CISSP - 8 Flashcards

1
Q

Requiring a password before accessing a mobile device is representative of which of the following controls? A. preventative B. detective C. administrative D. corrective

A

A. preventative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is a mechanism for representing sets of subjects in an Access Control List? A. Group B. Wild Card C. Capability D. Userid

A

A. Group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

System audit log monitoring represents which type of contol? A. administrative B. physical C. technical D. detective

A

A. administrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What technology interleaves data frames from multiple conversations into a single data stream for transmission? A. Time-division multiplexing B. real-time transport protocol C. synchronous data link control D. wired equivalency privacy

A

A. Time-division multiplexing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which technique is used to ensure confidentiality in VPNs A. transform B. encryption C. wrapping D. encapsulation

A

D. encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following best assures non-repudiation? A. SSL B. Digital signatures C. Distributed checksum D. SMTP

A

B. Digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data or information classification is the responsibility of A. security technical support staff B. internal audit consultants C. governmental regulatory bodies D. senior business managers

A

D. senior business managers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Office phone systems are a common medium for which secuirty issue? A. rogue response B. social engineering C. password cracking D. baiting

A

B. social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security guidelines and best practices that developers should consider in the implementation phase include: A. testing, acceptance and deployment, and maintenance B. cross site scripting, securing data store and in transit, and error handling C. input validation mechanisms, strong encryption, and error handling D. information gathering, threat assessment, and threat mitigation

A

C. input validation mechanisms, strong encryption, and error handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the best remediation control to prevent a structured query language injection vulnerability? A. strong output validation B. parameterized statements C. restrict input field size D. client side input validation

A

B. parameterized statements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is a method for evaluating the effectiveness of application security? A. Bell-LaPadulla B. Certification and Accreditation C. Qualitative Risk analysis D. Due dilligence

A

B. Certification and Accreditation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An encryption system’s work factor is the A. length of time required to encrypt the data B. algorithm used to scramble data C. length of time required to break the encryption D. combination of private and public key

A

C. length of time required to break the encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which one of the following is an example of a simple substitution algorithm? A. Rivest-Shamar Adleman B. Data Encryption Standard C. Caesar Cipher D. Blowfish

A

C. Caesar Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The primary problem with symmetric alogrithms relates to A. key length B. key distribution C. algorithm speed D. cipher inefficiency

A

B. key distribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The fundamental priniciples of a Information System security model are based on A. the relationship between business mission and goals B. a set of access controls and protocol filters to reduce hardware and software vulnerabilities C. the alignment of policies and procedures with information technology operations D. an analysis of vulnerabilities and threats

A

A. the relationship between business mission and goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following activities occurs before any matches or variances to the rule sets are identified and listed in a report by a vulnerability assessment tool? A. collected information is compared against a specific set of rules B. baselines the security state of the system C. data is captured in the tools repository D. acquisition queries are performed

A

B. baselines the security state of the system

17
Q

The use of multiple security techniques within each security layer helps to mitigate the risk of one layer being compromised and provides A. barrier defense B. defense in depth C. endpoitn secuirty D. secuirty zones

A

B. defense in depth

18
Q

An effective countermeasure for a denial of service attack is A. redundant network B. an intrusion prevention system C. a hardened server operating system D. a demilitarized sone

A

A. redundant network

19
Q

Blended threats combine different types of malilcious code to A. masquerade their source of origin B. attack potential vulnerabilities C. exploit known security vulnerabilities D. activate backdoors in the target applcation

A

C. exploit known security vulnerabilities

20
Q

Earlier in the year a server was reconfigured after a secuirty problem. Now the server must be moved to a new DMZ and be reconfigured again. What is the best proactice to follow prior reconfiguration? A. Review how the server is curretnly configured B. Examine the change control documentaion for the server C. consult with the engineer responsible for the server D. examine the current server configuration and consult with the engineer responsible for the server

A

B. Examine the change control documentaion for the server

21
Q

Who has the final approval of an organizational BCP? A. technology leadership team B. business process team C. human resources team D. executive level management team

A

D. executive level management team

22
Q

The BIA process for Disaster Recovery Plan should include A. law enforcement B. personnel C. competitiors D. vendors

A

B. personnel

23
Q

How often should the BCP/DRP plan be updated? A. annual B. every time the plan is tested C. semi-annual D. after a personnel change

A

B. every time the plan is tested

24
Q

When implementing a discovery solution for incident response for hard disks across an organization’s computing environment, it is important to A. involve individuals only with a need to know B. inform end users of the new secuirty capabilities C. initiate discovery immediately after an incident occurs D. implement the solution for users with regulated computers

A

A. involve individuals only with a need to know

25
Q

What is a significant advantage human guards have over other forms of technical access control? A. they may be operationally active 24 hours per day B. they can recogonize multiple forms of access credentials C. they are the most effective type of visible deterrent D. they can accurately log personnel’s access to the facilities

A

B. they can recogonize multiple forms of access credentials