CISSP-FD review questions Flashcards
1 General-purpose control types include all the following except A ❍ Detective B ❍ Mandatory C ❍ Preventive D ❍ Compensating
B
2 Violation reports and audit trails are examples of what type of control? A ❍ Detective technical B ❍ Preventive technical C ❍ Detective administrative D ❍ Preventive administrative
A
3 “A user cannot deny an action” describes the concept of A ❍ Authentication B ❍ Accountability C ❍ Non-repudiation D ❍ Plausible deniability
C
4 Authentication can be based on any combination of the following factors except A ❍ Something you know B ❍ Something you have C ❍ Something you need D ❍ Something you are
C
5 Unauthorized users that are incorrectly granted access in biometric systems are described as the A ❍ False Reject Rate (Type II error) B ❍ False Accept Rate (Type II error) C ❍ False Reject Rate (Type I error) D ❍ False Accept Rate (Type I error)
B
6 All the following devices and protocols can be used to implement one-time passwords except A ❍ Tokens B ❍ S/Key C ❍ Diameter D ❍ Kerberos
D
7 Which of the following PPP authentication protocols transmits passwords in clear text? A ❍ PAP B ❍ CHAP C ❍ MS-CHAP D ❍ FTP
A
8 Which of the following is not considered a method of attack against access control systems? A ❍ Brute force B ❍ Dictionary C ❍ Denial of Service D ❍ Buffer overflow
C
9 Sensitivity labels are a fundamental component in which type of access control systems? A ❍ Mandatory access control B ❍ Discretionary access control C ❍ Access control lists D ❍ Role-based access control
A
10 Which of the following access control models addresses availability issues? A ❍ Bell-La Padula B ❍ Biba C ❍ Clark-Wilson D ❍ None of the above
D
1 A data network that operates across a relatively large geographic area defines what type of network? A ❍ LAN B ❍ MAN C ❍ CAN D ❍ WAN
D
2 The process of wrapping protocol information from one layer in the data section of another layer describes A ❍ Data encryption B ❍ Data encapsulation C ❍ Data hiding D ❍ TCP wrappers
B
3 The LLC and MAC are sub-layers of what OSI model layer? A ❍ Data Link B ❍ Network C ❍ Transport D ❍ Session
A
4 The Ethernet protocol is defined at what layer of the OSI model and in which IEEE standard? A ❍ Data Link Layer, 802.3 B ❍ Network Layer, 802.3 C ❍ Data Link Layer, 802.5 D ❍ Network Layer, 802.5
A
5 All the following are examples of packet-switched WAN protocols, except A ❍ X.25 B ❍ Frame Relay C ❍ ISDN D ❍ SMDS
C
6 Which of the following is an example of a Class C IP address? A ❍ 17.5.5.1 B ❍ 127.0.0.1 C ❍ 192.167.4.1 D ❍ 224.0.0.1
C
7 The TCP/IP Protocol Model consists of the following four layers:
A ❍ Application, Presentation, Session, Transport
B ❍ Application, Session, Network, Physical
C ❍ Application, Session, Transport, Internet
D ❍ Application, Transport, Internet, Link
D
8 Which of the following firewall architectures employs external and internal routers, as well as a bastion host? A ❍ Screening router B ❍ Screened-subnet C ❍ Screened-host gateway D ❍ Dual-homed gateway
B
9 Which of the following is not a common VPN protocol standard? A ❍ IPSec B ❍ PPTP C ❍ TFTP D ❍ L2TP
C
10 A type of network attack in which TCP packets are sent from a spoofed source address with the SYN bit set describes A ❍ Smurf B ❍ Fraggle C ❍ Teardrop D ❍ SYN flood
D
1 The three elements of the C-I-A triad include
A ❍ Confidentiality, integrity, authentication
B ❍ Confidentiality, integrity, availability
C ❍ Confidentiality, integrity, authorization
D ❍ Confidentiality, integrity, accountability
B
2 Which of the following government data classification levels describes
information that, if compromised, could cause serious damage to national
security?
A ❍ Top Secret
B ❍ Secret
C ❍ Confidential
D ❍ Sensitive but Unclassified
B
3 The practice of regularly transferring personnel into different positions or
departments within an organization is known as
A ❍ Separation of duties
B ❍ Reassignment
C ❍ Lateral transfers
D ❍ Job rotations
D
4 The individual responsible for assigning information classification levels for assigned information assets is A ❍ Management B ❍ Owner C ❍ Custodian D ❍ User
B
5 Most security policies are categorized as A ❍ Informative B ❍ Regulatory C ❍ Mandatory D ❍ Advisory
D
6 A baseline is a type of A ❍ Policy B ❍ Guideline C ❍ Procedure D ❍ Standard
D
7 ALE is calculated by using the following formula: A ❍ SLE × ARO × EF = ALE B ❍ SLE × ARO = ALE C ❍ SLE + ARO = ALE D ❍ SLE – ARO = ALE
B
8 Which of the following is not considered a general remedy for risk management? A ❍ Risk reduction B ❍ Risk acceptance C ❍ Risk assignment D ❍ Risk avoidance
D
9 Failure to implement a safeguard may result in legal liability if
A ❍ The cost to implement the safeguard is less than the cost of the associated
loss.
B ❍ The cost to implement the safeguard is more than the cost of the associated
loss.
C ❍ An alternate but equally effective and less expensive safeguard is
implemented.
D ❍ An alternate but equally effective and more expensive safeguard is
implemented.
A
10 A cost-benefit analysis is useful in safeguard selection for determining A ❍ Safeguard effectiveness B ❍ Technical feasibility C ❍ Cost-effectiveness D ❍ Operational impact
C
1 Masquerading as another person in order to obtain information illicitly is known as A ❍ Hacking B ❍ Social engineering C ❍ Extortion D ❍ Exhumation
B
2 Viruses, rootkits, and Trojan horses are known as A ❍ Maniacal code B ❍ Fractured code C ❍ Infectious code D ❍ Malicious code
D
3 Antivirus software that detects viruses by watching for anomalous behavior uses what technique? A ❍ Signature matching B ❍ Fleuristics C ❍ Heroistics D ❍ Heuristics
D
4 A developer, suspecting that he may be fired soon, modifies an important
program that will corrupt payroll files long after he is gone. The developer has
created a(n)
A ❍ Delayed virus
B ❍ Logic bomb
C ❍ Applet bomb
D ❍ Trojan horse
B
5 A SYN flood is an example of a A ❍ Dictionary attack B ❍ High Watermark attack C ❍ Buffer Overflow attack D ❍ Denial of Service attack
D
6 The process of recording changes made to systems is known as A ❍ Change Review Board B ❍ System Maintenance C ❍ Change Management D ❍ Configuration Management
D
7 A system that accumulates knowledge by observing events’ inputs and outcomes is known as a(n) A ❍ Expert system B ❍ Neural network C ❍ Synaptic network D ❍ Neural array
B
8 The logic present in an object is known as A ❍ Encapsulation B ❍ Personality C ❍ Behavior D ❍ Method
D
9 The restricted environment that Java applets occupy is known as a A ❍ Sandbox B ❍ Workbox C ❍ Trusted Zone D ❍ Instantiation
A
10 An attacker has placed a URL on a website that, if clicked, will cause malicious
javascript to execute on victims’ browsers. This is known as a
A ❍ Phishing attack
B ❍ Script injection attack
C ❍ Cross-site scripting attack
D ❍ Cross-site request forgery attack
C
1 The four modes of DES include all the following except A ❍ ECB B ❍ ECC C ❍ CFB D ❍ CBC
B
2 A type of cipher that replaces bits, characters, or character blocks with
alternate bits, characters, or character blocks to produce ciphertext is known
as a
A ❍ Permutation cipher
B ❍ Block cipher
C ❍ Transposition cipher
D ❍ Substitution cipher
D
3 Which of the following is not an advantage of symmetric key systems? A ❍ Scalability B ❍ Speed C ❍ Strength D ❍ Availability
A
4 The Advanced Encryption Standard (AES) is based on what symmetric key algorithm? A ❍ Twofish B ❍ Knapsack C ❍ Diffie-Hellman D ❍ Rijndael
D
5 A message that’s encrypted with only the sender’s private key, for the
purpose of authentication, is known as a(n)
A ❍ Secure message format
B ❍ Signed and secure message format
C ❍ Open message format
D ❍ Message digest
C
6 All the following are examples of asymmetric key systems based on discrete logarithms except A ❍ Diffie-Hellman B ❍ Elliptic Curve C ❍ RSA D ❍ El Gamal
C
7 The four main components of a Public Key Infrastructure (PKI) include all the following except A ❍ Directory Service B ❍ Certification Authority C ❍ Repository D ❍ Archive
A
8 Which of the following Internet specifications provides secure e-commerce by
using symmetric key systems, asymmetric key systems, and dual signatures?
A ❍ Public Key Infrastructure (PKI)
B ❍ Secure Electronic Transaction (SET)
C ❍ Secure Sockets Layer (SSL)
D ❍ Secure Hypertext Transfer Protocol (S-HTTP)
B
9 The minimum number of SAs required for a two-way IPSec session between
two communicating hosts using both AH and ESP is
A ❍ 1
B ❍ 2
C ❍ 4
D ❍ 8
C
10 An IPSec SA consists of the following parameters, which uniquely identify it in an IPSec session, except A ❍ Source IP Address B ❍ Destination IP Address C ❍ Security Protocol ID D ❍ Security Parameter Index (SPI)
A
1 The four CPU operating states include all the following except A ❍ Operating B ❍ Problem C ❍ Wait D ❍ Virtual
D
2 A computer system that alternates execution of multiple subprograms on a
single processor describes what type of system?
A ❍ Multiprogramming
B ❍ Multitasking
C ❍ Multiuser
D ❍ Multiprocessing
B
3 An address used as the origin for calculating other addresses describes A ❍ Base addressing B ❍ Indexed addressing C ❍ Indirect addressing D ❍ Direct addressing
A
4 The four main functions of the operating system include all the following except A ❍ Process management B ❍ BIOS management C ❍ I/O device management D ❍ File management
B
5 The total combination of protection mechanisms within a computer system,
including hardware, firmware, and software, which is responsible for enforcing
a security policy defines
A ❍ Reference monitor
B ❍ Security kernel
C ❍ Trusted Computing Base
D ❍ Protection domain
C
6 A system that continues to operate following failure of a network component describes which type of system? A ❍ Fault-tolerant B ❍ Fail-safe C ❍ Fail-soft D ❍ Failover
A
7 Which of the following access control models addresses availability issues? A ❍ Bell-LaPadula B ❍ Biba C ❍ Clark-Wilson D ❍ None of the above
D
8 The four basic control requirements identified in the Orange Book include all the following except A ❍ Role-based access control B ❍ Discretionary access control C ❍ Mandatory access control D ❍ Object reuse
A
9 The purpose of session management in a web application is
A ❍ To prevent Denial of Service attacks
B ❍ To collect session-based security metrics
C ❍ To control the number of concurrent sessions
D ❍ To protect sessions from unauthorized access
D
10 Which of the following ITSEC classification levels is equivalent to TCSEC level B3? A ❍ E3 B ❍ E4 C ❍ E5 D ❍ E6
C
1 The two types of intrusion detection are
A ❍ Attack-based systems and response-based systems
B ❍ Signature-based systems and anomaly-based systems
C ❍ Knowledge-based systems and scripture-based systems
D ❍ Passive monitoring systems and active monitoring systems
B
2 Recording data traveling on a network is known as A ❍ Promiscuous mode B ❍ Packet sniffing C ❍ Packet snoring D ❍ Packing sneaking
B
3 Which of the following is NOT an example of penetration testing? A ❍ Radiation monitoring B ❍ War driving C ❍ Port scanning D ❍ War diving
D
4 Trusted recovery is concerned with
A ❍ The ability of a system to be rebuilt
B ❍ The vulnerability of a system while it’s being rebuilt
C ❍ The ability of a system to rebuild itself
D ❍ The willingness of a system to rebuild itself
B
5 The third-party inspection of a system is known as a(n) A ❍ Confidence check B ❍ Integrity trail C ❍ Audit trail D ❍ Audit
D
6 One of the primary concerns with long-term audit log retention is
A ❍ Whether anyone will be around who can find them
B ❍ Whether any violations of privacy laws have occurred
C ❍ Whether anyone will be around who understands them
D ❍ Whether any tape/disk drives will be available to read them
D
7 The required operating state of a network interface on a system running a sniffer is A ❍ Open mode B ❍ Promiscuous mode C ❍ Licentious mode D ❍ Pretentious mode
B
8 Filling a system’s hard drive so that it can no longer record audit records is known as a(n) A ❍ Audit lock-out B ❍ Audit exception C ❍ Denial of Facilities attack D ❍ Denial of Service attack
D
9 An investigator who needs to have access to detailed employee event information may need to use A ❍ Keystroke monitoring B ❍ Intrusion detection C ❍ Keystroke analysis D ❍ Trend analysis
A
10 Which of the following is NOT true about a signature-based IDS?
A ❍ It reports a low number of false-positives.
B ❍ It requires periodic updating of its signature files.
C ❍ It reports a high number of false-positives.
D ❍ It can’t detect anomalies based on trends.
C
1 The longest period of time that a business can survive without a critical function is called A ❍ Downtime Tolerability Period B ❍ Greatest Tolerable Downtime C ❍ Maximum Survivable Downtime D ❍ Maximum Tolerable Downtime
D
2 Which of the following is not a natural disaster? A ❍ Avalanche B ❍ Stock market crash C ❍ Fire D ❍ Water supply storage drought
B
3 The impact of a disaster on business operations is contained in A ❍ Local newspapers and online media B ❍ The Business Impact Assessment C ❍ The Operations Impact Assessment D ❍ The Vulnerability Assessment
B
4 The decision whether to purchase an emergency generator is based on A ❍ Wholesale electric rates B ❍ Retail electric rates C ❍ The duration of a typical outage D ❍ The income rate of affected systems
C
5 The purpose of a UPS is
A ❍ To provide instantaneous power cutover when utility power fails
B ❍ A lower cost for overnight shipping following a disaster
C ❍ The need to steer an unresponsive vehicle after it’s moving again
D ❍ To restore electric power within 24 hours
A
6 The Business Impact Assessment
A ❍ Describes the impact of disaster recovery planning on the budget
B ❍ Describes the impact of a disaster on business operations
C ❍ Is a prerequisite to the Vulnerability Assessment
D ❍ Is the first official statement produced after a disaster
B
7 To maximize the safety of backup media, it should be stored
A ❍ At a specialized off-site media storage facility
B ❍ At the residences of various senior managers
C ❍ In the operations center in a locked cabinet
D ❍ Between 50°F and 60°F
A
8 An alternate information-processing facility with all systems, patches, and
data mirrored from live production systems is known as a
A ❍ Warm site
B ❍ Hot site
C ❍ Recovery site
D ❍ Mutual Aid Center
B
9 The greatest advantage of a cold site is A ❍ It can be built nearly anywhere B ❍ Its high responsiveness C ❍ Its low cost D ❍ Its close proximity to airports
C
10 The most extensive test for a Disaster Recovery Plan A ❍ Has dual failover B ❍ Is a waste of paper C ❍ Is known as a parallel test D ❍ Is known as an interruption test
D
1 Penalties for conviction in a civil case can include A ❍ Imprisonment B ❍ Probation C ❍ Fines D ❍ Community service
C
2 Possible damages in a civil case are classified as all the following except A ❍ Compensatory B ❍ Punitive C ❍ Statutory D ❍ Financial
D
3 Computer attacks motivated by curiosity or excitement describe A ❍ “Fun” attacks B ❍ Grudge attacks C ❍ Business attacks D ❍ Financial attacks
A
4 Intellectual property includes all the following except A ❍ Patents and trademarks B ❍ Trade secrets C ❍ Copyrights D ❍ Computers
D
5 Under the Computer Fraud and Abuse Act of 1986 (as amended), which of the
following is not considered a crime?
A ❍ Unauthorized access
B ❍ Altering, damaging, or destroying information
C ❍ Trafficking child pornography
D ❍ Trafficking computer passwords
C
6 Which of the following is not considered one of the four major categories of evidence? A ❍ Circumstantial evidence B ❍ Direct evidence C ❍ Demonstrative evidence D ❍ Real evidence
A
7 In order to be admissible in a court of law, evidence must be A ❍ Conclusive B ❍ Relevant C ❍ Incontrovertible D ❍ Immaterial
B
8 What term describes the evidence-gathering technique of luring an individual
toward certain evidence after that individual has already committed a crime;
is this considered legal or illegal?
A ❍ Enticement/Legal
B ❍ Coercion/Illegal
C ❍ Entrapment/Illegal
D ❍ Enticement/Illegal
A
9 In a civil case, the court may issue an order allowing a law enforcement official
to seize specific evidence. This order is known as a(n)
A ❍ Subpoena
B ❍ Exigent circumstances doctrine
C ❍ Writ of Possession
D ❍ Search warrant
C
10 When should management be notified of a computer crime?
A ❍ After the investigation has been completed
B ❍ After the preliminary investigation
C ❍ Prior to detection
D ❍ As soon as it has been detected
D
1 The three elements of the fire triangle necessary for a fire to burn include all the following except A ❍ Fuel B ❍ Oxygen C ❍ Heat D ❍ Nitrogen
D
2 Electrical fires are classified as what type of fire and use what extinguishing methods? A ❍ Class B; CO2 or soda acid B ❍ Class B; CO2 or FM-200 C ❍ Class C; CO2 or FM-200 D ❍ Class A; water or soda acid
C
3 A prolonged drop in voltage describes what electrical anomaly? A ❍ Brownout B ❍ Blackout C ❍ Sag D ❍ Fault
A
4 What type of cabling should be used below raised floors and above drop ceilings? A ❍ CAT-5 B ❍ Plenum C ❍ PVC D ❍ Water-resistant
B
5 In order to deter casual trespassers, fencing should be a minimum height of A ❍ 1 to 3 feet B ❍ 3 to 4 feet C ❍ 6 to 7 feet D ❍ 8 feet or higher
B
6 Three types of intrusion detection systems (IDSs) used for physical security
include photoelectric sensors, dry contact switches, and which of the
following?
A ❍ Motion detectors
B ❍ Anomaly-based
C ❍ Host-based
D ❍ Network-based
A
7 A water sprinkler system in which no water is initially present in the pipes
and which, at activation, delivers a large volume of water describes what type
of system?
A ❍ Wet-pipe
B ❍ Dry-pipe
C ❍ Deluge
D ❍ Preaction
C
8 Portable CO2 fire extinguishers are classified as what type of extinguishing system? A ❍ Gas-discharge systems B ❍ Water sprinkler systems C ❍ Deluge systems D ❍ Preaction systems
A
9 Which of the following extinguishing agents fights fires by separating the elements
of the fire triangle, rather than by simply removing one element?
A ❍ Water
B ❍ Soda acid
C ❍ CO2
D ❍ FM-200
D
10 Production of Halon has been banned for what reason?
A ❍ It is toxic at temperatures above 900°F.
B ❍ It is an ozone-depleting substance.
C ❍ It is ineffective.
D ❍ It is harmful if inhaled.
B
1 The number-one priority of disaster planning should always be:
A Preservation of capital
B Personnel evacuation and safety
C Resumption of core business functions
D Investor relations
1 B. See Chapter 11. People and their safety always come first!
2 An access control system that grants access to information based on that
information’s classification and the clearance of the individual is known as:
A Identity-based access control
B Mandatory access control
C Role-based access control
D Clearance-based access control
2 B. See Chapter 4. Mandatory access control is based on the user’s clearance
level, the classification of the information, and the user’s need-to-know.
3 A database that contains the data structures used by an application is known as: A A data encyclopedia B A data dictionary C Metadata D A schema
3 B. See Chapter 7. A data dictionary contains information about an application’s
data structures, including table names, field names, indexes, and so on.
4 The process of breaking the key and/or plaintext from an enciphered message is known as: A Decryption B Steganography C Cryptanalysis D Extraction
4 C. See Chapter 8. Cryptanalysis is the process of getting the key and/or the
original message the hard way.
5 The Internet Worm incident of 1988 was perpetrated by: A The 414 Gang B Robert Morris C Kevin Mitnick D Gene Spafford
5 B. See Chapter 7. Robert Tappan Morris wrote and released what’s now
known as the Internet Worm in 1988. Researcher Gene Spafford wrote several
papers on the topic.
6 Access controls and card key systems are examples of: A Detective controls B Preventive controls C Corrective controls D Trust controls
6 B. See Chapter 10. Preventive controls are designed to prevent a security
incident.
7 Why should a datacenter’s walls go all the way to the ceiling and not just
stop as high as the suspended ceiling?
A The walls will be stronger.
B The HVAC will run more efficiently.
C An intruder could enter the datacenter by climbing over the low wall.
D The high wall will block more noise.
7 C. See Chapter 13. The primary concern here is to keep intruders out, which
is why computer room walls should extend from the true floor to the true
ceiling.
8 Memory that’s used to store computer instructions and data is known as: A UART B SIMM C Cache D ROM
8 C. See Chapter 9. Cache memory holds instructions and data that are likely to
be frequently accessed. Cache memory is faster than RAM, so it can contribute
to faster performance.
9 Of what value is separation of authority in an organization?
A It limits the capabilities of any single individual.
B It provides multiple paths for fulfilling critical tasks.
C It accommodates the requirement for parallel audit trails.
D It ensures that only one person is authorized to perform each task.
9 A. See Chapter 6. Separation of authority makes it difficult for an individual
to steal an organization’s assets because it requires others to cooperate with
the would-be criminal.
10 UDP is sometimes called the “unreliable data protocol” because:
A It works only on low-speed wireless LANs.
B UDP packets rarely get through because they have a lower priority.
C Few know how to program UDP.
D UDP does not guarantee delivery.
10 D. See Chapter 5. UDP has no guarantee of delivery, nor sequencing or
acknowledgement.
11 Which of the following is NOT a goal of a Business Impact Assessment
(BIA)?
A To inventory mutual aid agreements
B To identify and prioritize business critical functions
C To determine how much downtime the business can tolerate
D To identify resources required by critical processes
11 A. See Chapter 11. Mutual aid agreements aren’t a significant concern of a
Business Impact Assessment (BIA). They’re instead a part of contingency
planning.
12 An access control system that grants access to information based on the identity of the user is known as: A Identity-based access control B Mandatory access control C Role-based access control D Clearance-based access control
12 A. See Chapter 4. Identity-based access control is used to grant access to
information based on the identity of the person requesting access.
13 The purpose of a Service-Level Agreement is:
A To guarantee a minimum quality of service for an application or
function
B To guarantee the maximum quality of service for an application or
function
C To identify gaps in availability of an application
D To correct issues identified in a security audit
13 A. See Chapter 7. A Service-Level Agreement (SLA) defines minimum performance
metrics of an application or service.
14 The method of encryption in which both sender and recipient possess a common encryption key is known as: A Message digest B Hash function C Public key cryptography D Secret key cryptography
14 D. See Chapter 8. Secret key cryptography is used when all parties possess a
common key.
15 Forensics is the term that describes:
A Due process
B Tracking hackers who operate in other countries
C Taking steps to preserve and record evidence
D Scrubbing a system in order to return it to service
15 C. See Chapter 12. Forensics is the activity of discovering, preserving, and
recording evidence.
16 Audit trails and security cameras are examples of: A Detective controls B Preventive controls C Corrective controls D Trust controls
16 A. See Chapter 10. Detective controls are designed to record security events.
17 How does water aid in fire suppression?
A It reduces the fire’s oxygen supply.
B It isolates the fire’s fuel supply.
C It lowers the temperature to a degree at which the fire can’t sustain
itself.
D It extinguishes the fire through a chemical reaction.
17 C. See Chapter 13. Water cools the fuel to the point where the fire can’t continue.
Also, to some extent, water is a physical barrier between the fuel and
oxygen.
18 Firmware is generally stored on: A ROM or EPROM B Tape C RAM D Any removable media
18 A. See Chapter 9. Firmware is software that’s seldom changed. Firmware is
generally used to control low-level functions in computer hardware and
embedded systems.
19 The term open view refers to what activity?
A Reclassifying a document so that anyone can view it
B Viewing the contents of one’s private encryption key
C Leaving classified information where unauthorized people can see it
D Using a decryption key to view the contents of a message
19 C. See Chapter 6. Open view is the act of leaving a classified document out in
the open so that it can be viewed by anyone.
20 TCP is a poor choice for streaming video because:
A It is too bursty for large networks.
B Acknowledgment and sequencing add significantly to its overhead.
C Checksums in video packets are meaningless.
D TCP address space is nearly exhausted.
20 B. See Chapter 5. TCP adds unnecessary overhead. Streaming video can
afford to lose a packet now and then.
21 The longest period of time that an organization can accept a critical outage is known as: A Maximum Acceptable Downtime B Greatest Tolerated Downtime C Maximum Tolerable Downtime D Recovery Time Objective
21 C. See Chapter 11. Maximum Tolerable Downtime (MTD) is the length of time
that an organization can tolerate critical processes being inoperative.
22 An access control system that gives the user some control over who has access to information is known as: A Identity-based access control B User-directed access control C Role-based access control D Clearance-based access control
22 B. See Chapter 4. User-directed access control, a form of discretionary access
control, permits the user to grant access to information based on certain
limitations.
23 CRCs, parity checks, and checksums are examples of: A Corrective application controls B Message digests C Preventive application controls D Detective application controls
23 D. See Chapter 4. Cyclical Redundancy Checks (CRCs), parity checks, and
checksums are examples of detective application controls because they’re
designed to help discover security breaches (as well as network malfunctions
and other undesired events) in a network.
24 Why would a user’s public encryption key be widely distributed?
A So that cryptographers can attempt to break it
B Because it’s encrypted
C Because the user’s private key can’t be derived from his or her public key
D So that the user can decrypt messages from any location
24 C. See Chapter 8. In public key cryptography, the value of the public key
doesn’t in any way betray the value of the secret key.
25 An expert witness:
A Offers an opinion based on the facts of a case and on personal expertise
B Is someone who was present at the scene of the crime
C Has direct personal knowledge about the event in question
D Can testify in criminal proceedings only
25 A. See Chapter 12. An expert witness offers his or her opinion based on the
facts of the case and on personal expertise.
26 Reboot instructions and file restore procedures are examples of: A Detective controls B Preventive controls C Corrective controls D Trust controls
26 C. See Chapter 10. Corrective controls are used to resume business operations
after a security incident.
27 Drain pipes that channel liquids away from a building are called: A Positive drains B Tight lines C Storm drains D Negative drains
27 A. See Chapter 13. Positive drains are those that carry liquids away from a
building.
28 What’s the purpose of memory protection?
A It protects memory from malicious code.
B It prevents a program from being able to access memory used by
another program.
C Memory protection is another term used to describe virtual memory
backing store.
D It assures that hardware refresh happens frequently enough to maintain
memory integrity.
28 B. See Chapter 9. Memory protection is a machine-level security feature that
prevents one program from being able to read or alter memory assigned to
another program.
29 Which individual is responsible for classifying information? A Owner B Custodian C Creator D User
29 A. See Chapter 6. The information owner is ultimately responsible for the
information asset and for its initial classification.
30 How many layers does the TCP/IP protocol model have? A 4 B 5 C 6 D 7
30 A. See Chapter 5. There are four layers in the TCP/IP model: Network Access,
Internet, Transport, and Application.
31 The primary difference between a hot site and a warm site is:
A The hot site is closer to the organization’s datacenters than the warm site.
B The warm site’s systems don’t have the organization’s software or data
installed.
C The warm site doesn’t have computer systems in it.
D The warm site is powered down, but the hot site is powered up and
ready to go.
31 B. See Chapter 11. Warm sites are mostly like hot sites, except that the organization’s
software and data aren’t on the warm site’s systems.
32 Encryption, tokens, access control lists, and smart cards are known as: A Discretionary access controls B Physical controls C Technical controls D Administrative controls
32 C. See Chapter 4. Encryption, tokens, access control lists, and smart cards are
examples of technical, or logical, controls.
33 Data mining:
A Can be performed by privileged users only
B Is generally performed after hours because it’s resource-intensive
C Refers to searches for correlations in a data warehouse
D Is the term used to describe the activities of a hacker who has broken
into a database
33 C. See Chapter 7. Data mining is the term used to describe searches for correlations,
patterns, and trends in a data warehouse.
34 Reading down the columns of a message that has been written across is known as: A A columnar transposition cipher B Calculating the hash C Calculating the checksum D Calculating the modulo
34 A. See Chapter 8. In this cipher, the cryptographer writes across but reads
down.
35 A witness:
A Offers an opinion based on the facts of a case and on personal expertise
B Is someone who was present at the scene of the crime
C Has direct personal knowledge about the event in question
D Can testify in criminal proceedings only
35 C. See Chapter 12. A witness testifies the facts as he or she understands
them.
36 Covert channel analysis is used to: A Detect and understand unauthorized communication B Encipher unauthorized communications C Decipher unauthorized communications D Recover unauthorized communications
36 A. See Chapter 10. Covert channel analysis is used to detect, understand, and
help security personnel to prevent the creation and operation of covert
channels.
37 Of what value is pre-employment screening?
A Undesirable medical or genetic conditions could diminish productivity.
B Only certain personality types can work effectively in some
organizations.
C Employees need to have knowledge of security.
D Background checks could uncover undesirable qualities.
37 D. See Chapter 6. It’s infinitely better to find undesirable qualities, such as a
criminal history, prior to making an employment decision.
38 The mapping of existing physical memory into a larger, imaginary memory space is known as: A Virtual memory B Swapping C Thrashing D Spooling
38 A. See Chapter 9. The virtual memory model is used to create a memory
space that’s larger than the available physical memory.
39 Which individual is responsible for protecting information? A Owner B Custodian C Creator D User
39 B. See Chapter 6. The custodian protects the information on behalf of its
owner.
40 ARP is: A Access Routing Protocol B Address Resolution Protocol C Access Resolution Protocol D Address Recovery Protocol
40 B. See Chapter 5. ARP is the Address Resolution Protocol.