CISSP Practice Questions - All CISSP Domains 120Q - 2022 #2 (1 of 2 / Anthony Today) Flashcards
Network communications rely on the exchange of information. What process makes TCP a connection-oriented protocol?
A. It works via network connections
B. It uses a handshake
C. It monitors for dropped connections
D. It uses a complex header
B. It uses a handshake
Explanation:
Transmission Control Protocol use of a handshake process to establish communications makes it a connection-oriented protocol. However, TCP does not monitor for dropped connections nor does the fact that it works via network connections make it connection-oriented.
Darielle is an information security risk analyst for Scholes Agricultural Products. She looks after a fire suppression solution for the data center. Based on experts she consulted, a fire would destroy all equipment of the data center, but would not damage the structure of the building. Replacing the data center facility would cost 20 millions USD. If she installs a fire suppression solution, recovering from a fire damage would cost 7.5 millions USD. Based on the same expert, there is a risk of fire every 50 years in similar facilities. What is the exposure factor of fire for the data center?
A. 7.50%
B. 15.00%
C. 27.50%
D. 37.50%
D. 37.50%
Explanation:
An exposure factor (EF) is the potential percentage of loss to a specific asset if a specific threat is realized. In this scenario, it is the ratio of the damage (7.5 millions USD) over the overall data center replacement cost (20 millions USD), which results in 37.5%.
Melinda selects a disaster recovery facility for her organization. One of the conditions, based on confidentiality reasons, is to remain independent from other organizations. Which DR setup would allow an activation in about a week after a disaster, while limiting costs?
A. Cold Site
B. Warm Site
C. Mutual assistance agreement
D. Hot site
B. Warm Site
Explanation:
A hot site is associated with a high cost, and mutual assistance agreement is excluded from the potential answers based on the described scenario. A warm site would have all the connection and equipment in place, but would still need to restore the systems as they were at the primary site. This recovery process may take a week. The cold site, although it is the least expensive option here, might take weeks to recover the operations because of the time required to get all equipment.
Solen needs to ensure that the interactions between the components of her e-commerce application are all handled properly. She intends to verify communications, error handling, and session management capabilities throughout her infrastructure. What type of testing is she planning to conduct?
A. Misuse case testing
B. Fuzzing
C. Regression testing
D. Interface testing
D. Interface testing
Explanation:
Based on the scenario described, Solen conducts interface testing, which
Jeff recently joined your team and asked you the following question: The DARPA TCP/IP model’s Application layer matches up to what three OSI model layers?
A. Application, Presentation, and Transport
B. Presentation, Session and Transport
C. Application, Presentation and Session
D. There is not a direct match. The TCP model was created before the OSI model
B. Presentation, Session and Transport
Explanation:
From the listed systems, Windows desktop systems do not general syslog events. However, they generate Windows native logs. In order to connect a Windows desktop to a SIEM solution, an application needs to be installed on the operating system.
Which of the following options is not an access control layer?
A. Physical
B. Policy
C. Administrative
D. Technical
B. Policy
Explanation:
The Communications Assistance to Law Enforcement Act (CALEA) requires that all communications carriers make wiretaps possible for law enforcement officials who have an appropriate court order.
You try to protect the infrastructure from any form of attack. Which form of malware spreads by exploiting vulnerabilities without the need of user intervention?
A. Trojan Horse
B. Virus
C. Logic Bomb
D. Worm
C. Logic Bomb
Explanation:
Tokens are hardware devices (something you have) that generate a one-time password based on time or an algorithm. They are typically combined with another factor like a password to authenticate users. Common Access Card (CAC) and Personal Identity Verification (PIV) cards are US government–issued smart cards.
Considering that millions of packets are being exchanged on a network, what happens after a host on an Ethernet network detects a collision and transmits a jam signal?
A. The host that transmitted the jam signal is allowed to re transmit while all other hosts pause until that transmission is received successfully
B. All hosts stop transmitting, and each host waits a random period of time before attempting to transmit again
C. All hosts stop transmitting, and each host waits a period of time based on how recently it successfully transmitted
D. Hosts wait for the token to be passed and then resume transmitting data as they pass the token
A. The host that transmitted the jam signal is allowed to re transmit while all other hosts pause until that transmission is received successfully
Explanation:
Kernel mode, supervisory mode, and system mode are all terms used to describe privileged modes of system operation. Thus, user mode is not a privileged mode.
Milene suspects that someone is using malicious software to steal computing cycles from her company. Which one of the following security tools would be in the best position to detect this type of incident?
A. NIDS
B. Firewall
C. HIDS
D. DLP
C. HIDS
Explanation:
From the listed options, the network intrusion detection systems (NIDSs), firewalls, and DLP systems are network-based and may not notice rogue processes. However, a host-based intrusion detection system (HIDS) would be able to detect unauthorized processes running on a system.
Your Line Manager challenges you on a topic out of your comfort zone, but you are determined to make a good impression. What would be your answer to the following question: Which of the following is not a code review process?
A. Email pass-around
B. Over the shoulder
C. Pair programming
D. IDE forcing
D. IDE forcing
Explanation:
Pair programming requires two developers, only one of whom writes code while both collaborate. IDE forcing is not a type of code review; an IDE is an integrated development environment. Over-the-shoulder reviews require the original developer to explain her code to a peer while walking through it. It is considered as a social engineering technique. Email pass-around code reviews are done by sending code for review to peers.
You work for a government agency that is required to meet U.S. federal government requirements for data security. What should you do with the data to make sure data is identifiable by its classification level?
A. Classify the data
B.Encrypt the data
C. Label the data
D. Apply DRM to the data
C. Label the data
Explanation:
In order for the data to be identifiable by its classification level, you need to label it. Thus classifying data is not sufficient because you are not identifying the data itself. Encrypting the data would be used in other circumstances. Digital Rights Management (DRM) tools provide the possibility to control the data while it is encrypted, and ensure confidentiality and integrity of the data.
Although the Computer Fraud and Abuse Act is a criminal law, what is the threshold for malicious damage to a federal computer system that triggers it?
A. $500
B. $2,500
C. $5,000
D. $10,000
C. $5,000
Explanation:
The Computer Fraud and Abuse Act (CFAA) makes it a federal crime to maliciously cause damage over $5,000 to a federal computer system during any one-year period.
You are working for an industrial production facility, and you have been required to protect the network against electromagnetic interference due to the devices operating around your wire closet. What network cabling should you use to avoid such perturbations?
A. 10Base2
B. 100BaseT
C. 1000BaseT
D. Fiber-optic
D. Fiber-optic
Explanation:
Fiber-optic is not subject to electromagnetic interference, while all the other options are.
Kobe would like to access a remote file server through a VPN connection. He begins this process by connecting to the VPN and attempting to log in. Applying the subject/object model to this request, what is the subject of Kobe’s login attempt?
A. Kobe
B. VPN
C. Remote File Server
D. Files contained on the remote server
A. Kobe
Explanation:
In the subject/object model of access control, the user or process making the request for a resource is the subject of that request. In this example, Kobe is requesting access to the VPN (the object of the request) and is, therefore, the subject.
At Merel Shipping, the access to the total sales volume information is classified as secret information. Nevertheless, a shipping clerk can access individual transactions in order to perform its duties. Recently, a shipping clerk accessed all transactions from a specific client during the previous quarter, and consolidated the information to get its total sales volume. How would you qualify such kind of attack?
A. Social engineering
B. Inference
C. Aggregation
D. Data diddling
C. Aggregation
Explanation:
In an aggregation attack, individual(s) use their access to specific pieces of information to piece together a larger picture that they are not authorized to access.
Which of these formulas about risk is correct?
A. Risk = Threat * Vulnerability
B. Risk = Threat / Vulnerability
C. Risk = Asset * Threat
D. Risk = Asset / Threat
A. Risk = Threat * Vulnerability
Explanation:
Although a risk can be loosely defined in the literature, in this case, there is only one correct formula. Risks exist when there is an intersection of a threat and a vulnerability. This is described using the equation: Risk = Threat * Vulnerability.
There is a general misalignment regarding the definition of a security event and a security incident. Nevertheless, from the following list of options, which one is a commonly agreed computer security incident?
A. Completion of a backup schedule
B. System access recorded in a log
C. Unauthorized vulnerability scan of a file server
D. Update of antivirus signatures
C. Unauthorized vulnerability scan of a file server
Explanation:
It is commonly agreed that security incidents negatively affect the confidentiality, integrity, or availability of information or assets and/or violate a security policy. Thus, an unauthorized vulnerability scan of a server does violate security policy and may negatively affect the security of that system, so it qualifies as a security incident. The other options listed here are common administrative routine tasks that should not be categorized as incidents.
You are a security expert specialized in the assessment of financial systems. What type of identity systems use the X.500 standard?
A. Kerberos
B. Provisioning services
C. Biometric authentication systems
D. Directory services
D. Directory services
Explanation:
In a nutshell, the X.500 series of standards covers directory services. Thus, the other options listed here cover different aspects. Kerberos is described in RFCs. Biometric systems are described in multiple standards, including ISO. Provisioning services standards can be found in Service Provisioning Markup Language (SPML).
You are searching for a network security solution that will allow you to reduce zero-day attacks while using identities to enforce a security policy on systems prior they connect to the network. Which solution should you implement?
A. A firewall
B. A NAC system
C. An intrusion detection system
D. Port security
B. A NAC system
Explanation:
Based on the options listed, Network Access Control (NAC) systems can be used to authenticate users and then validate their system’s compliance with a security standard before they are allowed to connect to the network. Enforcing security profiles can help reduce zero-day attacks, making NAC a useful solution. A firewall can’t enforce system security policies, whereas an IDS can only monitor for attacks and alarms when they happen. Thus, neither a firewall nor an IDS meets Calin’s needs. Finally, port security is a MAC address–based security feature that can only restrict which systems or devices can connect to a given port.
Tarten is a cryptanalyst and is working on breaking a cryptographic algorithm’s secret key. He has a copy of both, an intercepted message that is encrypted, and a copy of the decrypted version of that message. With this information, what attack type should he choose to retrieve the secret key?
A. Chosen ciphertext
B. Chosen plaintext
C. Known plaintext
D. Brute force
C. Known plaintext
Explanation:
Based on the listed options, only the known plaintext attack can be conducted with the information at hand.
Mich recently implemented an intrusion prevention system (IPS) designed to block common network attacks from affecting his organization. What kind of risk management strategy is that?
A. Risk acceptance
B. Risk avoidance
C. Risk mitigation
D. Risk transference
C. Risk mitigation
Explanation:
Based on this description, the IPS solution plays an active role against network attacks, therefore it reduces the risk. Consequently, the right answer is risk mitigation because it reduces the likelihood of a successful attack.
Nicolas is considering locating a business in the downtown area of Paris, France. He consults the floodplain map for the region and determines that the area lies within a 100-year floodplain. What is the ARO of a flood in this area?
A. 100
B. 1
C. 0.1
D. 0.0.1
D. 0.0.1
Explanation:
This question is straightforward, the annualized rate of occurrence (ARO) is the frequency at which you should expect a risk to materialize each year. In a 100-year flood plain, risk analysts expect a flood to occur once every 100 years, or 0.01 times per year.
Your peers consider you as the network guru of the organization. They ask you the following question: ICMP, RIP, and network address translation all occur at what layer of the OSI model?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
C. Layer 3
Explanation:
This is a pure knowledge question for which you need to remember the OSI model representation. Internet Control Message Protocol (ICMP), Routing Information Protocol (RIP), and network address translation (NAT) all occur at layer 3, the Network layer from the OSI model.
What is the encryption standard used in the Advanced Encryption Standard?
A. Blowfish
B. Twofish
C. Rijndael
D. Skipjack
C. Rijndael
Explanation:
Again, this is a pure knowledge-based question. The Rijndael block cipher is the cryptographic algorithm underlying the Advanced Encryption Standard (AES).