CISSP (Chapter 1) Flashcards
CISSP (Chapter 1)
Which of the following provides an incorrect characteristic of a memory leak?A. Common programming errorB. Common when languages that have no built-in automatic garbage collection are usedC. Common in applications written in JavaD. Common in applications written in C++
C
CISSP (Chapter 1)
Which of the following is the best description pertaining to the “Trusted Computing Base”?A. The term originated from the Orange Book and pertains to firmware.B. The term originated from the Orange Book and addresses the security mechanisms that are only implemented by the operating system.C. The term originated from the Orange Book and contains the protection mechanisms within a system.D. The term originated from the Rainbow Series and addressed the level of significance each mechanism of a system portrays in a secure environment.
C
CISSP (Chapter 1)
Which of the following is the best description of the security kernel and the reference monitor?A. The reference monitor is a piece of software that runs on top of the security kernel. The reference monitor is accessed by every security call of the security kernel. The security kernel is too large to test and verify.B. The reference monitor concept is a small program that is not related to the security kernel. It will enforce access rules upon subjects who attempt to access specific objects. This program is regularly used with modern operating systems.C. The reference monitor concept is used strictly for database access control and is one of the key components in maintaining referential integrity within the system. It is impossible for the user to circumvent the reference monitor.D. The reference monitor and security kernel are core components of modern operating systems. They work together to mediate all access between subjects and objects. They should not be able to be circumvented and must be called upon for every access attempt.
D
CISSP (Chapter 1)
Which of the following models incorporates the idea of separation of duties and requires that all modifications to data and objects be done through programs?A. State machine modelB. Bell-LaPadula modelC. Clark-Wilson modelD. Biba model
C
CISSP (Chapter 1)
Which of the following best describes the hierarchical levels of privilege within the architecture of a computer system?A. Computer system ring structureB. Microcode abstraction levels of securityC. Operating system user modeD. Operating system kernel mode
A
CISSP (Chapter 1)
Which of the following is an untrue statement?i. Virtual machines can be used to provide secure, isolated sandboxes for running untrusted applications.ii. Virtual machines can be used to create execution environments with resource limits and, given the right schedulers, resource guarantees.iii. Virtualization can be used to simulate networks of independent computers.iv. Virtual machines can be used to run multiple operating systems simultaneously: different versions, or even entirely different systems, which can be on hot standby.A. All of themB. None of themC. i, iiD. ii, iii
B
CISSP (Chapter 1)
Which of the following is the best means of transferring information when parties do not have a shared secret and large quantities of sensitive information must be transmitted?A. Use of public key encryption to secure a secret key, and message encryption using the secret keyB. Use of the recipient’s public key for encryption, and decryption based on the recipient’s private keyC. Use of software encryption assisted by a hardware encryption acceleratorD. Use of elliptic curve encryption
A
CISSP (Chapter 1)
Which algorithm did NIST choose to become the Advanced Encryption Standard (AES) replacing the Data Encryption Standard (DES)?A. DEAB. RijndaelC. TwofishD. IDEA
B
CISSP (Chapter 1)
John is the security administrator for company X. He has been asked to oversee the installation of a fire suppression sprinkler system, as recent unusually dry weather has increased the likelihood of fire. Fire could potentially cause a great amount of damage to the organization’s assets. The sprinkler system is designed to reduce the impact of fire on the company. In this scenario, fire is considered which of the following?A. VulnerabilityB. ThreatC. RiskD. Countermeasure
B
CISSP (Chapter 1)
John is the security administrator for company X. He has been asked to oversee the installation of a fire suppression sprinkler system, as recent unusually dry weather has increased the likelihood of fire. Fire could potentially cause a great amount of damage to the organization’s assets. The sprinkler system is designed to reduce the impact of fire on the company. In this scenario, the sprinkler system is considered which of the following?A. VulnerabilityB. ThreatC. RiskD. Countermeasure
D
CISSP (Chapter 1)
John is the security administrator for company X. He has been asked to oversee the installation of a fire suppression sprinkler system, as recent unusually dry weather has increased the likelihood of fire. Fire could potentially cause a great amount of damage to the organization’s assets. The sprinkler system is designed to reduce the impact of fire on the company. In this scenario, the likelihood and damage potential of a fire is considered which of the following?A. VulnerabilityB. ThreatC. RiskD. Countermeasure
C
CISSP (Chapter 1)
A small remote facility for a company is valued at $800,000. It is estimated, based on historical data and other predictors, that a fire is likely to occur once every ten years at a facility in this area. It is estimated that such a fire would destroy 60 percent of the facility under the current circumstances and with the current detective and preventative controls in place.What is the single loss expectancy (SLE) for the facility suffering from a fire?A. $80,000B. $480,000C. $320,000D. 60 percent
B
CISSP (Chapter 1)
A small remote facility for a company is valued at $800,000. It is estimated, based on historical data and other predictors, that a fire is likely to occur once every ten years at a facility in this area. It is estimated that such a fire would destroy 60 percent of the facility under the current circumstances and with the current detective and preventative controls in place.What is the annualized rate of occurrence (ARO)?A. 1B. 10C. .1D. .01
C
CISSP (Chapter 1)
A small remote facility for a company is valued at $800,000. It is estimated, based on historical data and other predictors, that a fire is likely to occur once every ten years at a facility in this area. It is estimated that such a fire would destroy 60 percent of the facility under the current circumstances and with the current detective and preventative controls in place.What is the annualized loss expectancy (ALE)?A. $480,000B. $32,000C. $48,000D. .6
C
CISSP (Chapter 1)
Which of the following is not a characteristic of Protected Extensible Authentication Protocol?A. Authentication protocol used in wireless networks and point-to-point connectionsB. Designed to provide improved secure authentication for 802.11 WLANsC. Designed to support 802.1x port access control and Transport Layer SecurityD. Designed to support password-protected connections
D
CISSP (Chapter 1)
Which of the following best describes the Temporal Key Integrity Protocol’s (TKIP) role in the 802.11i standard?A. It provides 802.1x and EAP to increase the authentication strength.B. It requires the access point and the wireless device to authenticate to each other.C. It sends the SSID and MAC value in ciphertext.D. It adds more keying material for the RC4 algorithm.
D
CISSP (Chapter 1)
Vendors have implemented various solutions to overcome the vulnerabilities of the wired equivalent protocol (WEP). Which of the following provides an incorrect mapping between these solutions and their characteristics?A. LEAP requires a PKI.B. PEAP only requires the server to authenticate using a digital certificate.C. EAP-TLS requires both the wireless device and server to authenticate using digital certificates.D. PEAP allows the user to provide a password
A
CISSP (Chapter 1)
Encapsulating Security Payload (ESP), which is one protocol within the IPSec protocol suite, is primarily designed to provide which of the following?A. ConfidentialityB. CryptographyC. Digital signaturesD. Access control
A
CISSP (Chapter 1)
Which of the following redundant array of independent disks implementations uses interleave parity?A. Level 1B. Level 2C. Level 4D. Level 5
D