 | (2) |
|
|
620 | (1) |
|
|
620 | (1) |
|
|
621 | (1) |
|
|
622 | (2) |
|
|
624 | (1) |
|
Security Control Characteristics |
|
|
624 | (1) |
|
|
625 | (1) |
|
Transmission Management Mechanisms |
|
|
625 | (1) |
|
Prevent or Mitigate Network Attacks |
|
|
625 | (1) |
|
|
626 | (1) |
|
|
626 | (1) |
|
|
626 | (2) |
|
|
628 | (2) |
|
|
630 | (1) |
|
|
631 | (6) |
|
Chapter 13 Managing Identity And Authentication |
|
|
637 | (40) |
|
Controlling Access to Assets |
|
|
639 | (2) |
|
Controlling Physical and Logical Access |
|
|
640 | (1) |
|
The CIA Triad and Access Controls |
|
|
640 | (1) |
|
Managing Identification and Authentication |
|
|
641 | (18) |
|
Comparing Subjects and Objects |
|
|
642 | (1) |
|
Registration, Proofing, and Establishment of Identity |
|
|
643 | (1) |
|
Authorization and Accountability |
|
|
644 | (1) |
|
Authentication Factors Overview |
|
|
645 | (2) |
|
|
647 | (3) |
|
|
650 | (1) |
|
|
651 | (4) |
|
Multifactor Authentication (MFA) |
|
|
655 | (1) |
|
Two-Factor Authentication with Authenticator Apps |
|
|
655 | (1) |
|
Passwordless Authentication |
|
|
656 | (1) |
|
|
657 | (1) |
|
|
658 | (1) |
|
|
659 | (1) |
|
Implementing Identity Management |
|
|
659 | (5) |
|
|
659 | (1) |
|
SSO and Federated Identities |
|
|
660 | (2) |
|
Credential Management Systems |
|
|
662 | (1) |
|
|
663 | (1) |
|
|
663 | (1) |
|
|
663 | (1) |
|
Managing the Identity and Access Provisioning Lifecycle |
|
|
664 | (4) |
|
Provisioning and Onboarding |
|
|
665 | (1) |
|
Deprovisioning and Offboarding |
|
|
666 | (1) |
|
|
667 | (1) |
|
|
667 | (1) |
|
|
667 | (1) |
|
|
668 | (1) |
|
|
669 | (2) |
|
|
671 | (1) |
|
|
672 | (5) |
|
Chapter 14 Controlling And Monitoring Access |
|
|
677 | (46) |
|
Comparing Access Control Models |
|
|
678 | (12) |
|
Comparing Permissions, Rights, and Privileges |
|
|
678 | (1) |
|
Understanding Authorization Mechanisms |
|
|
679 | (2) |
|
Defining Requirements with a Security Policy |
|
|
681 | (1) |
|
Introducing Access Control Models |
|
|
681 | (1) |
|
Discretionary Access Control |
|
|
682 | (1) |
|
Nondiscretionary Access Control |
|
|
683 | (7) |
|
Implementing Authentication Systems |
|
|
690 | (9) |
|
Implementing SSO on the Internet |
|
|
691 | (3) |
|
Implementing SSO on Internal Networks |
|
|
694 | (5) |
|
Understanding Access Control Attacks |
|
|
699 | (15) |
|
|
700 | (1) |
|
Common Access Control Attacks |
|
|
700 | (13) |
|
|
713 | (1) |
|
|
714 | (1) |
|
|
715 | (2) |
|
|
717 | (1) |
|
|
718 | (5) |
|
Chapter 15 Security Assessment And Testing |
|
|
723 | (40) |
|
Building a Security Assessment and Testing Program |
|
|
725 | (6) |
|
|
725 | (1) |
|
|
726 | (1) |
|
|
727 | (4) |
|
Performing Vulnerability Assessments |
|
|
731 | (15) |
|
Describing Vulnerabilities |
|
|
731 | (1) |
|
|
732 | (10) |
|
|
742 | (3) |
|
|
745 | (1) |
|
|
746 | (7) |
|
|
746 | (5) |
|
|
751 | (1) |
|
|
751 | (1) |
|
|
752 | (1) |
|
|
752 | (1) |
|
Implementing Security Management Processes |
|
|
753 | (3) |
|
|
753 | (1) |
|
|
754 | (1) |
|
Disaster Recovery and Business Continuity |
|
|
754 | (1) |
|
|
755 | (1) |
|
Key Performance and Risk Indicators |
|
|
755 | (1) |
|
|
756 | (1) |
|
|
756 | (2) |
|
|
758 | (1) |
|
|
759 | (4) |
|
Chapter 16 Managing Security Operations |
|
|
763 | (38) |
|
Apply Foundational Security Operations Concepts |
|
|
765 | (6) |
|
Need to Know and Least Privilege |
|
|
765 | (2) |
|
Separation of Duties (SoD) and Responsibilities |
|
|
767 | (1) |
|
|
768 | (1) |
|
|
768 | (1) |
|
|
768 | (1) |
|
Privileged Account Management |
|
|
769 | (2) |
|
Service Level Agreements (SLAs) |
|
|
771 | (1) |
|
Addressing Personnel Safety and Security |
|
|
771 | (2) |
|
|
771 | (1) |
|
|
772 | (1) |
|
|
773 | (1) |
|
Security Training and Awareness |
|
|
773 | (1) |
|
Provision Resources Securely |
|
|
773 | (3) |
|
Information and Asset Ownership |
|
|
774 | (1) |
|
|
774 | (2) |
|
Apply Resource Protection |
|
|
776 | (3) |
|
|
776 | (1) |
|
Media Protection Techniques |
|
|
776 | (3) |
|
Managed Services in the Cloud |
|
|
779 | (3) |
|
Shared Responsibility with Cloud Service Models |
|
|
780 | (2) |
|
Scalability and Elasticity |
|
|
782 | (1) |
|
Perform Configuration Management (CM) |
|
|
782 | (3) |
|
|
783 | (1) |
|
|
783 | (1) |
|
Using Images for Baselining |
|
|
783 | (1) |
|
|
784 | (1) |
|
|
785 | (4) |
|
|
787 | (1) |
|
|
788 | (1) |
|
Configuration Documentation |
|
|
788 | (1) |
|
Managing Patches and Reducing Vulnerabilities |
|
|
789 | (4) |
|
|
789 | (1) |
|
|
789 | (2) |
|
|
791 | (1) |
|
|
792 | (1) |
|
Common Vulnerabilities and Exposures |
|
|
792 | (1) |
|
|
793 | (1) |
|
|
794 | (2) |
|
|
796 | (1) |
|
|
797 | (4) |
|
Chapter 17 Preventing And Responding To Incidents |
|
|
801 | (60) |
|
Conducting Incident Management |
|
|
803 | (7) |
|
|
803 | (1) |
|
Incident Management Steps |
|
|
804 | (6) |
|
Implementing Detective and Preventive Measures |
|
|
810 | (24) |
|
Basic Preventive Measures |
|
|
810 | (1) |
|
|
811 | (9) |
|
Intrusion Detection and Prevention Systems |
|
|
820 | (8) |
|
Specific Preventive Measures |
|
|
828 | (6) |
|
|
834 | (11) |
|
|
834 | (3) |
|
|
837 | (3) |
|
|
840 | (4) |
|
|
844 | (1) |
|
|
844 | (1) |
|
Automating Incident Response |
|
|
845 | (6) |
|
|
845 | (1) |
|
Machine Learning and AI Tools |
|
|
846 | (1) |
|
|
847 | (3) |
|
The Intersection of SOAR, Machine Learning, AI, and Threat Feeds |
|
|
850 | (1) |
|
|
851 | (1) |
|
|
852 | (3) |
|
|
855 | (1) |
|
|
856 | (5) |
|
Chapter 18 Disaster Recovery Planning |
|
|
861 | (48) |
|
|
863 | (12) |
|
|
864 | (5) |
|
|
869 | (6) |
|
Understand System Resilience, High Availability, and Fault Tolerance |
|
|
875 | (5) |
|
|
875 | (2) |
|
|
877 | (1) |
|
|
878 | (1) |
|
|
879 | (1) |
|
|
880 | (1) |
|
|
880 | (10) |
|
Business Unit and Functional Priorities |
|
|
881 | (1) |
|
|
882 | (1) |
|
|
882 | (1) |
|
|
883 | (1) |
|
Alternate Processing Sites |
|
|
883 | (5) |
|
|
888 | (2) |
|
Recovery Plan Development |
|
|
890 | (8) |
|
|
891 | (1) |
|
Personnel and Communications |
|
|
891 | (1) |
|
|
892 | (1) |
|
Backups and Off-site Storage |
|
|
892 | (4) |
|
Software Escrow Arrangements |
|
|
896 | (1) |
|
|
897 | (1) |
|
|
897 | (1) |
|
|
897 | (1) |
|
Training, Awareness, and Documentation |
|
|
898 | (1) |
|
|
899 | (3) |
|
|
899 | (1) |
|
|
900 | (1) |
|
|
900 | (1) |
|
|
900 | (1) |
|
|
900 | (1) |
|
|
901 | (1) |
|
|
901 | (1) |
|
|
902 | (1) |
|
|
902 | (1) |
|
|
903 | (1) |
|
|
904 | (5) |
|
Chapter 19 Investigations And Ethics |
|
|
909 | (32) |
|
|
910 | (13) |
|
|
910 | (3) |
|
|
913 | (6) |
|
|
919 | (4) |
|
Major Categories of Computer Crime |
|
|
923 | (6) |
|
Military and Intelligence Attacks |
|
|
924 | (1) |
|
|
925 | (1) |
|
|
926 | (1) |
|
|
926 | (1) |
|
|
927 | (1) |
|
|
928 | (1) |
|
|
928 | (1) |
|
|
929 | (4) |
|
Organizational Code of Ethics |
|
|
929 | (1) |
|
|
930 | (1) |
|
|
931 | (2) |
|
|
933 | (1) |
|
|
934 | (1) |
|
|
935 | (1) |
|
|
936 | (5) |
|
Chapter 20 Software Development Security |
|
|
941 | (52) |
|
Introducing Systems Development Controls |
|
|
943 | (30) |
|
|
943 | (9) |
|
Systems Development Lifecycle |
|
|
952 | (3) |
|
|
955 | (9) |
|
|
964 | (1) |
|
Change and Configuration Management |
|
|
964 | (2) |
|
|
966 | (1) |
|
Application Programming Interfaces |
|
|
967 | (2) |
|
|
969 | (1) |
|
|
970 | (1) |
|
|
971 | (1) |
|
Third-Party Software Acquisition |
|
|
972 | (1) |
|
Establishing Databases and Data Warehousing |
|
|
973 | (10) |
|
Database Management System Architecture |
|
|
973 | (4) |
|
|
977 | (1) |
|
Security for Multilevel Databases |
|
|
978 | (4) |
|
Open Database Connectivity |
|
|
982 | (1) |
|
|
982 | (1) |
|
|
983 | (1) |
|
Understanding Knowledge-Based Systems |
|
|
984 | (3) |
|
|
984 | (1) |
|
|
985 | (1) |
|
|
986 | (1) |
|
|
987 | (1) |
|
|
987 | (1) |
|
|
988 | (1) |
|
|
989 | (4) |
|
Chapter 21 Malicious Code And Application Attacks |
|
|
993 | (48) |
|
|
994 | (12) |
|
Sources of Malicious Code |
|
|
995 | (1) |
|
|
995 | (4) |
|
|
999 | (1) |
|
|
1000 | (1) |
|
|
1001 | (3) |
|
|
1004 | (1) |
|
|
1004 | (1) |
|
|
1005 | (1) |
|
|
1006 | (1) |
|
|
1006 | (3) |
|
Platforms Vulnerable to Malware |
|
|
1007 | (1) |
|
|
1007 | (1) |
|
|
1008 | (1) |
|
Advanced Threat Protection |
|
|
1008 | (1) |
|
|
1009 | (3) |
|
|
1009 | (1) |
|
Time of Check to Time of Use |
|
|
1010 | (1) |
|
|
1011 | (1) |
|
Privilege Escalation and Rootkits |
|
|
1011 | (1) |
|
Injection Vulnerabilities |
|
|
1012 | (5) |
|
|
1012 | (4) |
|
|
1016 | (1) |
|
Command Injection Attacks |
|
|
1016 | (1) |
|
Exploiting Authorization Vulnerabilities |
|
|
1017 | (3) |
|
Insecure Direct Object References |
|
|
1018 | (1) |
|
|
1018 | (2) |
|
|
1020 | (1) |
|
Exploiting Web Application Vulnerabilities |
|
|
1020 | (5) |
|
Cross-Site Scripting (XSS) |
|
|
1021 | (2) |
|
|
1023 | (1) |
|
|
1024 | (1) |
|
Application Security Controls |
|
|
1025 | (6) |
|
|
1025 | (2) |
|
Web Application Firewalls |
|
|
1027 | (1) |
|
|
1028 | (1) |
|
|
1029 | (2) |
|
|
1031 | (4) |
|
|
1031 | (1) |
|
|
1032 | (1) |
|
|
1033 | (1) |
|
|
1034 | (1) |
|
|
1035 | (1) |
|
|
1035 | (1) |
|
|
1036 | (1) |
|
|
1037 | (4) |
|
Appendix A Answers to Review Questions |
|
|
1041 | (58) |
|
Chapter 1 Security Governance Through Principles And Policies |
|
|
1042 | (3) |
|
Chapter 2 Personnel Security And Risk Management Concepts |
|
|
1045 | (4) |
|
Chapter 3 Business Continuity Planning |
|
|
1049 | (2) |
|
Chapter 4 Laws, Regulations, And Compliance |
|
|
1051 | (2) |
|
Chapter 5 Protecting Security Of Assets |
|
|
1053 | (3) |
|
Chapter 6 Cryptography And Symmetric Key Algorithms |
|
|
1056 | (2) |
|
Chapter 7 Pki And Cryptographic Applications |
|
|
1058 | (2) |
|
Chapter 8 Principles Of Security Models, Design, And Capabilities |
|
|
1060 | (2) |
|
Chapter 9 Security Vulnerabilities, Threats, And Countermeasures |
|
|
1062 | (5) |
|
Chapter 10 Physical Security Requirements |
|
|
1067 | (4) |
|
Chapter 11 Secure Network Architecture And Components |
|
|
1071 | (4) |
|
Chapter 12 Secure Communications And Network Attacks |
|
|
1075 | (3) |
|
Chapter 13 Managing Identity And Authentication |
|
|
1078 | (2) |
|
Chapter 14 Controlling And Monitoring Access |
|
|
1080 | (2) |
|
Chapter 15 Security Assessment And Testing |
|
|
1082 | (2) |
|
Chapter 16 Managing Security Operations |
|
|
1084 | (2) |
|
Chapter 17 Preventing And Responding To Incidents |
|
|
1086 | (3) |
|
Chapter 18 Disaster Recovery Planning |
|
|
1089 | (2) |
|
Chapter 19 Investigations And Ethics |
|
|
1091 | (2) |
|
Chapter 20 Software Development Security |
|
|
1093 | (2) |
|
Chapter 21 Malicious Code And Application Attacks |
|
|
1095 | (4) |
|
Appendix B Answers to Written Labs |
|
|
1099 | (1) |
|
Chapter 1 Security Governance Through Principles And Policies |
|
|
1100 | (1) |
|
Chapter 2 Personnel Security And Risk Management Concepts |
|
|
1100 | (1) |
|
Chapter 3 Business Continuity Planning |
|
|
1101 | (1) |
|
Chapter 4 Laws, Regulations, And Compliance |
|
|
1102 | (1) |
|
Chapter 5 Protecting Security Of Assets |
|
|
1102 | (1) |
|
Chapter 6 Cryptography And Symmetric Key Algorithms |
|
|
1103 | (1) |
|
Chapter 7 Pki And Cryptographic Applications |
|
|
1104 | (1) |
|
Chapter 8 Principles Of Security Models, Design, And Capabilities |
|
|
1104 | (1) |
|
Chapter 9 Security Vulnerabilities, Threats, And Countermeasures |
|
|
1105 | (1) |
|
Chapter 10 Physical Security Requirements |
|
|
1106 | (2) |
|
Chapter 11 Secure Network Architecture And Components |
|
|
1108 | (1) |
|
Chapter 12 Secure Communications And Network Attacks |
|
|
1109 | (1) |
|
Chapter 13 Managing Identity And Authentication |
|
|
1110 | (1) |
|
Chapter 14 Controlling And Monitoring Access |
|
|
1111 | (1) |
|
Chapter 15 Security Assessment And Testing |
|
|
1111 | (1) |
|
Chapter 16 Managing Security Operations |
|
|
1112 | (1) |
|
Chapter 17 Preventing And Responding To Incidents |
|
|
1113 | (1) |
|
Chapter 18 Disaster Recovery Planning |
|
|
1113 | (1) |
|
Chapter 19 Investigations And Ethics |
|
|
1114 | (1) |
|
Chapter 20 Software Development Security |
|
|
1114 | (1) |
|
Chapter 21 Malicious Code And Application Attacks |
|
|
1115 | (2) |
Index |
|
1117 | |
|
(ISC)2® CISSP® Certified Information Systems Security Professional Official Practice Tests |
|
|
Security and Risk Management (Domain 1) |
|
1 | (24) |
Asset Security (Domain 2) |
|
25 | (24) |
Security Architecture and Engineering (Domain 3) |
|
49 | (24) |
Communication and Network Security (Domain 4) |
|
73 | (24) |
Identity and Access Management (Domain 5) |
|
97 | (24) |
Security Assessment and Testing (Domain 6) |
|
121 | (24) |
Security Operations (Domain 7) |
|
145 | (24) |
Software Development Security (Domain 8) |
|
169 | (26) |
Practice Test 1 |
|
195 | (30) |
Practice Test 2 |
|
225 | (28) |
Practice Test 3 |
|
253 | (30) |
Practice Test 4 |
|
283 | (28) |
Answers |
|
311 | (1) |
|
Chapter 1 Security And Risk Management (Domain 1) |
|
|
312 | (9) |
|
Chapter 2 Asset Security (Domain 2) |
|
|
321 | (12) |
|
Chapter 3 Security Architecture And Engineering (Domain 3) |
|
|
333 | (9) |
|
Chapter 4 Communication And Network Security (Domain 4) |
|
|
342 | (11) |
|
Chapter 5 Identity And Access Management (Domain 5) |
|
|
353 | (12) |
|
Chapter 6 Security Assessment And Testing (Domain 6) |
|
|
365 | (12) |
|
Chapter 7 Security Operations (Domain 7) |
|
|
377 | (12) |
|
Chapter 8 Software Development Security (Domain 8) |
|
|
389 | (11) |
|
Chapter 9 Practice Test 1 |
|
|
400 | (14) |
|
Chapter 10 Practice Test 2 |
|
|
414 | (14) |
|
Chapter 11 Practice Test 3 |
|
|
428 | (13) |
|
Chapter 12 Practice Test 4 |
|
|
441 | |