CISSP Practice Questions - All CISSP Domains 120Q - 2022 #3 (2 of 2 / Anthony Today) Flashcards
You and your team are in charge of the administration of hundreds of systems, and you find it challenging to deal with all the credentials needed to connect to these systems. What would be an appropriate solution to enforce a password rotation and to reduce the burden related to it?
A. A credential management system
B. A strong password policy
C. Separation of duties
D. Single Sign On
A. A credential management system
Explanation:
From the listed options, implementing a credential management system would address that need specifically. A strong password policy will likely increase the burden of credential management. Separation of duties does not ease the management of the password nor does it enforce their rotation. Single sign-on would for sure reduce the burden, and remove the need for password rotation, however it is not possible to have single sign-on on all systems, especially when dealing with hundreds of them.
What application security process are you applying when you decompose an application, rank threats, and establish countermeasures?
A. Fagan Inspection
B. Threat Modeling
C. Penetration Testing
D. Code Review
B. Threat Modeling
Explanation:
Threat modeling commonly involves decomposing the application to understand it and how it interacts with other components or users. Next, identifying and ranking threats allows you to focus on the threats that should be prioritized. Finally, identifying how to mitigate those threats finishes the process. Once complete, an organization can take action to handle the threats that were identified with appropriate controls.
Albert is the security expert for a consulting firm and must enforce access controls that restrict users’ access based upon their previous activity. For example, once a consultant accesses data belonging to PentaBoisson, a consulting client, they may no longer access data belonging to any of their competitors. What would be the appropriate security model?
A. Clark-Wilson
B. Biba
C. Bell-LaPadula
D. Brewer-Nash
D. Brewer-Nash
Explanation:
Brewer-Nash, also known as the Chinese-Wall, addresses that security requirement, because it allows access controls to change dynamically based upon a user’s actions.
Which process is in charge of ensuring that changes to software include acceptance testing?
A. Request Control
B. Change Control
C. Release Control
D. Configuration Control
C. Release Control
Explanation:
From the listed options, only the release control includes acceptance testing.
You have been consulted to work on a data governance program. Based on your experience, who is assigning the classification level to information in an organization?
A. Data Creator
B. Data Owner
C. CISO
D. Data Custodian
B. Data Owner
Explanation:
The owner, and more specifically, the data owner defines the classification level of data because this person is ultimately responsible for its protection. In general such a role is taken by senior management.
What would be the most complex decoy environment for an attacker to explore during an intrusion attempt?
A. Honeypot
B. Darknet
C. Honeynet
D. Pseudo flaw
A. Honeypot
Explanation:
A honeynet is a network of multiple honeypots that creates a more sophisticated environment for intruders to explore. A darknet is a segment of unused network address space that should have no network activity and, therefore, may be easily used to monitor for illicit activity. A honeypot is a decoy computer system used to bait intruders into attacking. A pseudo flaw is a false vulnerability in a system that may attract an attacker.
What term is used to describe the formal declaration by a Designated Approving Authority that an IT system is approved to operate in a specific environment?
A. Certification
B. Accreditation
C. Evaluation
D. Approval
B. Accreditation
Explanation:
For an IT system to operate in a described risk environment, the DAA should approve a formal accreditation.
The person in charge of the company asked you to propose a solution for secure messaging between employees. What would you propose?
A. Use a third party messaging service
B. Implement and use a locally hosted service
C. Use HTTPS
D. Discontinue use of messaging and instead use email, which is more secure
D
B. Implement and use a locally hosted service
Explanation:
In order to have full control, and guarantee the security of the messages being exchanged between employees from the same company, it is recommended to implement a local solution. Such an approach would avoid the messages leaving the corporate environment, and would give you full control over the encryption algorithms used.
What classification levels is the U.S. government’s classification label for data that could cause damage but wouldn’t cause serious or grave damage?
A. Top Secret
B. Secret
C. Confidential
D. Classified
C. Confidential
Explanation:
Exposure of Top Secret data is considered to potentially cause grave damage, while Secret data could cause serious damage. “Classified” is not a level in the U.S. government classification scheme. The U.S. government uses the label Confidential for data that could cause damage if it was disclosed without authorization.
What classification levels is the U.S. government’s classification label for data that could cause exceptionally grave damage?
A. Top Secret
B. Secret
C. Highly Secret
D. Secret Max
A. Top Secret
Explanation:
The U.S. government uses the label Top Secret for data that could cause exceptionally grave damage if it was disclosed without authorization.
You join a company after having worked for law enforcement organizations for the past five years. When someone is picking up a drive or other evidence, you ask them to sign a document. By making them sign this document, what are you creating?
A. Criminal Case
B. Chain of Custody
C. Civil Evidence
D. CYA Proof
B. Chain of Custody
Explanation:
The document you are making them sign creates a chain of custody that records who, when and how evidence is being handled in order to be admissible in court.
Which risk formula is not correct
A. Risk = Threat * Vulnerability
B. Threat = Risk / Vulnerability
C. Vulnerability = Risk / Threat
D. Risk = Asset / Threat
D. Risk = Asset / Threat
Explanation:
The most common formula is risk = threat * vulnerability. Applying basic math logic, all risk = asset / threat is obviously incorrect.
You heard that users are complaining about poor network performance this morning, and you notice that some servers have an unusual heavy CPU workload. After reviewing your antivirus dashboard you realize that all systems are running the latest signature and that no virus has been detected. If there is a malware on your systems, what technique would be used that would prevent you from detecting it?
A. File infector virus
B. MBR Virus
C. Service Injection Virus
D. Stealth Virus
D. Stealth Virus
Explanation:
The system may be the victim of a zero-day attack, using a virus that is not yet included in the signature definition files provided by the antivirus vendor. However, in this case, possibility for the clean scan results is that the virus is using stealth techniques, such as intercepting read requests from the antivirus software and returning a correct-looking version of the infected file.
What is not an example of a backup tape rotation scheme?
A. Grandfather/Father/Son
B. Meet in the Middle
C. Tower of Hanoi
D. Six Cartridge Weekly
B. Meet in the Middle
Explanation:
Meet-in-the-middle is a cryptographic attack against 2DES encryption. The Grandfather/Father/Son, Tower of Hanoi, and Six Cartridge Weekly schemes are all different approaches to rotating backup media that balance reuse of media with data retention concerns.
Lembele is a mid-sized business focusing on building automation systems. They host a panel of local file servers in their on-premises data center that store customer proposals, building plans, product information, and other data that is critical to their business operations. Christelle works in the Lembele IT department and is responsible, amongst others, for designing and implementing the organization’s backup strategy. She currently conducts full backups every Sunday evening at 8 p.m. and incremental backups on Monday through Friday at noon. Lembele experienced a server failure at 9 p.m. on Thursday. Christelle rebuilds the server and wants to restore data from the backups. How many backup does Christelle have to restore in order to bring the situation back to normal?
A. 1
B. 3
C. 5
D. 8
C. 5
Explanation:
Given the description, she will need to restore the full backup from Sunday, and the incremental backups from Monday to Thursday. Thus, a total of five backups to restore.
If you are about to deploy the fastest possible wireless network in your house while having the widest signal coverage, which option would you choose?
A. 802.11a
B. 801.11g
C. 802.11n
D. 802.11ac
C. 802.11n
Explanation:
Low frequencies provide larger signal coverage, high frequencies provide better bandwidth. Given the scenario, you should determine the wireless protocol that gives the maximum bandwidth with the largest signal coverage, thus you should only consider signals on 2.4 GHz frequencies. For that reason, 802.11 supports 200+ Mbps on 2.4 GHz. The other options do not match this requirement.
Amanda needs to set up an Active Directory trust to allow authentication with an existing Kerberos K5 domain. Which of the following types of trust does she have to set up?
A. A shortcut trust
B. A forest trust
C. An external trust
D. A realm trust
D. A realm trust
Explanation:
Understand realm as a scope, or a domain. Kerberos uses realms, and the proper type of trust to set up for an Active Directory environment that needs to connect to a K5 domain is a realm trust. A forest trust is a transitive trust between two forest root domains, a shortcut trust is a transitive trust between parts of a domain tree or forest that shortens the trust path, and an external trust is a nontransitive trust between AD domains in separate forests.
What tool would be best suited to test known exploits against a system?
A. Nikto
B. Ettercap
C. Metasploit
D. THC Hydra
C. Metasploit
Explanation:
Metasploit is a tool used to exploit known vulnerabilities. Ettercap is a man-in-the-middle attack tool, Nikto is a web application and server vulnerability scanning tool, and THC Hydra is a password brute-force tool.
What is not an access control layer?
A. Physical
B. Policy
C. Administrative
D. Technical
B. Policy
Explanation:
Administrative, technical, and physical access controls all play an important role in security. Policy is a subset of the administrative layer of access controls.
During a review of support incidents, Jean-Michel’s organization discovered that password changes accounted for more than a quarter of its help desk’s cases. What options would be most likely to decrease that number significantly?
A. Two-Factor Authentication
B. Biometric Authentication
C. Self-Service Password Reset
D. Passphrases
C. Self-Service Password Reset
Explanation:
Passphrases can be easier to remember than traditional complex passwords and may decrease calls, but they don’t have the same impact that a self-service system does. Two-factor and biometric authentication both add additional complexity and may actually increase the number of contacts. Self-service password reset tools typically have a significant impact on the number of password reset contacts that a help desk has.
During a port scan, Samantha discovers a system running services on TCP and UDP 137-139 and TCP 445, as well as TCP 1433. What type of system is she likely to find if she connects to the machine?
A. A Linux email service
B. A Windows SQL server
C. A Linux File Server
D. A Windows Workstation
B. A Windows SQL server
Explanation:
TCP 1433 is the default port for Microsoft SQL, indicating that this is probably a Windows server providing SQL services. TCP and UDP ports 137-139 are used for NetBIOS services, whereas 445 is used for Active Directory.
As part of your software testing, you play the evil’s role and try to determine how an attack would proceed to compromise your software. Once outlined, you test how the software operates should such an attack take place. What is this type of testing?
A. Misuse Case Testing
B. Use Case Testing
C. Hacker Use Case Testing
D. Static Code Analysis
A. Misuse Case Testing
Explanation:
The testing described is a misuse case testing, which is a process that tests code based on how it would perform if it was misused instead of used properly. Use case testing tests valid use cases, whereas static code analysis involves reviewing the code itself for flaws rather than testing the live software.
What are the following items kind of example: files, databases, computers, programs, processes, devices?
A. Subjects
B. Objects
C. File Stores
D. Users
B. Objects
Explanation:
All of these options are objects. However, some could also be subjects, files, databases, and storage media can’t be.
You are a defense contractor and carry highly sensible missions. If You request to write to the data file is blocked, but you have a Secret security clearance, and the data file has a Confidential classification. What principle of the Bell-LaPadula model blocked this request?
A. Simple Security Property
B. Simple Integrity Property
C. *-Security Property
D. Discretionary Security Property
C. *-Security Property
Explanation:
This question relates to pure knowledge of the Bell-LaPadula model. The process described is also known as the confinement property. The *-Security Property outlines that an individual cannot write to a file at a lower classification level than that of the individual.