CISSP - 2 Flashcards
Which of the following is considered unacceptable for access control? A. Voice pattern systems B. Signature dynamics systems C. Fingerprint systems D. Retina pattern systems
B. Signature dynamics systems
Which of the following is an information owner’s responsibility? A. Establishing a formal audit process for determining ownership B. Establishing the criteria for classifying the data based on the business function C. Conducting awareness training relating to the criticality of assigning ownership D. Reviewing and confirming that the authorization process is working as defined
D. Reviewing and confirming that the authorization process is working as defined
A detective control includes what type of function? A. Intrusion B. Logging C. Alarm D. Cut-off
B. Logging
Secure Sockets Layer exists between the A. HTTP browser and the Application Layer B. Software application and the Presentation Layer C. Transport Layer and the Application Layer D. Certificate Server and Authentication Authority
C. Transport Layer and the Application Layer
Access Server Authentication A. are general purpose communication devices B. are implemented primarily on mainframes C. use Kerberos for a single sign on D. are freestanding hardware devices
A. are general purpose communication devices
Which factor primarily drives the security manager’s budgeting decisions? A. Alignment with organizational objectives B. Effectiveness of security technologies C. Scarcity of security resources D. Knowledge of future risks
A. Alignment with organizational objectives
Metrics for tracking the improvement of a security program include the A. number of Denial of Service attacks B. quantity of new policies and procedures drafted C. percentage of successful external attack attempts D. Mean time to incident resolution
D. Mean time to incident resolution
During the Certification and Accreditation process for application software, the MOST important discovery is that A. The installed security measures are similar to the network controls and are not needed B. least privilege is implemented but not required C. the application was not adequately tested in production D. the installed security measures provide only a false sense of security
D. the installed security measures provide only a false sense of security
A vital feature to ensure the security of a program is known as A. type safety B. memory safety C. safe language D. safety pointer
B. memory safety
The primary goal of cryptanalysis is to A. decipher encrypted coded signals B. ensure that the key has no repeating segments C. reduce the system overhead for cryptographic functions D. determine the number of encryption permutations required
A. decipher encrypted coded signals
Your organization has decided to implement PKI. What service will this infrastructure provide to the organization? A. Nonrepudiation B. Availability C. Authorization D. Identification
A. Nonrepudiation
A problem with the International Common Criteria for Information Technology Security Evaluation is that A. it is limited in security functionality scope B. it is only used by the United States, Canada, Great Britain, and Australia C. It is very complicated to implement D. the certification process is extremely expensive
D. the certification process is extremely expensive
Which type of malware is unique to networked computers? A. Virus attacks B. Trojan horse attacks C. Worms D. Denial of Service attacks
C. Worms
What is the term used to describe a virus that can infect both program files and boot sectors? A. Polymorphic B. Multipartite C. Stealth D. Multiple encrypting
B. Multipartite
Which of the following is the MOST difficult to detect with anti-virus software? A. Worm B. Trojan horse C. Rootkit D. metamorphic virus
A. Worm