CISSP-P3 Flashcards
- Regarding media sanitization, which of the following is the
correct order for fully and physically destroying hand-held
devices, such as cell phones? - Incinerate
- Disintegrate
- Pulverize
- Shred
a. 3, 2, 1, and 4
b. 4, 2, 3, and 1
c. 1, 4, 3, and 2
d. 1, 2, 4, and 3
- b. The correct order for fully and physically destroying hand-held
devices such as cell phones is shred, disintegrate, pulverize, and
incinerate. This is the best recommended practice for both public and
private sector organizations.
Shredding is a method of sanitizing media and is the act of cutting or
tearing into small particles. Here, the shredding step comes first to
make the cell phone inoperable quickly. Disintegration is a method of
sanitizing media and is the act of separating the equipment into
component parts. Disintegration cannot be the first step because some
determined attacker can assemble these parts and can make the cell
phone work. Pulverization is a method of sanitizing media and is the
act of grinding to a powder or dust. Incineration is a method of
sanitizing media and is the act of burning completely to ashes done in a
licensed incinerator. Note that one does not need to complete all these
methods, but can stop after any specific method and after reaching the
final goal based on the sensitivity and criticality of data on the device.
- Which of the following detects unauthorized changes to software
and information for commercial off-the-shelf integrity
mechanisms? - Tamper-evident system components
- Parity checks
- Cyclical redundancy checks
- Cryptographic hashes
a. 2 only
b. 2 and 3
c. 3 and 4
d. 1, 2, 3, and 4
- d. Organizations employ integrity verification mechanisms to look
for evidence of tampering, errors, and omissions. Software engineering
techniques such as parity checks, cyclical redundancy checks, and
cryptographic hashes are applied to the information system. In
addition, tamper-evident system components are required to ship from
software vendors to operational sites, and during their operation.
- Effective configuration change controls for hardware, software,
and firmware include: - Auditing the enforcement actions
- Preventing the installation of software without a signed certificate
- Enforcing the two-person rule for changes to systems
- Limiting the system developer/integrator privileges
a. 1 only
b. 3 only
c. 2 and 4
d. 1, 2, 3, and 4
- d. All four items are effective in managing configuration changes to
hardware, software, and firmware components of a system.
- An information system can be protected against denial-of service (DoS) attacks through:
- Network perimeter devices
- Increased capacity
- Increased bandwidth
- Service redundancy
a. 2 only
b. 3 only
c. 4 only
d. 1, 2, 3, and 4
- d. Network perimeter devices can filter certain types of packets to
protect devices on an organization’s internal network from being
directly affected by denial-of-service (DoS) attacks. Employing
increased capacity and increased bandwidth combined with service
redundancy may reduce the susceptibility to some type of DoS attacks.
A side-benefit of this is enabling availability of data, which is a good
thing.
- What is the major purpose of conducting a post-incident analysis
for a computer security incident?
a. To determine how security threats and vulnerabilities were
addressed
b. To learn how the attack was done
c. To re-create the original attack
d. To execute the response to an attack
- a. The major reason for conducting a post-incident analysis is to
determine whether security weaknesses were properly and effectively
addressed. Security holes must be plugged to prevent recurrence. The
other three choices are minor reasons.
- Which of the following is an example of a reactive approach to
software security?
a. Patch-and-patch
b. Penetrate-and-patch
c. Patch-and-penetrate
d. Penetrate-and-penetrate
- b. Crackers and hackers attempt to break into computer systems by
finding flaws in software, and then system administrators apply
patches sent by vendors to fix the flaws. In this scenario of penetrate and-patch, patches are applied after penetration has occurred, which is
an example of a reactive approach. The scenario of patch-and patch is
good because one is always patching, which is a proactive approach.
The scenario of patch-and-penetrate is a proactive approach in which
organizations apply vendor patches in a timely manner. There is not
much damage done when crackers and hackers penetrate (break) into
the computer system because all known flaws are fixed. In this
scenario, patches are applied before penetration occurs. The scenario
of penetrate-and-penetrate is bad because patches are not applied at all
or are not effective.
- Regarding a patch management program, which of the following
is an example of vulnerability?
a. Misconfigurations
b. Rootkits
c. Trojan horses
d. Exploits
- a. Misconfiguration vulnerabilities cause a weakness in the security
of a system. Vulnerabilities can be exploited by a malicious entity to
violate policies such as gaining greater access or permission than is
authorized on a computer. Threats are capabilities or methods of attack
developed by malicious entities to exploit vulnerabilities and
potentially cause harm to a computer system or network. Threats
usually take the form of exploit scripts, worms, viruses, rootkits,
Trojan horses, and other exploits.
- An information system initiates session auditing work at system:
a. Restart
b. Shutdown
c. Startup
d. Abort
- The major reason for retaining older versions of baseline
configuration is to support:
a. Roll forward
b. Rollback
c. Restart
d. Restore
- b. A rollback is restoring a database from one point in time to an
earlier point. A roll forward is restoring the database from a point in
time when it is known to be correct to a later time. A restart is the
resumption of the execution of a computer system using the data
recorded at a checkpoint. A restore is the process of retrieving a dataset
migrated to offline storage and restoring it to online storage.
- Which of the following updates the applications software and
the systems software with patches and new versions?
a. Preventive maintenance
b. Component maintenance
c. Hardware maintenance
d. Periodic maintenance
- a. The scope of preventive maintenance includes updating
applications software and systems software with patches and new
versions, replacing failed hardware components, and more.
The other three choices are incorrect because they can be a part of
corrective maintenance (fixing errors) or remedial maintenance (fixing
faults).
- Regarding incident handling, dynamic reconfiguration does not
include changes to which of the following?
a. Router rules
b. Access control lists
c. Filter rules
d. Software libraries
- d. Software libraries are part of access restrictions for change so
changes are controlled. Dynamic reconfiguration (i.e., changes on-thefly) can include changes to router rules, access control lists, intrusion
detection and prevention systems (IDPS) parameters, and filter rules
for firewalls and gateways.
- Prior to initiating maintenance work by maintenance vendor
personnel who do not have the needed security clearances and
access authorization to classified information, adequate controls
include: - Sanitize all volatile information storage components
- Remove all nonvolatile storage media
- Physically disconnect the storage media from the system
- Properly secure the storage media with physical or logical access
controls
a. 1 only
b. 2 only
c. 2, 3, and 4
d. 1, 2, 3, and 4
- d. All four items are adequate controls to reduce the risk resulting
from maintenance vendor personnel’s access to classified information.
For handling classified information, maintenance personnel should
possess security clearance levels equal to the highest level of security
required for an information system.
- A security configuration checklist is referred to as which of the
following? - Lockdown guide
- Hardening guide
- Security guide
- Benchmark guide
a. 1 and 2
b. 1 and 3
c. 2 and 3
d. 1, 2, 3, and 4
- d. A security configuration checklist is referred to as several
names, such as a lockdown guide, hardening guide, security technical
implementation guide, or benchmark guide. These guides provide a
series of instructions or procedures for configuring an information
system’s components to meet operational needs and regulatory
requirements.
- Regarding the verification of correct operation of security
functions, which of the following is the correct order of alternative
actions when anomalies are discovered? - Report the results.
- Notify the system administrator.
- Shut down the system.
- Restart the system.
a. 1, 2, 3, and 4
b. 3, 4, 2, and 1
c. 2, 1, 3, and 4
d. 2, 3, 4, and 1
- d. The correct order of alternative actions is notify the system
administrator, shut down the system, restart the system, and report the
results of security function verification.
- The audit log does not include which of the following?
a. Timestamp
b. User’s identity
c. Object’s identity
d. The results of action taken
15. d. The audit log includes a timestamp, user’s identity, object’s
identity, and type of action taken, but not the results from the action
taken. The person reviewing the audit log needs to verify that the
results of the action taken were appropriate.
- Which of the following fault tolerance metrics are most
applicable to the proper functioning of redundant array of disks
(RAID) systems? - Mean time between failures (MTBF)
- Mean time to data loss (MTTDL)
- Mean time to recovery (MTTR)
- Mean time between outages (MTBO)
a. 1 and 2
b. 1 and 3
c. 2 and 3
d. 3 and 4
- c. Rapid replacement of RAID’s failed drives or disks and
rebuilding them quickly is important, which is facilitated specifically
and mostly through applying MTTDL and MTTR metrics. The
MTTDL metric measures the average time before a loss of data
occurred in a given disk array. The MTTR metric measures the amount
of time it takes to resume normal operation, and includes the time to
replace a failed disk and the time to rebuild the disk array. Thus,
MTTDL and MTTR metrics prevent data loss and ensure data
recovery.
MTBF and MTBO metrics are incorrect because they are broad
measures of providing system reliability and availability respectively,
and are not specifically applicable to RAID systems. The MTBF
metric measures the average time interval between system failures and
the MTBO metric measures the mean time between equipment
failures.
- All the following have redundancy built in except:
a. Fast Ethernet
b. Fiber distributed data interface
c. Normal Ethernet
d. Synchronous optical network
- c. Normal Ethernet does not have a built-in redundancy. Fast
Ethernet has built-in redundancy with redundant cabling for file
servers and network switches. Fiber distributed data interface (FDDI)
offers an optional bypass switch at each node for addressing failures.
Synchronous optical network (SONET) is inherently redundant and
fault tolerant by design.
- Which of the following go hand-in-hand?
a. Zero-day warez and content delivery networks
b. Zero-day warez and ad-hoc networks
c. Zero-day warez and wireless sensor networks
d. Zero-day warez and converged networks
- a. Zero-day warez (negative day or zero-day) refers to software,
games, music, or movies (media) unlawfully released or obtained on
the day of public release. An internal employee of a content delivery
company or an external hacker obtains illegal copies on the day of the
official release. Content delivery networks distribute such media from
the content owner. The other three networks do not distribute such
media.
Bluetooth mobile devices use ad-hoc networks, wireless sensor
networks monitor security of a building perimeter and environmental
status in a building (temperature and humidity), and converged
networks combine two different networks such as voice and data.
- Which of the following provides total independence?
a. Single-person control
b. Dual-person control
c. Two physical keys
d. Two hardware tokens
- a. Single-person control means total independence because there is
only one person performing a task or activity. In the other three
choices, two individuals or two devices (for example, keys and tokens)
work together, which is difficult to bypass unless collusion is involved.
- The use of a no-trespassing warning banner at a computer
system’s initial logon screen is an example of which of the
following?
a. Correction tactic
b. Detection tactic
c. Compensating tactic
d. Deterrence tactic
- d. The use of no-trespassing warning banners on initial logon
screens is a deterrent tactic to scare system intruders and to provide
legal evidence. The other three choices come after the deterrence
tactic
- Countermeasures applied when inappropriate and/or
unauthorized modifications have occurred to security functions
include: - Reversing the change
- Halting the system
- Triggering an audit alert
- Reviewing the records of change
a. 1 only
b. 2 only
c. 3 only
d. 1, 2, 3, and 4
- d. Safeguards and countermeasures (controls) applied when
inappropriate and/or unauthorized modifications have occurred to
security functions and mechanisms include reversing the change,
halting the system, triggering an audit alert, and reviewing the records
of change. These countermeasures would reduce the risk to an
information system.
- Which of the following situations provides no security
protection?
a. Controls that are designed and implemented
b. Controls that are developed and implemented
c. Controls that are planned and implemented
d. Controls that are available, but not implemented
- d. Controls that are available in a computer system, but not
implemented, provide no protection.
- A computer system is clogged in which of the following
attacks?
a. Brute force attack
b. Denial-of-service attack
c. IP spoofing attack
d. Web spoofing attack
- b. The denial-of-service (DoS) type of attack denies services to
users by either clogging the system with a series of irrelevant messages
or sending disruptive commands to the system. It does not damage the
data. A brute force attack is trying every possible decryption key
combination to break into a computer system. An Internet Protocol (IP)
spoofing attack means intruders creating packets with spoofed source
IP addresses. The intruder then takes over an open-terminal and login connections. In a Web spoofing attack, the intruder sits between the
victim user and the Web, thereby making it a man-in-the-middle attack.
The user is duped into supplying the intruder with passwords, credit
card information, and other sensitive and useful data.
- Which of the following is not an effective, active, and
preventive technique to protect the integrity of audit information
and audit tools?
a. Backing up the audit records
b. Using a cryptographic-signed hash
c. Protecting the key used to generate the hash
d. Using the public key to verify the hash
- a. Backing up the audit records is a passive and detective action,
and hence not effective in protecting integrity. In general, backups
provide availability of data, not integrity of data, and they are there
when needed. The other three choices, which are active and preventive,
use cryptographic mechanisms (for example, keys and hashes), and
therefore are effective in protecting the integrity of audit-related
information.