CISSP Practice Test 2nd ed Flashcards
Domain1
101 Chris is worried that the laptops that his organization has recently acquired were modified by a third party to include keyloggers before they were delivered. Where should he focus his efforts to prevent this?
a. His supply chain
b. His vendor contracts
c. His post-purchase build process
d. The original equipment manufacturer (OEM)
A. Supply chain management can help ensure the security of hardware, software, and services that an organization acquires. Chris should focus on each step that his laptops take from the original equipment manufacturer to delivery.
Domain1
- STRIDE, PASTA, and VAST are all examples of what type of tool?
a. Risk assessment methodologies
b. Control matrices
c. Threat modeling methodologies
d. Awareness campaign tools
C. STRIDE, Process for Attack Simulation and Threat Analysis (PASTA), and Visual, Agile, and Simple Threat (VAST) modeling are all threat modeling methodologies. STRIDE was designed for applications and operating systems (but can be used more broadly), PASTA is a risk-centric modeling system, and VAST is a threat modeling concept based on Agile project management and programming techniques.
Domain1
- In her role as a developer for an online bank, Lisa is required to submit her code for testing and review. After it passes through this process and it is approved, another employee moves the code to the production environment. What security management does this process describe?
a. Regression testing
b. Code review
c. Change management
d. Fuzz testing
C. Change management is a critical control process that involves systematically managing change. Without it, Lisa might simply deploy her code to production without oversight, documentation, or testing. Regression testing focuses on testing to ensure that new code doesn’t bring back old flaws, while fuzz testing feeds unexpected input to code. Code review reviews the source code itself and may be involved in the change management process but isn’t what is described here.
Domain1
- After completing the first year of his security awareness program, Charles reviews the data about how many staff completed training compared to how many were assigned the training to determine whether he hit the 95 percent completion rate he was aiming for. What is this type of measure called?
a. A KPI
b. A metric
c. An awareness control
d. A return on investment rate
A. Charles is tracking a key performance indicator (KPI). A KPI is used to measure performance (and success). Without a definition of success, this would simply be a metric, but Charles is working toward a known goal and can measure against it. There is not a return investment calculation in this problem, and the measure is not a control.
Domain1
105 Which of the following is not typically included in a prehire screening process?
a. A drug test
b. A background check
c. Social media review
d. Fitness evaluation
D. A fitness evaluation is not a typical part of a hiring process. Drug tests, background checks, and social media checks are all common parts of current hiring practices.
Domain1
- The (ISC)2 code of ethics applies to all CISSP holders. Which of the following is not one of the four mandatory canons of the code?
a. Protect society, the common good, the necessary public trust and confidence, and the infrastructure
b. Disclose breaches of privacy, trust, and ethics
c. Provide diligent and competent service to the principles
d. Advance and protect the profession
B. The (ISC)2 code of ethics also includes “Act honorably, honestly, justly, responsibly, and legally” but does not specifically require credential holders to disclose all breaches of privacy, trust, or ethics.
Domain1
- Greg’s company recently experienced a significant data breach involving the personal data of many of their customers. Which breach laws should they review to ensure that they are taking appropriate action?
a. The breach laws in the state where they are headquartered
b. The breach laws of states they do business in
c. Only federal breach laws
d. Breach laws only cover government agencies, not private businesses
B. In general, companies should be aware of the breach laws in any location where they do business. US states have a diverse collection of breach laws and requirements, meaning that in this case, Greg’s company may need to review many different breach laws to determine which they may need to comply with if they conduct business in the state or with the state’s residents.
domain1
- Lawrence has been asked to perform vulnerability scans and a risk assessment of systems. Which organizational process are these more likely to be associated with?
a. A merger
b. A divestiture
c. A layoff
d. A financial audit
A. When organizations merge, it is important to understand the state of the security for both organizations. Running vulnerability scans and performing a risk assessment are both common steps taken when preparing to merge two (or more!) IT environments.
domain1
- Which of the following is not typically part of a termination process?
a. An exit interview
b. Recovery of property
c. Account termination
d. Signing an NCA
D. Signing a noncompete or nondisclosure agreement is typically done at hiring. Exit interviews, recovery of organizational property, and account termination are all common elements of a termination process.
domain1
- Laura has been asked to perform an SCA. What type of organization is she most likely in?
a. Higher education
b. Banking
c. Government
d. Healthcare
C. A security controls assessment (SCA) most often refers to a formal US government process for assessing security controls and is often paired with a Security Test and Evaluation (ST&E) process. This means that Laura is probably part of a government organization or contractor.
domain1
- After conducting a qualitative risk assessment of her organization, Sally recommends purchasing cybersecurity breach insurance. What type of risk response behavior is she recommending?
a. Accept
b. Transfer
c. Reduce
d. Reject
B. Purchasing insurance is a means of transferring risk. If Sally had worked to decrease the likelihood of the events occurring, she would have been using a reduce or risk mitigation strategy, while simply continuing to function as the organization has would be an example of an acceptance strategy. Rejection, or denial of the risk, is not a valid strategy, even though it occurs!
domain3
- Mike has been tasked with preventing an outbreak of malware like Mirai. What type of systems should be protected in his organization?
a. Servers
b. SCADA
c. Mobile devices
d. Internet of Things (IoT) devices
D. Mirai targeted “Internet of Things” devices, including routers, cameras, and DVRs. As organizations bring an increasing number of devices like these into their corporate networks, protecting both internal and external targets from insecure, infrequently updated, and often vulnerable IoT devices is increasing important.
domain3
- A component failure in the primary HVAC system leads to a high temperature alarm in the data center that Kim manages. After resolving the issue, what should Kim consider to prevent future issues like this?
a. A closed loop chiller
b. Redundant cooling systems
c. Swamp coolers
d. Relocating the data center to a colder climate
B. A well-designed data center should have redundant systems and capabilities for each critical part of its infrastructure. That means that power, cooling, and network connectivity should all be redundant. Kim should determine how to ensure that a single system failure cannot take her data center offline.
domain3
- As part of his team’s forensic investigation process, Matt signs drives and other evidence out of storage before working with them. What type of documentation is he creating?
a. Criminal
b. Chain of custody
c. Civil
d. CYA
B. Matt is helping to maintain the chain of custody documentation for his electronic evidence. This can be important if his organization needs to prove that the digital evidence they handled has not been tampered with. A better process would involve more than one person to ensure that no tampering was possible.
domain3
- Lauren implements ASLR to help prevent system compromises. What technique has she used to protect her system?
a. Encryption
b. Mandatory access control
c. Memory address randomization
d. Discretionary access control
C. Lauren has implemented address space layout randomization, a memory protection methodology that randomizes memory locations, which prevents attackers from using known address spaces and contiguous memory regions to execute code via overflow or stack smashing attacks.