CISSP - 5 Flashcards
The three basic elements of the Access Matrix Model are subjects, objects, and A. mode addresses B. access rights C. scalars D. strings
B. access rights
What two problems may be resolved by conducting periodic review of access controls? A. Account Lockouts and Unknown user access B. Weak password and user impersonation C. Least privilege and accountability D. Excessive privilege and creeping privileges
D. Excessive privilege and creeping privileges
From a security perspective, what is the primary advantage of fiber optics over copper cables? A. fiber optics have higher bandwidth B. fiber optics are more difficult to tap C. fiber optics are less expensive D. fiber optics are easier to deploy
B. fiber optics are more difficult to tap
Which one of the following is most effective against an Internet Protocol Security based virtual private network? A. brute force B. man in the middle C. traffic analysis D. replay
C. traffic analysis
Who is responsible for setting the overall tone for the information security program in an organization? A. Chief Information Security Officer B. Chief Executive Officer C. Chief Operating Office D. Board of Directors
B. Chief Executive Officer
Which one of the following individuals has primary responsibility to determine information data classification level? A. Data Security Manager B. Data Owner C. Data Manager D. Data Custodian
B. Data Owner
Which of the following is the best reason for using a formal risk analysis methodology? A. risk analysis methodologies generally require minimal training and knowledge of risk analysis B. Most software tools have user interfaces that are easy to use and require little or no computer experience C. Minimal information gathering is required due to the amount of information built into the software tool D. A structured framework provides a more comprehensive approach, allows reuse of materials and allows better risk comparison between organizations and systems using similar frameworks
D. A structured framework provides a more comprehensive approach, allows reuse of materials and allows better risk comparison between organizations and systems using similar frameworks
Enterprise Security Architecture ensures that the Acquisition and Development Phase of the System Development Life Cycle A. reduces the likelihood of creating vulnerabilities in other enterprise systems B. creates a standards-based methodology for preparing audits and performing compliance review C. establishes technical requirements prior to the evaluation of the organizational culture and business needs of the organization D. prepares the system to meet the Common Criteria specifications
A. reduces the likelihood of creating vulnerabilities in other enterprise systems
An adequate system of application information security controls should be defined during the A. systems design phase B. project initiation and planning phase C. development and implementation phase D. functional requirements phase
A. systems design phase
A heap overflow attack is harder to detect because it A. relies on the specifics of hardware architecture B. replaces the function return address with the attacker’s address C. is really simple to keep track of the stack D. involves complex bookkeeping in allocation of free memory
D. involves complex bookkeeping in allocation of free memory
Encryption of stored data is effective against all of the following except A. Physical theft B. eavesdropping C. shoulder surfing D. known plaintext attack
C. shoulder surfing
In what way does the Rivest-Shamir-Adleman algorithm differ from the Data Encryption Standard? A. RSA is based on symmetric algorithm B. RSA uses a public key for encryption C. RSA eliminates the need for a key distribution center D. RSA cannot produce a digital signature
B. RSA uses a public key for encryption
The Digital Signature Standard utilizes which of the following? A. Asymmetric keys B. Steganography C. Symmetric keys D. Watermarks
A. Asymmetric keys
Which of the following is a security model used to protect similar data, requiring varying levels of privileges with similar restrictions? A. Lattice B. Matrix C. Non-interference D. Information flow
A. Lattice
Which of the following is included in the accreditation process? A. User review of changes B. Compatibility with existing policy C. Risk acceptance review D. Review of documentation
C. Risk acceptance review