CISSP Q v1.4 -- Domain1: Security and Risk Management Flashcards
≈
Which listing puts some of the steps of a penetration test in their correct order?
A. Fuzzing, vulnerability mapping, pivoting
B. Discovery, fuzzing, vulnerability scanning
C. Enumeration, vulnerability mapping, exploitation
D. Exploitation, discovery, vulnerability scanning
C
The correct and logical order:
1. Discovery
2. Enumeration
3. Vulnerability mapping
4. Exploitation
5. Document findings
Fuzzing is used to test input validation and while it might be occasionally used in the exploitation process, it is not its own step in any standard pen-test.
Controls can MITIGATE identified risks. Which statement below best describes a risk RESPONSE?
A. Accepting a risk because you want to do the task.
B. Rejecting a risk because you decide that the task is something
you do not want to do.
C. Using a cloud provider so that risk is transferred to a third
party.
D. Return on Investment (ROI) determinations for the selection
of controls.
C. Using a cloud provider so that risk is transferred to a third
party.
The first sentence in the question is a distractor and has no effect on the question itself. (A) and (B) do not explain how the control is being utilized, so they are weak if not bad
5
answers. (C) Is a great example of risk transference and one benefit of using cloud services. (D) could be considered when choosing a control, but is not a response itself.
Which of the following is NOT a risk decision involved in the practice of doing background checks?
A. Risk mitigation B. Risk acceptance C. Risk avoidance D. Risk transference
D. Risk transference
Organizations should attempt to mitigate the risks associated with bringing in new employees by performing background checks. Determining whether the organization is running an acceptable level of risk by hiring an individual is also part of this process, as is risk avoidance. Meanwhile, background checks do not involve any form of risk transference.
What statement below BEST describes Information Security
Management?
A. It is an outline of the configurations that provide the highest level of security for that system.
B. It structures, implements and maintains appropriate policies, procedures, standards and guidelines in order to obtain an acceptable level of risk.
C. It is a brief high-level statement defining what is and is not permitted in the operation of the information system.
D. It is senior management’s listing of the controls that will be used to protect the information system.
B. It structures, implements and maintains appropriate policies, procedures, standards and guidelines in order to obtain an acceptable level of risk.
(A) is incorrect because Security Management is not an outline, nor does it discuss configurations. (C) is the rationale for your security policy, not the policy itself. (D) Security Management is not a list controls.
Which of the following BEST describes the goal of an organization’s information security plan?
A. Assure protection of organizational data and information.
B. Select the technology solutions that will enhance
organizational security effectiveness.
C. Identify potential risks of organization’s employee behavior.
D. Align organizational data protection schemes to business
goals.
D. Align organizational data protection schemes to business
goals.
(A) is a wish list. We would love for that to be true, but it isn’t practical. (B) The security plan is much more than the technology solutions. (C) is an HR item and does not describe the goal of the security plan.
The first goal of security, and thereby an organization’s info sec plan, is to help the business thrive and achieve its goals!
To whom or what should a Chief Security Officer (CSO) report according to best practices?
A. To the Human Resources department, so that personal violations can be promptly dealt with.
B. To the CEO, to get the messages and suspected impact of an organizational breach known as soon as possible.
C. As high up in the organization as possible to maintain visibility for Information security and limit the inaccurate translation of messages as they move through organizational management levels.
D. To the Administrative services department, so that implications of the breach can be dealt with as soon as possible.
C. As high up in the organization as possible to maintain visibility for Information security and limit the inaccurate translation of messages as they move through organizational management levels.
We don’t know anything about this organization or the industry it is in, so we’ll need an answer that fits most, if not all, organizations. (C) is true for most organizations and really is the best practice in any situation.
The Organization for Economic Cooperation and Development (OECD) has generated and published a set of 8 principles for personal privacy. Which of the following is NOT one of these 8 principles?
A. Openness Principle
B. Right to Be Forgotten Principle
C. Individual Participation Principle
D. Data Quality Principle
B. Right to Be Forgotten Principle
THE EIGHT OECD PRINCIPALS:
* Collection Limitation Principle
* Data Quality Principle
* Purpose Specification principle
* Use Limitation Principle
* Security Safeguards Principle
* Openness Principle
* Individual Participation Principle
* Accountability Principle
The “right to be forgotten” also know as the “right to erasure” is part of the GDPR, a privacy regulation found in the EU. This right was not part of the OECD principals that predated the GDPR.
A CISSP candidate signs his or her agreement to the ISC2 Code of Ethics statement. Which of the following would violate this Code and could cause the candidate to lose his or her certification?
A. Submitting comments on the questions of the exam to (ISC)2.
B. Submitting comments to the board of directors regarding the test and content of the class.
C. Conducting a presentation about the CISSP certification and what the certification means.
D. E-mailing remembered test questions from the exam to other CISSP candidates.
D. E-mailing remembered test questions from the exam to other CISSP candidates.
The first three answers are perfectly acceptable according to the ISC2 code. However, (D) is absolutely a violation!
Which of the following terms and its associated definition is INCORRECT?
a. Standards are rules that do not have to be followed by top level management.
b. Baselines are the minimum level of security an approved hardware item requires.
c. Guidelines are recommended actions for users, IT and operations staff.
d. Procedures are detailed, step-by-step tasks that should be performed to meet a security goal.
a. Standards are rules that do not have to be followed by top level management.
Standards are well-established ways of doing things, so even top management should follow them. Answers (B), (C), and (D) are correct definitions.
Which of the following best describes the process of conducting a Business Impact Analysis (BIA)?
A. Analyzing corporate functions, such as accounting, personnel and legal, to determine which functions must be operational immediately following an outage.
B. Analyzing the organization’s operations to determine what the impact of an outage would be.
C. Documenting the procedures and capabilities necessary to sustain an organization’s essential functions at an alternate site.
D. Documenting viable recovery options for each business unit in the event of an outage.
B. Analyzing the organization’s operations to determine what the impact of an outage would be.
Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to critical business operations. After the BIA is complete, we can move onto (A), (C), and (D), which would be part of the BCP/DRP cycle.
What is the primary organizational benefit of conducting a candidate background check?
A. Reduce the likelihood of fraud or theft.
B. Increased likelihood of productivity.
C. Ability to reduce training costs.
D. Increased security awareness.
A. Reduce the likelihood of fraud or theft.
While an organization would benefit from all of these things, background checks are performed primarily to reduce the risk associated with hiring a new employee. Thereby, (A) is the best and most straightforward answer.
Which of the following is the effect of job rotation on organizational security?
A. Privileged personnel will never stay on the job long enough to learn how to bypass security controls.
B. Reassigned personnel will be able to modify their old administrative files.
C. As personnel rotate through jobs, they will learn how to implement new procedures.
D. Privileged personnel involved in violations of security policy cannot be certain that they can always avoid detection.
D. Privileged personnel involved in violations of security policy cannot be certain that they can always avoid detection.
The clue to picking this one is the word “security” in the question. Job rotation here is a “deterrent” control. Because privileged personnel are aware that they will be rotated out of a position, they will be less likely to perform actions that might be detectable by the next person holding that assignment.
A company has 3 Tiers of network technicians. Tier 1 connects devices and does troubleshooting for network connectivity, Tier 2 manages switches, and Tier 3 manages firewalls and IDS devices. Allowing Tier 1 technicians read-only access to system routers is an example of which control listed below?
A. Due care and due diligence.
B. Separation of Duties.
C. Least privilege.
D. Job rotation.
C. Least privilege.
While having three separate tiers doing different tasks is considered “separation of duties,” the question is actually asking about the limited permissions of the Tier 1 technicians. Limiting Tier 1 technicians to read only is an example of the technical control known as “least privilege.”
Least Privilege:
Giving a user account or process only those privileges which are essential/required to perform its intended function, thereby reducing risk.
Which of the following are the four major steps for successful risk assessments?
A. Prepare, Conduct, Perform, Communicate
B. Conduct, Perform, Communicate, Maintain
C. Perform, Conduct, Analyze, Communicate
D. Prepare, Perform, Communicate, Maintain
D. Prepare, Perform, Communicate, Maintain
Maintain, aka maintenance, is a must have for any risk assessment, so we can rule out (A) and (C) since they don’t include it.
Between (B) and (D), it makes sense that we should “Prepare” before “Performing” the assessment, so (D) is correct, and (B) is wrong.
Which of the following is NOT correct with respect to quantitative risk assessments?
A. Once in 100 years means an ARO (Annualized Rate of Occurrence) value of 0.01.
B. The SLE (Single Loss Expectancy) is the dollar value lost when an asset is successfully attacked.
C. The ALE (Annualized Loss Expectancy) is the annual percentage of the asset lost when the asset is successfully attacked.
D. The EF (ExposureFactor) value ranges from 0 to 1.
C. The ALE (Annualized Loss Expectancy) is the annual percentage of the asset lost when the asset is successfully attacked.
The ALE is the average dollar value lost every year, not the percentage of the asset lost. The percentage of the asset lost is the EF (Exposure Factor).
Asset Value x Exposure Factor = Single Loss Expectancy
Single Loss Expectancy x Annual Rate of Occurrence = Annual Loss Expectancy
Match the following attacks with the descriptions found below.
A. Directive - B. Detective - C. Compensating - D. Corrective
- Control implemented to substitute
for the loss of a primary control. - Designed to signal a warning or present a notice that a security control has been breached.
- Implemented to remedy a circumstance, mitigate damage, or restore controls.
- Specifies acceptable rules of behavior within an organization.
- Compensating
- Detective
- Corrective
- Directive
Which of the following is the best definition of risk avoidance?
A. Not mitigating the risk and absorbing the cost when and if it occurs.
B. Getting rid of the risk by purchasing a proper insurance policy.
C. Because of the activity’s inherent danger, you discontinue the activity.
D. Providing countermeasures to reduce the risk and strengthen the security posture.
C. Because of the activity’s inherent danger, you discontinue the activity.
Each of these answers is a different type of risk response.
(A) – RISK ACCEPTANCE (C) – RISK AVOIDANCE
(B) – RISK TRANSFERENCE (D) – RISK MITIGATION
When selecting a control, which of the following is usually the most important to consider?
A. Since assurance is a primary concern, the control that produces the most informative log files should be chosen.
B. The control cost should be less than the value of the asset(s) being protected.
C. The cheapest control that does the job should be chosen.
D. The control from the most reputable vendor should be
chosen.
B. The control cost should be less than the value of the asset(s) being protected.
(B) Is correct. Never spend more on protecting an asset than it is worth!
You wouldn’t spend a million dollars to protect a computer system (data included) that was only valued at a half million.
The International Organization for Standardization (ISO) standard 27002 helps vendors comply with organizational needs by describing:
A. Financial soundness and various business viability metrics.
B. Standard best practices for procurement of various controls.
C. Guidelines and practices of security controls.
D. Contract-agreement writing standards.
C. Guidelines and practices of security controls.
While not the worst answer, (B) is incorrect because 27002 isn’t specifically focused on the procurement of various controls. Instead, 27002 is far more
general, and focuses on best practice (aka guidelines) for selecting, improving, and maintaining controls. This leaves us with (C) as the best answer.
Match the following attacks with the descriptions found below.
A. Pretexting attack B. Baiting attack C. Phishing Attack D. Vishing Attack
1 Using email or malicious websites to solicit personal information by posing as a trustworthy organization.
2 Leaving USB flash drives with “interesting” labels in locations sure to be found by others.
3 Using a phone system to send a legitimate-sounding copy of a bank’s Interactive Voice Response (IVR) system, instructing the victim to call back.
4 Creating an invented scenario to engage a targeted victim, with the intent of getting him or her to divulge information.
1- C. Phishing Attack
2- B. Baiting attack
3- D. Vishing Attack
4- A. Pretexting attack
If a company truly wants to protect its intellectual property, which of the following is the MOST important policy to implement?
A. Employees should sign a non-disclosure agreement.
B. Employees should implement and configure their own desktop controls.
C. Employees should be made aware that countermeasures are in place.
D. Employees should be made aware that the company does business internationally and sign off on the company’s trans-border agreement.
A. Employees should sign a non-disclosure agreement.
Which answer contains first, an ADMINISTRATIVE control and second, a LOGICAL control?
A. Login Passwords and Fences.
B. Job supervision and automated fail-over to a mirrored site.
C. Job Rotation and “Beware of Dog” sign.
D. Job Supervision and Disaster Recovery Plan.
B. Job supervision and automated fail-over to a mirrored site.
We are looking for administrative, followed by logical.
(A) Loginpasswordsislogical,whilefencesarephysical
(B) Jobsupervisionisadministrative,andautomatedfail-overislogical–correctanswer! (C) Jobrotationisadministrative,andsignsarephysical
(D) Jobsupervisionisadministrative,andDRPisadministrative
Match each of the documents or processes with the definitions below.
A. Due Diligence
B. Service Level Requirement
C. Service Level Report
D. Service Level Agreement
1- Contains the client’s view of what is expected from the purchased service.
2- Performing activities such as on-site assessments, document exchanges, and process or policy reviews.
3- Defines the agreed upon level of performance, and penalties to be paid if not achieved.
4- Gives insight into a service provider’s ability to deliver the agreed upon service quality.
1- B SERVICE LEVEL REQUIREMENT
2- A DUE DILIGENCE
3- D SERVICE LEVEL AGREEMENT
4- C SERVICE LEVEL REPORT
How should a request by an IT auditor for access to programs and data which are protected by logical access control software be treated?
A. The request should be approved and the auditor given access via a guest user-id and password.
B. The request should be refused, and the auditor provided with access to audit logs only.
C. The request should be refused based on the principle of least privilege.
D. The request should be in writing and must receive written approval before access is allowed.
D. The request should be in writing and must receive written approval before access is allowed.
Any requests from the auditor should be formalized and company procedures followed.