CISSP Q v1.4 -- Domain 3 Flashcards
A data breach was discovered after a company’s usernames and password were posted to a hacker website. Afterwards, an analyst discovered the company stored credentials in plain text. Which of the following would help mitigate this type of breach in the future?
A. Create data loss controls that prevent documents from leaving the network.
B. Implement salting and hashing.
C. Configure the web content filter to block access to the forum.
D. Increase password complexity requirements.
B. Implement salting and hashing.
Passwords should not be stored in plain text!
We want to store passwords as hashed values, and salt them for extra security!
The hashing will protect us from insiders/hackers seeing the password, while the salt will make password cracking very difficult. The salt will also make rainbow tables useless!
(more salt related details in the slide notes)
Of the control type listed below, what would a mantrap (access control vestibule) be considered?
A. Preventative
B. Physical
C. Detective
D. Deterrent
B. Physical
A mantrap, access control vestibule, sally port, or air lock:
A physical security access control system comprising a small room with two sets of interlocking doors, such that the first set of doors must close before the second set opens. This mechanism seeks to eliminate the threat of piggybacking or tailgating.
There are three well-known TYPES of controls:
* Physical
* Technical/Logical
* Administrative/Management
(A), (C), and (D) are all CATEGORIES of control.
Given the following output on an attacker’s system:
Which of the following BEST describes the type of password attack the attacker is performing?
A. Dictionary
B. Pash-the-hash
C. Brute-force
D. Known plain text
A. Dictionary
A password that long was broken in a few minutes? Must be a dictionary attack; brute force attacks could take years to crack passwords of that length.
The components of this security model include subjects, objects, clearances, and who can have access to what. These components are related to which of the following security models?
A. The Bell-LaPadula Model
B. The Clark-Wilson Model
C. The Lipner Model
D. The Biba Model
A. The Bell-LaPadula Model- Confidentiality model
Biba is an integrity model, concerned with who can modify what. Clark Wilson does not discuss clearances, only integrity ideas. We can rule both of those out. With Bell-LaPadula (BLP) and Lipner remaining, BLP is the closest match to the description above. Lipner does have some element of BLP in it, but its still mostly defined by its integrity mechanisms and there is nothing integrity related in the question.
B. The Clark-Wilson Model - Integrity Model
C. The Lipner Model - Combination of Biba and Bell-Lapadula
D. The Biba Model - Integrity Model
Which of the following statements is true of Common Criteria’s Evaluation Assurance Levels (EALs)?
A. Common Criteria has 7 EALs against which a security product may be able to get certified.
B. Common Criteria has 7 EALs against which a security product maybe able to get accredited.
C. Common Criteria EALs can be used to cross-certify with the Information Technology Security Evaluation Criteria (ITSEC) ratings, but not the Trusted Computer System Evaluation Criteria (TCSEC) ratings.
D. Common Criteria EALs can be used to cross-certify with the Trusted Computer System Evaluation Criteria (TCSEC) ratings, but not the Information Technology Security Evaluation Criteria (ITSEC) ratings.
A. Common Criteria has 7 EALs against which a security product may be able to get certified.
A stream cipher works by using which of the following?
A. Bit-by-bit substitution with Exclusive Or (XOR) and a keystream
B. Confusion, diffusion, and permutation
C. Exclusive Or (XOR) and an initialization vector (IV)
D. An initialization vector (IV), the Temporal Key Integrity
Protocol (TKIP), and Wi-Fi Protected Access (WPA)
A. Bit-by-bit substitution with Exclusive Or (XOR) and a keystream
Stream ciphers should be used to protect data in transit.
Which cipher uses key words and numerous rows (traditionally 26), each one of which is offset by one?
A. The Rail/Fence cipher
B. The Running key cipher
C. The Vigenère cipher
D. The Vernam cipher
C. The Vigenère cipher
Answer (C) is correct. The RAIL fence only uses two rows. In the running key cipher, frequently used with the Vigenère cipher, text (typically from a book) is used to provide a very long keystream, ideally one as long as the message itself. Finally, the Vernam cipher, or One Time Pad (OTP) uses one time pads from a code book.
Upper management is looking to find a new cloud provider to host the company’s software as a service product. Considering the problems your organization had with the last provider, they instructed you to find a provider who has displayed good internal governance. What indicator should be used when looking for this new provider?
A. Maturity level
B. Risk identification
C. SOC reports
D. Loss history
A. Maturity level
Maturity levels (CMM) account for a better indication of governance, surpassing losses, audits, or the ability simply ID risk.
Which of the following is true with respect to the Operating System (OS) kernel?
- It loads and runs binary programs.
- It schedules task swapping
- It allocates memory and tracks the physical location of files on the computer’s hard disk.
- It must correctly manage input/output requests from software, andtranslate them into instructions for the Central Processing Unit (CPU).
A. 1 and 2
B. 2 and 3
C. 1, 2, and 3
D. 1, 2, 3, and 4
D. 1, 2, 3, and 4
The purpose of the kernel is described in Item 4, and the ways in which it achieves its purpose are described in 1, 2 and 3.
Which of the following allows two cooperating processes to transfer information in such a way that it violates the system’s security policy?
A. Partial disclosure
B. Full disclosure
C. Covert channel
D. Opensource
C. Covert channel
Answer (C) is correct, as it is the classic definition of what a covert channel achieves.
“A covert channel is a type of attack that creates a capability to transfer information objects between processes that are not supposed to be allowed to communicate by the computer security policy.”
A Certificate Authority (CA) will occasionally have to revoke a certificate it has published. How does the CA make this fact known to users who are trusting it to deliver reliable certificates?
A. The CA informs the RA and the RA sends this information to the CA’s membership.
B. The CA destroys its Digital Certificate Signing Key and creates a new one.
C. The CA informs the major browser vendors and they change their browsers so that they do not accept any Certificates signed by that version of the CA’s key.
D. The CA publishes a special list which includes details about revoked certificates.
D. The CA publishes a special list which includes details about revoked certificates.
The special list they are describing is known as the Certificate Revocation List (CRL).
What is the difference between a Registration Authority (RA) and a Certificate Authority (CA)?
A. An RA generates the user’s public/private key pair and saves the min the PKI database.
B. An RA verifies the user credentials, and the CA issues the digital certificate.
C. The CA generates the user’s public/private key pair and the RA generates the certificate.
D. The RA verifies the user credentials, and the CA generates the user’s public/private key pair.
B. An RA verifies the user credentials, and the CA issues the digital certificate.
At no point does an RA (the company) or the CA (a computer that makes certificates) generate the end users public/private key pair. This allows us to rule out everything except (B), which is 100% correct.
Which statement below BEST describes the difference between the Electronic Code Book (ECB) and the Counter (CTR) method of encryption?
A. ECB is a block cipher, whereas CTR does not stop errors from propagating.
B. ECB is a stream cipher, whereas CTR is a block cipher.
C. Encryption errors can propagate when ECB is used, but do not propagate when Counter is used.
D. ECB can only secure short messages, whereas CTR can secure long ones as well.
D. ECB can only secure short messages, whereas CTR can secure long ones as well.
Counter does not propagate errors, so Answer (A) is eliminated. Answer (B) has the cipher modes reversed, so it is incorrect. ECB does not propagate errors, so Answer (C) is eliminated.
Given the plain text word “rambo”, which of the following statements is correct?
A. A Caesar cipher for “rambo” would yield “abrmo.”
B. A collision occurs when two different cryptographic keys encrypt “rambo” and produce the same results.
C. A transposition cipher, with reorder sequence 53421 would yield “ombar.”
D. The SHA1 hash value for “rambo” would be exactly 16 bytes long.
C. A transposition cipher, with reorder sequence 53421 would yield “ombar.”
(A) Is incorrect. A Caesar cipher is a mono-alphabetic substitution cipher, where each letter in the plaintext is replaced by a letter a fixed number of positions down the alphabet. For example, D is rotated back by three to become A, and E would be rotated back three to become B, and so forth.
(B) Is incorrect. The term collision is tied to hashing and does not utilize keys. What they are describing in (B) is known as “Key Clustering”.
100
(D) Is incorrect. Sha1’s hash length/value is 20 bytes, aka 160 bits. Not 16 bytes.
Which of the following is correct?
A. An initialization vector (IV) is used to make sure that encryptions of important texts do not change each time they are encrypted.
B. Confusion refers to making the relationship between the cipher text and the key as complex as possible; diffusion refers to dissipating the statistical structure of the plaintext over the bulk of the cipher text.
C. Only one substitution and one permutation can occur in an SP- network.
D. The avalanche effect in an encryption algorithm means that the algorithm is resistant to small changes in the plaintext.
B. Confusion refers to making the relationship between the cipher text and the key as complex as possible; diffusion refers to dissipating the statistical structure of the plaintext over the bulk of the cipher text.
Answer (B) is correct. Claude Shannon first identified these two properties in his 1945 classified report, “A Mathematical Theory of Cryptography.” Answer (A) is incorrect; IVs are used to help ensure that text does completely change when encrypted. Answer (C) is wrong; SP networks use many rounds of both substitution and permutation. The AES cipher is an excellent example of this. Answer (D) is wrong, as with the avalanche effect, a small change in the text will produce a large change in the output.
Which statement BEST describes how the term “key space” affects “cryptanalysis”?
A. The larger the key space, the easier the cryptanalysis.
B. The key space doubles each time you add a bit to the key length, which makes cryptanalysis more difficult.
C. Cryptanalysis is designing algorithms, and key space means testing the keys to ensure they work properly.
D. Cryptanalysis is most often accomplished by systematically reducing the size of the keyspace.
B. The key space doubles each time you add a bit to the key length, which makes cryptanalysis more difficult.
(A) is the opposite of the truth. Similarly (C) is wrong, as Cryptography is about designing algorithms, and cryptanalysis is about breaking them. Finally, answer (D) is wrong, as it is not most often accomplished this way.
What are the key and block sizes for the AES algorithm?
A. Keys are 128 bits; blocks are 128 and 256 bits.
B. Keys are 128 bits, as are blocks.
C. Both keys and blocks can be 128, 192, and 256 bits.
D. Keys are 128, 192, and 256 bits and blocks are 128 bits.
D. Keys are 128, 192, and 256 bits and blocks are 128 bits.
Rjindael, the algorithm from which AES was derived, was able to use the range of block sizes described in Answer (C), but the NIST specification in 2001 for the new Advanced Encryption Standard specified a block size of 128 bits only. AES does allow 128, 192, and 256 bit keys, which eliminates Answers (A) and (B).