Introduction |
|
1 | (14) |
|
The CISSP Certification Exam |
|
|
15 | (8) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
17 | (2) |
|
Multiple-Choice Question Format |
|
|
19 | (1) |
|
|
19 | (2) |
|
Question-Handling Strategies |
|
|
21 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
23 | (40) |
|
|
24 | (1) |
|
|
24 | (4) |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
27 | (1) |
|
Facility Concerns and Requirements |
|
|
28 | (6) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
30 | (1) |
|
Doors, Walls, Windows, and Ceilings |
|
|
31 | (3) |
|
|
34 | (1) |
|
|
34 | (10) |
|
|
34 | (2) |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
41 | (3) |
|
|
44 | (3) |
|
Badges, Tokens, and Cards |
|
|
44 | (2) |
|
Biometric Access Controls |
|
|
46 | (1) |
|
|
47 | (2) |
|
Heating, Ventilating, and Air Conditioning |
|
|
48 | (1) |
|
|
49 | (1) |
|
Uninterruptible Power Supply |
|
|
50 | (1) |
|
|
50 | (1) |
|
Fire Prevention, Detection, and Suppression |
|
|
51 | (4) |
|
|
52 | (1) |
|
|
52 | (3) |
|
|
55 | (3) |
|
Intrusion Detection Systems |
|
|
55 | (1) |
|
|
56 | (2) |
|
|
58 | (2) |
|
Answers to Exam Prep Questions |
|
|
60 | (1) |
|
Suggested Reading and Resources |
|
|
61 | (2) |
|
Access Control Systems and Methodology |
|
|
63 | (54) |
|
|
64 | (1) |
|
Identification, Authentication, and Authorization |
|
|
65 | (13) |
|
|
65 | (13) |
|
|
78 | (3) |
|
|
78 | (3) |
|
|
81 | (1) |
|
Authorization and Access Controls Techniques |
|
|
81 | (5) |
|
Discretionary Access Control |
|
|
81 | (1) |
|
|
82 | (2) |
|
Role-Based Access Control |
|
|
84 | (1) |
|
Other Types of Access Controls |
|
|
85 | (1) |
|
|
86 | (4) |
|
Centralized Access Control |
|
|
86 | (3) |
|
Decentralized Access Control |
|
|
89 | (1) |
|
|
90 | (3) |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
91 | (1) |
|
Access Control Categories |
|
|
92 | (1) |
|
|
93 | (8) |
|
Monitoring Access and Usage |
|
|
93 | (1) |
|
Intrusion Detection Systems |
|
|
94 | (4) |
|
Intrusion Prevention Systems |
|
|
98 | (1) |
|
|
98 | (1) |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
101 | (10) |
|
|
101 | (4) |
|
|
105 | (1) |
|
|
105 | (1) |
|
Eavesdropping and Shoulder Surfing |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
106 | (1) |
|
Denial of Service Attacks |
|
|
107 | (2) |
|
Distributed Denial of Service Attacks |
|
|
109 | (1) |
|
|
109 | (2) |
|
|
111 | (2) |
|
Answers to Exam Prep Questions |
|
|
113 | (2) |
|
Suggesting Reading and Resources |
|
|
115 | (2) |
|
|
117 | (54) |
|
|
118 | (1) |
|
|
118 | (3) |
|
|
121 | (5) |
|
|
126 | (2) |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
128 | (2) |
|
|
130 | (1) |
|
|
131 | (8) |
|
|
133 | (3) |
|
|
136 | (2) |
|
Advanced Encryption Standard |
|
|
138 | (1) |
|
International Data Encryption Algorithm |
|
|
138 | (1) |
|
|
139 | (1) |
|
|
139 | (6) |
|
|
141 | (1) |
|
|
142 | (1) |
|
|
143 | (1) |
|
Elliptical Curve Cryptosystem |
|
|
144 | (1) |
|
|
144 | (1) |
|
Review of Symmetric and Asymmetric Cryptographic Systems |
|
|
145 | (1) |
|
|
145 | (1) |
|
Integrity and Authentication |
|
|
146 | (5) |
|
Hashing and Message Digests |
|
|
147 | (3) |
|
|
150 | (1) |
|
Cryptographic System Review |
|
|
151 | (1) |
|
Public Key Infrastructure |
|
|
151 | (5) |
|
|
152 | (1) |
|
|
152 | (1) |
|
Certificate Revocation List |
|
|
153 | (1) |
|
|
153 | (2) |
|
|
155 | (1) |
|
Email Protection Mechanisms |
|
|
156 | (1) |
|
|
156 | (1) |
|
Other Email Security Applications |
|
|
157 | (1) |
|
Securing TCP/IP with Cryptographic Solutions |
|
|
157 | (6) |
|
Application/Process Layer Controls |
|
|
158 | (1) |
|
Host to Host Layer Controls |
|
|
159 | (1) |
|
|
160 | (1) |
|
Network Access Layer Controls |
|
|
161 | (1) |
|
Link and End to End Encryption |
|
|
162 | (1) |
|
|
163 | (3) |
|
|
166 | (2) |
|
Answers to Exam Prep Questions |
|
|
168 | (2) |
|
|
170 | (1) |
|
Security Architecture and Models |
|
|
171 | (42) |
|
|
172 | (1) |
|
Computer System Architecture |
|
|
172 | (8) |
|
|
172 | (3) |
|
|
175 | (3) |
|
|
178 | (1) |
|
Virtual Memory and Virtual Machines |
|
|
178 | (1) |
|
|
179 | (1) |
|
|
180 | (8) |
|
|
180 | (2) |
|
|
182 | (3) |
|
|
185 | (1) |
|
Security Modes of Operation |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
187 | (1) |
|
|
188 | (1) |
|
Security Models of Control |
|
|
188 | (7) |
|
|
189 | (1) |
|
|
190 | (1) |
|
|
191 | (3) |
|
|
194 | (1) |
|
|
195 | (5) |
|
|
195 | (2) |
|
The Red Book: Trusted Network Interpretation |
|
|
197 | (1) |
|
Information Technology Security Evaluation Criteria |
|
|
198 | (1) |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
200 | (4) |
|
Certification and Accreditation |
|
|
201 | (1) |
|
Governance and Enterprise Architecture |
|
|
202 | (2) |
|
Security Architecture Threats |
|
|
204 | (3) |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
205 | (1) |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
207 | (2) |
|
Answers to Exam Prep Questions |
|
|
209 | (2) |
|
|
211 | (2) |
|
Telecommunications and Network Security |
|
|
213 | (66) |
|
|
214 | (1) |
|
Network Models and Standards |
|
|
214 | (8) |
|
|
215 | (6) |
|
Encapsulation/De-encapsulation |
|
|
221 | (1) |
|
|
222 | (10) |
|
|
222 | (1) |
|
|
223 | (3) |
|
Host-to-Host (Transport) Layer |
|
|
226 | (3) |
|
|
229 | (3) |
|
LANs and Their Components |
|
|
232 | (7) |
|
LAN Communication Protocols |
|
|
233 | (1) |
|
|
233 | (3) |
|
|
236 | (2) |
|
|
238 | (1) |
|
|
239 | (1) |
|
|
240 | (4) |
|
|
240 | (1) |
|
|
240 | (1) |
|
|
240 | (1) |
|
|
241 | (1) |
|
|
242 | (1) |
|
|
243 | (1) |
|
|
243 | (1) |
|
|
244 | (2) |
|
WANs and Their Components |
|
|
246 | (5) |
|
|
246 | (2) |
|
|
248 | (3) |
|
Voice Communications and Wireless Communications |
|
|
251 | (10) |
|
|
251 | (1) |
|
|
252 | (1) |
|
802.11 Wireless Networks and Standards |
|
|
253 | (8) |
|
|
261 | (4) |
|
|
261 | (2) |
|
|
263 | (1) |
|
|
264 | (1) |
|
|
265 | (3) |
|
|
265 | (1) |
|
|
266 | (1) |
|
Remote Authentication Dial-in User Service |
|
|
267 | (1) |
|
Terminal Access Controller Access Control System |
|
|
267 | (1) |
|
|
268 | (1) |
|
|
268 | (1) |
|
Threats to Network Security |
|
|
269 | (5) |
|
|
269 | (1) |
|
|
270 | (1) |
|
Destruction, Alteration, or Theft |
|
|
271 | (3) |
|
|
274 | (3) |
|
Answers to Exam Prep Questions |
|
|
277 | (1) |
|
|
278 | (1) |
|
Business Continuity and Disaster Recovery Planning |
|
|
279 | (40) |
|
|
280 | (1) |
|
Threats to Business Operations |
|
|
280 | (1) |
|
Disaster Recovery and Business Continuity Management |
|
|
281 | (29) |
|
Project Management and Initiation |
|
|
283 | (2) |
|
|
285 | (5) |
|
|
290 | (13) |
|
Plan Design and Development |
|
|
303 | (3) |
|
|
306 | (1) |
|
|
307 | (2) |
|
Monitoring and Maintenance |
|
|
309 | (1) |
|
|
310 | (4) |
|
Teams and Responsibilities |
|
|
312 | (2) |
|
|
314 | (2) |
|
Answers to Exam Prep Questions |
|
|
316 | (2) |
|
|
318 | (1) |
|
Legal, Regulations, Compliance, and Investigations |
|
|
319 | (46) |
|
|
320 | (1) |
|
United States Legal System and Laws |
|
|
320 | (1) |
|
International Legal Systems and Laws |
|
|
321 | (2) |
|
International Property Laws |
|
|
323 | (2) |
|
Piracy and Issues with Copyrights |
|
|
323 | (2) |
|
Privacy Laws and Protection of Personal Information |
|
|
325 | (3) |
|
Privacy Impact Assessment |
|
|
327 | (1) |
|
|
328 | (1) |
|
|
328 | (4) |
|
|
329 | (1) |
|
Computer Ethics Institute |
|
|
330 | (1) |
|
Internet Architecture Board |
|
|
331 | (1) |
|
|
332 | (1) |
|
Computer Crime and Criminals |
|
|
332 | (3) |
|
|
335 | (1) |
|
Well-Known Computer Crimes |
|
|
335 | (1) |
|
How Computer Crime Has Changed |
|
|
336 | (2) |
|
|
338 | (4) |
|
|
338 | (1) |
|
|
339 | (1) |
|
|
339 | (1) |
|
|
340 | (1) |
|
|
341 | (1) |
|
|
341 | (1) |
|
Investigating Computer Crime |
|
|
342 | (5) |
|
Computer Crime Jurisdiction |
|
|
343 | (1) |
|
|
343 | (4) |
|
|
347 | (7) |
|
Standardization of Forensic Procedures |
|
|
349 | (1) |
|
|
349 | (5) |
|
|
354 | (3) |
|
Search, Seizure, and Surveillance |
|
|
354 | (1) |
|
Interviews and Interrogations |
|
|
355 | (1) |
|
|
355 | (1) |
|
|
356 | (1) |
|
|
357 | (2) |
|
|
358 | (1) |
|
|
359 | (3) |
|
Answers to Exam Prep Questions |
|
|
362 | (2) |
|
|
364 | (1) |
|
Applications and Systems-Development Security |
|
|
365 | (40) |
|
|
366 | (1) |
|
|
366 | (10) |
|
|
367 | (2) |
|
The System Development Life Cycle |
|
|
369 | (7) |
|
System Development Methods |
|
|
376 | (4) |
|
|
376 | (1) |
|
|
376 | (1) |
|
Joint Application Development |
|
|
377 | (1) |
|
Rapid Application Development |
|
|
377 | (1) |
|
|
377 | (1) |
|
|
378 | (1) |
|
Computer-Aided Software Engineering |
|
|
378 | (1) |
|
Agile Development Methods |
|
|
378 | (1) |
|
Capability Maturity Model |
|
|
379 | (1) |
|
|
380 | (1) |
|
|
380 | (2) |
|
|
382 | (3) |
|
Object-Oriented Programming |
|
|
384 | (1) |
|
|
385 | (1) |
|
|
385 | (6) |
|
|
386 | (2) |
|
|
388 | (1) |
|
|
388 | (1) |
|
|
388 | (1) |
|
|
389 | (1) |
|
|
390 | (1) |
|
Artificial Intelligence and Expert Systems |
|
|
390 | (1) |
|
|
391 | (9) |
|
|
391 | (2) |
|
|
393 | (1) |
|
|
394 | (1) |
|
|
394 | (1) |
|
|
395 | (1) |
|
Malformed Input (SQL Injection) |
|
|
395 | (1) |
|
|
396 | (1) |
|
|
396 | (1) |
|
|
397 | (1) |
|
|
398 | (1) |
|
Distributed Denial of Service |
|
|
399 | (1) |
|
|
400 | (2) |
|
Answers to Exam Prep Questions |
|
|
402 | (2) |
|
|
404 | (1) |
|
Information Security and Risk Management Practices |
|
|
405 | (44) |
|
|
406 | (1) |
|
Basic Security Principles |
|
|
406 | (2) |
|
Security Management and Governance |
|
|
408 | (2) |
|
|
410 | (1) |
|
|
411 | (16) |
|
|
412 | (15) |
|
|
427 | (7) |
|
|
428 | (2) |
|
|
430 | (1) |
|
|
430 | (1) |
|
|
431 | (1) |
|
|
431 | (1) |
|
|
431 | (3) |
|
|
434 | (4) |
|
|
434 | (2) |
|
|
436 | (2) |
|
|
438 | (3) |
|
|
439 | (1) |
|
|
440 | (1) |
|
Auditing Your Security Infrastructure |
|
|
441 | (1) |
|
The Risk of Poor Security Management |
|
|
442 | (1) |
|
|
443 | (2) |
|
Answers to Exam Prep Questions |
|
|
445 | (2) |
|
|
447 | (2) |
|
|
449 | (52) |
|
|
450 | (1) |
|
|
450 | (4) |
|
|
451 | (1) |
|
|
452 | (1) |
|
|
452 | (1) |
|
|
452 | (1) |
|
|
453 | (1) |
|
|
453 | (1) |
|
|
454 | (1) |
|
|
454 | (2) |
|
|
456 | (9) |
|
|
456 | (2) |
|
|
458 | (7) |
|
|
465 | (7) |
|
|
466 | (1) |
|
|
467 | (1) |
|
|
468 | (1) |
|
|
469 | (1) |
|
|
470 | (1) |
|
|
470 | (1) |
|
|
471 | (1) |
|
Telecommunication Controls |
|
|
472 | (4) |
|
|
472 | (1) |
|
|
473 | (1) |
|
|
474 | (2) |
|
Backup, Fault Tolerance, and Recovery Controls |
|
|
476 | (7) |
|
|
477 | (1) |
|
|
478 | (2) |
|
|
480 | (2) |
|
|
482 | (1) |
|
|
483 | (6) |
|
|
484 | (1) |
|
|
484 | (1) |
|
|
485 | (4) |
|
Operational Security Threats and Vulnerabilities |
|
|
489 | (5) |
|
Common Attack Methodologies |
|
|
490 | (2) |
|
Attack Terms and Techniques |
|
|
492 | (2) |
|
|
494 | (3) |
|
Answers to Exam Prep Questions |
|
|
497 | (2) |
|
|
499 | (2) |
|
|
501 | (14) |
|
Answers to Practice Exam I |
|
|
515 | (16) |
|
|
531 | (14) |
|
Answers to Practice Exam II |
|
|
545 | (14) |
What's on the CD |
|
559 | (4) |
Index |
|
563 | |