CISSP Practice Questions - All CISSP Domains 120Q - 2022 #1 (2 of 2 / Anthony Today) Flashcards
As a security consultant for a large company, you are expected to align the security operations with the industry-standard control frameworks. For that purpose, your client wants you to put the focus on technology solutions that will negatively impact malicious activities. Which type of control should you focus on?
A. Discouraging B. Corrective C. Preventative D. Discarding E. Detective F. Deterrent
F. Deterrent
Explanation:
Deterrent security controls are technology-related and used to discourage malicious activities. Please note that preventative controls prevent an incident to occur (e.g., firewalls), detective controls will detect exceptions to an environment (e.g. CCTV), and a corrective control modifies the environment to return systems to normal after an unwanted or unauthorized activity has occurred. Finally, discouraging is not part of the security controls taxonomy.
You are working on a business continuity project for the company ABC. This project generates a large volume of documents every day. Your team estimated two hours as the maximum tolerable data loss in a disaster recovery or business continuity event. Where should you document this in the business continuity plan?
A. Maximum Tolerable Downtime (MTD)
B. Maximum Data Tolerance (MDT)
C. Recovery Point Objective (RPO)
D. Recovery Time Objective (RTO)
C. Recovery Point Objective (RPO)
Explanation:
The Recovery Point Objective (RPO) determines the maximum tolerable data loss for the firm. Please note that the Recovery Time Objective (RTO) sets the time under which key operations of the firm should be reestablished, the Maximum Tolerable Downtime (MTD) covers the time between the incident and the recovery of the services. MDT is not a terminology used in business continuity management.
Fred needs to transfer files between two servers on the DMZ that is exposed to the Internet. Given that this network is untrusted, what encryption protocol should he select to protect his data?
A. SFTP
B. TCP
C. SSH
D. IPsec
A. SFTP
Explanation:
From the listed option, SSH is used for secure command-line access, but not for transferring files. TCP is a transport protocol, but does not protect the files during the transfer. Likewise, IPsec could be leveraged to setup a tunnel between the two servers to transfer the files, but it isn’t designed for file transfers. Finally, the Secure File Transfer Protocol (SFTP) is purposely designed to transferring encrypted files.
James is performing a business impact assessment (BIA) as part of his organization’s business continuity program. He determined the longest period of time that a service can be unavailable without causing damage to the business. What BIA variable did James determine?
A. RPO
B. MTD
C. ALE
D. RTO
B. MTD
Explanation:
The Maximum Tolerable Downtime (MTD) is the amount of time that a service may be unavailable before causing significant damage to the business. It is the senior management of the company that determines the MTD. Please note that the RPO and RTO are objectives, that the company will try to reach should an event occur. The Recovery Time Objective (RTO) is the amount of time the business expects it will take to recover operations after a disruption. The Recovery Point Objective (RPO) describes the amount of acceptable data loss in the event of a disruption.
The CEO of your company is extremely worried about the potential disruption of the services provided to the clients. Which one of the following is not normally included in business continuity plan documentation?
A. Statement of priorities
B. Statement of accounts
C. Statement of importance
D. Statement of organizational responsibility
B. Statement of accounts
Explanation:
The elements usually covered by a business continuity plan documentation are the continuity planning goals, statement of organizational responsibility, a statement of importance, statement of priorities, statement of urgency and timing, risk assessment and risk treatment information, emergency response guidelines, and documentation for maintaining and testing the plan.
In communications, multiple exchanges take place. What is sent at the second step of the three-way TCP handshake?
A. FIN/ACK
B. ACK
C. SYN/ACK
D. SYN
C. SYN/ACK
Explanation:
The three-way handshake is SYN, SYN/ACK, ACK. The counterpart system is expected to respond with “Synchronize and Acknowledge” after having received a SYN.
Susan, a cybersecurity expert, needs to scan a system for vulnerabilities, and she wants to use an open-source tool to test the system remotely. Which of the following options would meet her requirements and allow vulnerability scanning?
A. MBSA
B. Nessus
C. Nmap
D. OpenVAS
D. OpenVAS
Explanation:
Open Vulnerability Assessment Scanner (OpenVAS) is an open-source vulnerability scanning tool that generates a report of the vulnerabilities from a remote, network-based scan. Nmap (Network mapper) is an open-source port scanner. Both the Microsoft Baseline Security Analyzer (MBSA) and Nessus are closed source tools.
You are working with your personnel department on a legal arrangement to protect information shared with a vendor. What type of agreement would be most effective?
A. Indemification
B. NDA
C. SLA
D. Non-compete
B. NDA
Explanation:
Non-Disclosure Agreements (NDAs) protect sensitive information shared between two entities, requiring one or both entities to maintain confidentiality with regard to the information available. Please note that a Service Level Agreement (SLA) will determine the level of performance expected from a third party. The other two terms are not relevant here.
Polarizz is a security service provider based in the middle of an industrial area and tries to develop its offering. What type of vulnerability does a TOC/TOU attack target?
A. Injection flaw
B. Race condition
C. Lack of encryption
D. Lack of input validation
B. Race condition
Explanation:
Time to Check / Time-of-Use (TOC/TOU) attacks target situations where there is a race condition, meaning that a dependence on the timing of actions allows impermissible actions to take place. The other vulnerabilities listed here do not characterize a TOC/TOU type of attack
What is Nmap for a type of tool?
A. Network design and layout
B. Port scanner
C. Vulnerability Scanner
D. Web application fuzzer
B. Port scanner
Explanation:
Nmap, which stands for Network Mapper, is a very popular open-source port scanner. None of the other options can be correct.
From the following options, which technology is used to verify that a dial-up user is connecting from the phone number they are preauthorized to use in a way that avoids spoofing?
A. Callback
B. CallerID
C. CHAP
D. PPP
A. Callback
Explanation:
Callback disconnects a remote user after their initial connection and then calls them back at a preauthorized number. This technology avoids spoofing. Caller Identification (CallerID) can help with this but can be spoofed, making callback a better solution. Challenge-Handshake Authentication Protocol (CHAP) is an authentication protocol, and Point-to-Point Protocol (PPP) is a dial-up protocol. Neither will verify a phone number.
In financial services, what approach to technology management integrates the three components of technology management: operations, development, and quality assurance?
A. ITIL
B. DevOps
C. Agile
D. Lean
B. DevOps
Explanation:
ITIL is about sound IT management practices, and Lean is a method for increasing the efficiency of a business. The DevOps approach to technology management seeks to integrate software development, operations, and Quality Assurance in a seamless approach that builds collaboration between the three disciplines.
René is in charge of the data center management for the company Transparent Ltd. He is connected on the web interface of an equipment via the port 443, and he is analyzing log files. From the following options, which type of log file does contain samples of deny status for inbound and outbound TCP and UDP sessions?
A. System
B. Firewall
C. Web server
D. Application
B. Firewall
Explanation:
The contextual information brings little information, but given the description of the log file, it is very likely that it was generated by a firewall. In fact, log files from firewalls record the exchanges of information from one IP address to another and include the transport protocol information. Log files from applications are specific to each application. In general, system logs are related to processes or events.
From the following activities, which one is considered as an integral part to all phases of the SDLC?
A. Verification
B. Design
C. Testing
D. Security
D. Security
Explanation:
The Software Development Lifecycle (SDLC) has several phases, including Design and Test, but from the listed options, only Security is part of all phases. Verification is synonym to the testing phase, but does not address the question.
From the following examples, which one is a covert timing channel when used to exfiltrate information from a company?
A. Dispatching an encrypted electronic mail message
B. Typing with the rhythm of Morse code
C. Sharing a file on a peer to peer sharing service
D. Copying data to a shared memory space
B. Typing with the rhythm of Morse code
Explanation:
In general, covert channels use surreptitious communications paths. Thus, covert timing channels alter the use of a resource in a measurable fashion to exfiltrate information. When typing using a specific rhythm of Morse code, it is a sample of a covert timing channel because someone listening to the keystrokes could receive a secret message with no trace of the message left in logs.
In general, application developers are creative in their approach to address the requirements of their stakeholders. How do we refer to a test that aims at preventing unintended actions?
A. Manual testing
B. Dynamic testing
C. Use case testing
D. Misuse case testing
D. Misuse case testing
Explanation:
Use case testing are designed to specifically test the functions that the software is expected to perform. On the other hand, misuse case testing aims to prevent unintended actions. Manual testing refers to testing the code by hand, while dynamic testing is based on how the code handles variables that change over time.
Hector has been commissioned to conduct an account management assessment. What are the accounts that are usually of most interest for an assessor?
A. A random sample
B. Highly privileged accounts
C. Accounts with no expiration dates
D. Newly created accounts
B. Highly privileged accounts
Explanation:
In general, assessors are interested in the highly privileged accounts because they pose a greater risk to the environment. Accounts with no expiration dates can be concerning, but it doesn’t mean that they have high privileges. Newly created accounts might be the outcome of automated processes, hence they should not be too much of a concern. Finally, the random sample is a good approach, but the biggest focus should be highly privileged accounts because of their power.
From the following options, which isn’t true about SSAE-18?
A. SSAE-18 is used for external audits
B. SSAE-18 mandates a specific control set
C. SSAE-18 is an attestation standard
D. SSAE-18 uses a framework, including SOC1, SOC2 and SOC3 reports
B. SSAE-18 mandates a specific control set
Explanation:
Statement on Standards for Attestation Engagements no. 18 is a generally accepted audit standard. More specifically, it reviews the use and application of controls in an audited organization. Additionally, it is an attestation standard, used for external audits, and forms part of the underlying audit framework for SOC 1, 2, and 3 reports.
You are replacing used magnetic hard drives from a facility and are worried about data remanence issues. What tool can you use to effectively address this issue?
A. Degausser
B. Sinple-pass wiper
C. Disk formatter
D. Disk partitioner
A. Degausser
Explanation:
From the proposed solution, the degausser is the only approach that goes beyond the logical alteration of the hard drive content. In fact, the degausser will directly modify the magnetic field on the hard drives’ platters. In this scenario, it is the most appropriate solution. Please note that the other solutions proposed do not address the data remanence issue but are reassigning the storage space.
Alice would like to have read permissions on an object and knows that Bob already has those rights and would like to give them to herself. Which one of the rules in the Take-Grant protection model would allow her to complete this operation?
A. Take Rule
B. Create Rule
C. Remote Rule
D. Grant Rule
A. Take Rule
Explanation:
The take rule allows a subject to take the rights belonging to another object. If Alice has take rights over Bob, she can give herself the same permissions that Bob already possesses. Grant rule is about granting someone else the right.
Jean-Yves, a student in computer sciences, asks you the following question: What technology ensures that an OS allocates separate memory spaces used by each application on a system?
A. Process Isolation
B. Data Hiding
C. Layering
D. Abstraction
A. Process Isolation
Explanation:
In multilevel security systems, the process isolation ensures that the operating systems allocate a separate section of memory for each process. Resultantly, process isolation prevents processes from accessing each other’s data.
True or False: Key clustering takes place when the combination of two encryption keys is needed to create a plaintext input message?
A. TRUE
B. FALSE
B. FALSE
Explanation:
Key clustering takes place when different encryption keys generate the same ciphertext from the exact same plaintext input message.
The BioStrong contracting firm would like to add an administrative security control that protects against insider threats. Which one of the following controls would best fit the purpose?
A. Penetration tests
B. Background checks
C. Data Loss Prevention Systems
D. Vulnerability Scans
B. Background checks
Explanation:
Conducting background checks in order to identify profile flaws supports the organization in being diligent in its hiring process. Therefore, background check is the appropriate administrative control described here. Note that DLP, penetration tests, and vulnerability scans are technical controls that might have an impact on your technical environment.
Phoser Ltd just faced a major incident and lost several thousands of personal data. Their Chief Compliance Officer worries about the media exposure of the incident, and the potential lawsuits that the company will face. Given the fact that the company is in the process of addressing the incident, within which phase would the IT team design new security controls with the aim to prevent the future occurrence of such an issue?
A. Remediation
B. Lessons Learned
C. Recovery
D. Reporting
A. Remediation
Explanation:
The context of the incident says little about its way to address it. Let’s consider it as an intentional distraction. From the listed options, the remediation phase encompasses the root cause analysis as well as the implementation of the necessary security measures that would prevent the occurrence of a similar incident. The reporting phase is about gathering the relevant information about the incident and notifying the necessary stakeholders (e.g., regulators if mandated to do so). The recovery phase has a much shorter time frame than the remediation phase for the reason that it focuses on bringing back the system to a normal state. Thus, if the company faced a system interruption, it would aim to bring it back online as fast as possible, without worrying directly about the cause of the incident. The lessons learned take place post-remediation, and consist of gathering what went well and what didn’t so that processes can be adjusted where needed.