CISSP Practice Questions - All CISSP Domains 120Q - 2022 #2 (2 of 2 / Anthony Today) Flashcards
Michmich is helping a user who sees a message requesting to pay a ransom to get access to the data. He understands that something is not normal. What type of attack has occurred?
A. Availability
B. Confidentiality
C. Disclosure
D. Distributed
A. Availability
Explanation:
Ransomware encrypts the contents of a user’s computer to prevent legitimate use, which is an example of an availability attack. Although ransomware attacks evolve over time, the breach of confidentiality is not at the core of this type of attack. Same for disclosure.
Zoe changes the MAC address of her laptop to one that is allowed on the network. The aim is to circumvent the MAC filtering in place. Which technique is Zoe using, and what other issue can that cause?
A. Broadcast domain exploit, address conflict
B. Spoofing, token loss
C. Spoofing, address conflict
D. Sham EUI creation, token loss
C. Spoofing, address conflict
Explanation:
Changing a MAC address to another valid MAC address is spoofing. The related issue to such a change is that it might cause address collision because of the network inconsistency. As a result, both equipment with the same MAC address might become unreachable on the network. The other options listed here are not related to MAC addresses.
With the growing adoption of cloud services, security experts need to focus on cyber inquiries related to the storage and encryption of the data or to answer questions about the boundaries of responsibilities of the different parties involved. A cloud-based service that provides account provisioning, management, authentication, authorization, reporting, and monitoring capabilities is known as what type of service?
A. PaaS
B. IDaaS
C. IaaS
D. SaaS
B. IDaaS
Explanation:
PaaS is Platform as a Service, IaaS is Infrastructure as a Service, and SaaS is Software as a Service. Identity as a Service (IDaaS) provides capabilities such as account provisioning, management, authentication, authorization, reporting, and monitoring.
The company that Jenny works for has implemented a central logging infrastructure. During normal operations, Jennifer’s team uses the SIEM appliance to monitor for exceptions received via syslog. From the listed systems, which one does generally not have support of syslog events?
A. Enterprise wireless access points
B. Windows Desktop Systems
C. Linux Web Servers
D. Enterprise Firewall Devices
B. Windows Desktop Systems
Explanation:
involves testing system or application components to ensure that they work properly together. Misuse case testing focuses on how an attacker might misuse the application and would not test normal cases. Fuzzing attempts to send unexpected input and might be involved in interface testing, but it won’t cover the full set of concerns. Regression testing is conducted when testing changes and is used to ensure that the application or system functions as it did before the update or change.
You question a candidate for a cybersecurity consultant position, what answer are you expecting to the following question: Which law mandates that communications service providers cooperate with law enforcement requests?
A. ECPA
B. CALEA
C. Privacy Act
D. HITECH Act
C. Privacy Act
Explanation:
The Defense Advanced Research Projects Agency (DARPA) TCP/IP model was used to create the OSI model, and the designers of the OSI model made sure to map the OSI model layers to it. The Application layer of the TCP model maps to the Application, Presentation, and Session layers, while the TCP and OSI models both have a distinct Transport layer.
A Type 2 authentication factor that generates dynamic passwords based on an algorithm- or time-based system is what type of authenticator?
A. A PIV
B. A Smart Card
C. A Token
D. A CAC
B. A Smart Card
Explanation:
The policy is a subset of the administrative layer of access controls. Administrative, technical, and physical access controls all play an important role in security.
You have an exchange with a system engineer on securing the operating system of a server. From the following options, which one is not a privileged mode?
A. User Mode
B. Kernel Mode
C. Supervisory Mode
D. System Mode
D. System Mode
Explanation:
Worms have built-in propagation mechanisms that do not require user interaction, such as scanning for systems containing known vulnerabilities and then exploiting those vulnerabilities to gain access. Viruses and Trojan horses typically require user interaction to spread. Logic bombs do not spread from system to system but lie in wait until certain conditions are met, triggering the delivery of their payload.
Your system engineer notices that your servers are handling more workload than usual, and he suspects that a malicious software might be using your servers’ computing power. From the following options, which would be the best position to detect this type of incident?
A. NIDS
B. Firewall
C. HIDS
D. DLP
B. Firewall
Explanation:
Ethernet networks use Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) technology. When a collision is detected and a jam signal is sent, hosts wait a random period of time before attempting retransmission.
Clara used Nmap to perform a scan of a system under her control and received the results shown here. Refer to these results to answer the question. Starting Nmap 7.40 ( https://nmap.org ) at 2018-01-08 15:08 EST Nmap scan report for myhost (192.168.107.9) Host is up (0.033s latency). Not shown: 997 filtered ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 443/tcp open https If Clara’s primary concern is preventing eavesdropping attacks, which port should she block?
A. 22
B. 80
C. 443
D. 1433
B. 80
Explanation:
Port 80 is used by the HTTP protocol for unencrypted web communications. If Clara wishes to protect against eavesdropping, she should block this port and restrict web access to encrypted HTTPS connections on port 443.
Which NIST special publication covers the assessment of security and privacy controls?
A. 800-55A
B. 800-53A
C. 800-34
D. 800-86
B. 800-53A
Explanation:
NIST SP 800-53A is titled “Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans,” and covers methods for assessing and measuring controls. SP 800-34 covers contingency planning and 800-86 is the “Guide to Integrating Forensic Techniques into Incident Response.”
Suan is configuring the network equipment for a restaurant so that clients can authenticate using their email address. Additionally, the clients will have to agree with the acceptable use policy before being able to use the network. From your point of view, what network component is she setting up?
A. 802.11
B. NAC
C. A Captive Portal
D. A Wireless Gateway
C. A Captive Portal
Explanation:
From the listed option, only the captive portal can allow a connection with the email address and request the agreement to a policy. 802.11 is a standard for wireless communication, while the Network Access Control (NAC) will verify the security settings of a device before being allowed to connect on a network. Finally, the wireless gateway routes communications from a wireless network to another network.
As part of the requirements to build a secure website, it is specified that you need a proof of identity of a user that registers on the website. What would you consider as a valid proof of identity?
A. Create unique questions that only users will know
B. Ask the users to enter their social security number in addition to their username
C. Use information that both you and the user have (ie questions derived from previous exchanges)
D. Call the user on the registered phone number to verify their identity
C. Use information that both you and the user have (ie questions derived from previous exchanges)
Explanation:
From the listed options, only the authentication based on shared information can enable you to properly identify a user. Creating unique questions known solely by the user is not a viable option. Requesting the social security number is neither a secure identification method nor recommended to do. Finally, calling back the user on a registered number is not a secure manner to identify an individual because recent hacks demonstrated that phone calls can be redirected easily once the phones have been compromised.
Thomas published an article about the questions he had at the CISSP certification exam. Which aspect of the (ISC)2 code of ethics has he most directly violated?
A. Advance and protect the profession
B. Act honorably, justly, responsibly, and legally
C. Protect society, the common good, necessary public trust and confidence, and the infrastructure
D. Provide diligent and competent service to principals
A. Advance and protect the profession
Explanation:
It is clear that such an action is totally devious and harms the CISSP certification and information security community at large. Thus, publishing such an article would mostly violate the “advance and protect the profession” of the code of ethics.
Shiny is a jewelry manufacturer that creates its own jewelry pieces and sells them through its website. The person in charge of the Shiny’s software development organization aims to bring the company to use industry-standard practices. The approach chosen is to develop a new change management process for the company that would enable multiple developers to work on code at the same time. Which change management process allows this?
A. Configuration control
B. Change Control
C. Release Control
D. Request Control
B. Change Control
Explanation:
Change control provides an organized framework within which multiple developers can create and test solutions prior to rolling them out into a production environment.
Technologies are more and more sophisticated. Which one of the following technologies is not normally a capability of Mobile Device Management (MDM) solutions?
A. Remotely wiping the contents of a mobile device
B. Assuming control of a non-registered BYOD mobile device
C. Enforcing the use of device encryption
D. Managing device backups
B. Assuming control of a non-registered BYOD mobile device
Explanation:
MDM products do not have the capability of assuming control of a device not currently managed by the organization. This would be equivalent to hacking into a device owned by someone else and might constitute a crime.
If you try to secure a communication, which of the following tools would you use to guarantee a nonrepudiation?
A. Digital signature
B. Symmetric encryption
C. Firewall
D. IDS
A. Digital signature
Explanation:
From the list of options, only digital signature enables nonrepudiation for a message. Symmetric encryption does not achieve nonrepudiation because the same encryption would be applied twice. Firewall and IDS are network tools and do not achieve nonrepudiation.
During a log review, you discover a series of logs that show login failures, as shown here: Jan 31 11:39:12 ip-10-0-0-2 sshd[29092]: Invalid user admin from remotehost passwd=orange Jan 31 11:39:20 ip-10-0-0-2 sshd[29098]: Invalid user admin from remotehost passwd=Orang3 Jan 31 11:39:23 ip-10-0-0-2 sshd[29100]: Invalid user admin from remotehost passwd=Orange93 Jan 31 11:39:31 ip-10-0-0-2 sshd[29106]: Invalid user admin from remotehost passwd=Orangutan1 Jan 31 20:40:53 ip-10-0-0-254 sshd[30520]: Invalid user admin from remotehost passwd=Orangemonkey What type of attack is that?
A. A brute force attack
B. A man in the middle attack
C. A dictionary attack
D. A rainbow table attack
C. A dictionary attack
Explanation:
Based on these logs you can recognize a common word of the dictionary “orange”, from which multiple passwords are derived. Thus, it is a dictionary attack. Brute-force attacks are based on character iterations, trying out all possibilities. A rainbow table attack is based on password hashes that usually speeds up the process for an attacker. A man-in-the-middle attack would not show up in the authentication log as the attack takes place upfront.
Axel would like to ask all of his staff to sign an agreement that they will not share his organization’s intellectual property with unauthorized individuals. What type of agreement should Axel ask employees to sign?
A. SLA
B. NDA
C. OLA
D. DLP
B. NDA
Explanation:
Non-Disclosure Agreements (NDAs) prohibit employees from sharing sensitive information without authorization, even after their employment ends. They may also apply to business partners, contractors, customers, and others. Service level agreements (SLAs) and operating level agreements (OLAs) specify the parameters of service that a vendor provides to a customer. Data loss prevention (DLP) technology prevents data loss but is a technical, rather than a policy control.
After scanning all of the systems on the wireless network, you notice that one system is identified as an iOS device running a massively out-of-date version of Apple’s mobile operating system. When you investigate further, you notice that the device is an original iPad and that it cannot be updated to a current secure version of the operating system. What will be your next step?
A. Retire or replace the device
B. Isolate the device on a dedicated wireless network
C. Install a firewall on the tablet
D. Reinstall the OS
A. Retire or replace the device
Explanation:
Unfortunately this is a very common situation caused by the aging devices. Thus, based on the listed options, the retirement of the device is the only choice that you have because there are no alternatives to mitigate the risk of operating such an old iPad. Consequently, all other options are either not technically feasible, or not worth the effort.
Turlut recently decided to purchase cyber-liability insurance to cover her company’s costs in the event of a data breach. What risk management strategy is she pursuing?
A. Risk acceptance
B. Risk mitigation
C. Risk transference
D. Risk avoidance
C. Risk transference
Explanation:
It may be tempting to think that this action mitigates the risk, but concretely nothing changes. Therefore, it is a risk transference that involves shifting the impact of a potential risk from the organization incurring the risk to another organization. Insurance is a common example of risk transference.
Robert is a software developer who writes code in Node.js for his organization. The company is considering moving from a self-hosted Node.js environment to one where Robert will run her code on application servers managed by a cloud vendor. What type of cloud solution is Robert’s company considering?
A. IaaS
B. CaaS
C. PaaS
D. SaaS
C. PaaS
Explanation:
Based on the described situation, the execution of code on a cloud hosted platform is a Platform as a Service. The other options listed do not match this description.
Hector would like to access a document owned by Soulemane and stored on a file server. Based on the subject/object model, who or what is the subject of the resource request?
A. Hector
B. Soulemane
C. Server
D. Document
A. Hector
Explanation:
In a subject/object model of access control, the user or process making the request for a resource is the subject of that request. Thus, in this scenario, Hector is requesting resource access and is, therefore, the subject.
In 2022, what is the most common type of access control used by firewalls?
A. Discretionary access controls
B. Rule based access controls
C. Task based access control
D. Mandatory access controls
B. Rule based access controls
Explanation:
Firewalls use rule-based access control, or Rule-BAC, in their access control lists and apply rules created by administrators to all traffic that passes through them. DAC, or discretionary access control, allows owners to determine who can access objects they control, while task-based access control lists tasks for users. MAC, or mandatory access control, uses classifications to determine access.
You explore existing encryption algorithms with the aim to develop your own one. From the following options, which one is not a mode of operation for the Data Encryption Standard?
A. CBC
B. CFB
C. OFB
D. AES
D. AES
Explanation:
The Advanced Encryption Standard (AES) is a separate encryption algorithm. The DES modes of operation are Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR).