CISSP CBK Review Seminar -- Domain 3 Flashcards
Domain 3
- Which one of the following is the MOST effective method for reducing security vulnerabilities associated with building entrances?
(A) Minimize the number of entrances
(B) Use solid metal doors and frames
(C) Brightly illuminate the entrances
(D) Install tamperproof hinges and glass
(A) Minimize the number of entrances
- Important documents that have been soaked in water during fire suppression efforts should be restored by
(A) document recovery specialists.
(B) Human Resources personnel.
(C) document library personnel.
(D) fire department specialists.
(A) document recovery specialists.
- In a discretionary mode, who has delegation authority to grant access to information?
(A) User
(B) Security officer
(C) Group leader
(D) Owner
(D) Owner
- Which of the following information system evaluation methods is process oriented rather than assurance oriented?
(A) International Organization for Standardization (ISO) 15408
(B) ISO 27002
(C) Systems Security Engineering Capability Maturity Model (SSE-CMM)
(D) Information Technology Security Evaluation Criteria (ITSEC)
(C) Systems Security Engineering Capability Maturity Model (SSE-CMM)
- What is one issue NOT addressed by the Bell-LaPadula model?
(A) Information flow control
(B) Security levels
(C) Need to Know
(D) Access modes
(C) Need to Know
- Which one of the following conditions is NOT necessary for a long dictionary attack to succeed?
(A) The attacker must have access to the target system.
(B) The attacker must have read access to the password file.
(C) The attacker must have write access to the password file.
(D) The attacker must know the password encryption mechanism and key
variable.
(C) The attacker must have write access to the password file.
- What type of subsystem is an application program that operates outside the operating system and carries out functions for a group of users, maintains some common data for all users in the group, and protects the data from improper access by users in the group?
(A) Prevented subsystem
(B) Protected subsystem
(C) File subsystem
(D) Directory subsystem
(B) Protected subsystem
- Which one of the following describes a reference monitor?
(A) Access control concept that refers to an abstract machine that mediates all accesses to objects by subjects
(B) Audit concept that refers to the monitoring and recording of all accesses to objects by subjects
(C) Identification concept that refers to the comparison of material supplied by a user with its reference profile
(D) Network control concept that distributes the authorization of subject accesses to objects
(A) Access control concept that refers to an abstract machine that mediates all accesses to objects by subjects
- Which one of the following does NOT describe an information integrity model?
(A) Clark-Wilson
(B) Bell-LaPadula
(C) Biba
(D) Sutherland
(B) Bell-LaPadula
- Which one of the following is NOT a valid X.509 V.3 certificate field?
(A) Subject’s public key information
(B) Subject’s X.500 name
(C) Issuer’s unique identifier
(D) Subject’s digital signature
(D) Subject’s digital signature
- Which one of the following represents an addition to a message digest (MD) algorithm to increase its cryptographic strength?
(A) Internet Security Association and Key Management Protocol (ISAKMP)/Oakley
(B) Keyed-Hash Message Authentication Code (HMAC)
(C) Triple Data Encryption Standard (3DES)
(D) Message Digest 5 (MD5)
(B) Keyed-Hash Message Authentication Code (HMAC)
- The three goals of integrity models are preventing unauthorized users from making modifications to data or programs, preventing authorized users from making improper or unauthorized modifications, and
(A) maintaining a current and complete audit record of all transactions.
(B) maintaining internal and external consistency of data and programs.
(C) assuring that all modifications are tracked to the responsible party.
(D) assuring data and programs are readily available to the intended user.
(B) maintaining internal and external consistency of data and programs.
- Which one of the following is used to provide authentication and confidentiality for e-mail messages?
(A) Digital signature
(B) Digital certificate
(C) Authentication Header (AH)
(D) Message digest (MD)
(B) Digital certificate
- When basic standards for software development are implemented within an organization and are in common use (defined, established, and documented), the organization has reached what level of the Capability Maturity Model Integration (CMMI) for software engineering?
(A) Level 1
(B) Level 2
(C) Level 3
(D) Level 4
(C) Level 3
- When considering the Heating, Ventilation, and Air Conditioning (HVAC) requirements for a data processing center, why should an information security architect be concerned with the effect of humidity on data availability?
(A) Low humidity may cause condensation to occur, which could lead to data loss through a short circuit.
(B) High humidity may lead to high electrostatic buildup, which could lead to data loss through static discharge.
(C) High humidity may cause condensation to occur, which could lead to data loss through a short circuit.
(D) Low humidity may lead to high electrostatic buildup, which could lead to data loss through condensation.
(C) High humidity may cause condensation to occur, which could lead to data loss through a short circuit.