ISC Exam CISSP Version 39.0 Flashcards
Question No : 927 - (Topic 15)
What is the FIRST step in developing a patch management plan?
A. Subscribe to a vulnerability subscription service.
B. Develop a patch testing procedure.
C. Inventory the hardware and software used.
D. Identify unnecessary services installed on systems.
B. Develop a patch testing procedure.
Question No : 928 - (Topic 15)
A company needs to provide employee access to travel services, which are hosted by a third-party service provider, Employee experience is important, and when users are already authenticated, access to the travel portal is seamless. Which of the following methods is used to share information and grant user access to the travel portal?
A. Security Assertion Markup Language (SAML) access B. Single sign-on (SSO) access
C. Open Authorization (OAuth) access
D. Federated access
D. Federated access
Question No : 930 - (Topic 15)
Before implementing an internet-facing router, a network administrator ensures that the equipment is baselined/hardened according to approved configurations and settings. This action provides protection against which of the following attacks?
A. Blind spoofing
B. Media Access Control (MAC) flooding
C. SQL injection (SQLI)
D. Ransomware
B. Media Access Control (MAC) flooding
Question No : 931 - (Topic 15)
Which application type is considered high risk and provides a common way for malware and viruses to enter a network?
A. Instant messaging or chat applications
B. E-mail applications
C. Peer-to-Peer (P2P) file sharing applications
D. End-to-end applications
A. Instant messaging or chat applications
Question No : 935 - (Topic 15)
What is a use for mandatory access control (MAC)?
A. Allows for labeling of sensitive user accounts for access control
B. Allows for mandatory user identity and passwords based on sensitivity C. Allows for mandatory system administrator access control over objects
D. Allows for object security based on sensitivity represented by a label
D. Allows for object security based on sensitivity
Mandatory Access ControlA key characteristic of the Mandatory Access Control (MAC) model is the use of labels applied to both subjects and objects. For example, if a user has a label of top secret, the user can be granted access to a top-secret document. In this example, both the subject and the object have matching labels. When documented in a table, the MAC model sometimes resembles a lattice (such as one used for a climbing rosebush), so it is referred to as a lattice-based model.
A Mandatory Access Control (MAC) model relies on the use of classification labels, discussed in Chapter 5, “Protecting Security of Assets.” Each classification label represents a security domain, or a realm of security. A security domain is a collection of subjects and objects that share a common security policy. For example, a security domain could have the label Secret, and the MAC model would protect all objects with the Secret label in the same manner. Subjects are only able to access objects with the Secret label when they have a matching Secret label. Additionally, the requirement for subjects to gain the Secret label is the same for all subjects. Users have labels assigned to them based on their clearance level, which is a form of privilege. Similarly, objects have labels, which indicate their level of classification or sensitivity. For example, the U.S. military uses the labels Top Secret, Secret, and Confidential to classify data. Administrators can grant access to Top Secret data to users with Top Secret clearances. However, administrators cannot grant access to Top Secret data to users with lower-level clearances such as Secret and Confidential.
Organizations in the private sector often use labels such as confidential (or proprietary), private, sensitive, and public. Governments use labels mandated by law, but private sector organizations are free to use whatever labels they choose. The MAC model is often referred to as a lattice-based model.
A key point about the MAC model is that every object and every subject has one or more labels. These labels are predefined, and the system determines access based on assigned labels.
Using compartmentalization with the MAC model enforces the need to know principle. Users with the Confidential label are not automatically granted access to compartments within the Confidential section. However, if their job requires them to have access to certain data, such as data with the Crimson label, an administrator can assign them the Crimson label to grant them access to this compartment. The MAC model is prohibitive rather than permissive, and it uses an implicit deny philosophy. If users are not specifically granted access to data, the system denies them access to the associated data. The MAC model is more secure than the DAC model, but it isn’t as flexible or scalable.
Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (Sybex Study Guide) (p. 688). Wiley. Kindle Edition.
Question No : 936 - (Topic 15)
A security architect is developing an information system for a client. One of the requirements is to deliver a platform that mitigates against common vulnerabilities and
attacks, What is the MOST efficient option used to prevent buffer overflow attacks?
A. Process isolation
B. Address Space Layout Randomization (ASLR)
C. Processor states
D. Access control mechanisms
B. Address Space Layout Randomization (ASLR)
https://www.techtarget.com/searchsecurity/definition/address-space-layout-randomization-ASLR
Address space layout randomization (ASLR) is a memory-protection process for operating systems (OSes) that guards against buffer-overflow attacks by randomizing the location where system executables are loaded into memory.
Question No : 937 - (Topic 15)
When recovering from an outage, what is the Recovery Point Objective (RPO), in terms of data recovery?
A. The RPO is the maximum amount of time for which loss of data is acceptable.
B. The RPO is the minimum amount of data that needs to be recovered.
C. The RPO is a goal to recover a targeted percentage of data lost.
D. The RPO is the amount of time it takes to recover an acceptable percentage of data lost.
B. The RPO is the minimum amount of data that needs to be recovered.
What is the PRIMARY benefit of incident reporting and computer crime investigations?
A. Providing evidence to law enforcement
B. Repairing the damage and preventing future occurrences C. Appointing a computer emergency response team
D. Complying with security policy
D. Complying with security policy
Question No : 944 - (Topic 15)
Why is data classification control important to an organization?
A. To ensure its integrity, confidentiality and availability
B. To enable data discovery
C. To control data retention in alignment with organizational policies and regulation D. To ensure security controls align with organizational risk appetite
A. To ensure its integrity, confidentiality and availability
A data classification identifies the value of the data to the organization and is critical to protect data confidentiality and integrity. The policy identifies classification labels used within the organization. It also identifies how data owners can determine the proper classification and how personnel should protect data based on its classification.
Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (Sybex Study Guide) (p. 182). Wiley. Kindle Edition.
The Chief Information Security Officer (CISO) of an organization has requested that a Service Organization Control (SOC) report be created to outline the security and availability of a particular system over a 12-month period. Which type of SOC report should be utilized?
A. SOC 1 Type 2
B. SOC 2 Type 1
C. SOC 2 Type 2
D. SOC 3 Type 1
C. SOC 2 Type 2
Question No : 946 - (Topic 15)
Which of the following BEST describes centralized identity management?
A. Service providers rely on a trusted third party (TTP) to provide requestors with both credentials and identifiers.
B. Service providers agree to integrate identity system recognition across organizational boundaries.
C. Service providers identify an entity by behavior analysis versus an identification factor.
D. Service providers perform as both the credential and identity provider (IdP).
B. Service providers agree to integrate identity system recognition across organizational boundaries.
Question No : 947 - (Topic 15)
A new site’s gateway isn’t able to form a tunnel to the existing site-to-site Internet Protocol Security (IPsec) virtual private network (VPN) device at headquarters. Devices at the new site have no problem accessing resources on the Internet. When testing connectivity between the remote site’s gateway, it was observed that the external Internet Protocol (IP) address of the gateway was set to 192.168.1.1. and was configured to send outbound traffic to the Internet Service Provider (ISP) gateway at4 192.168.1.2. Which of the following would be the BEST way to resolve the issue and get the remote site connected?
A. Enable IPSec tunnel mode on the VPN devices at the new site and the corporate headquarters.
B. Enable Layer 2 Tunneling Protocol (L2TP) on the VPN devices at the new site and the corporate headquarters.
C. Enable Point-to-Point Tunneling Protocol (PPTP) on the VPN devices at the new site and the corporate headquarters.
D. Enable Network Address Translation (NAT) - Traversal on the VPN devices at the new site and the corporate headquarters.
A. Enable IPSec tunnel mode on the VPN devices at the new site and the corporate headquarters.
Question No : 949 - (Topic 15)
Which of the following is included in the Global System for Mobile Communications (GSM) security framework?
A. Public-Key Infrastructure (PKI)
B. Symmetric key cryptography
C. Digital signatures
D. Biometric authentication
B. Symmetric key cryptography
Question No : 951 - (Topic 15)
Which of the following explains why classifying data is an important step in performing a Risk assessment?
A. To provide a framework for developing good security metrics
B. To justify the selection of costly security controls
C. To classify the security controls sensitivity that helps scope the risk assessment
D. To help determine the appropriate level of data security controls
D. To help determine the appropriate level of data security controls
The primary purpose of data classification is to indicate the level of confidentiality, integrity, and availability protection that is required for each type of data set.
Earlier, this chapter touched upon the importance of recognizing what information is critical to a company and assigning a value to it. The rationale behind assigning val- ues to different types of data is that it enables a company to gauge the amount of funds and resources that should go toward protecting each type of data, because not all data has the same value to a company. After identifying all important information, it should be properly classified. A company has a lot of information that is created and main- tained. The reason to classify data is to organize it according to its sensitivity to loss, disclosure, or unavailability. Once data is segmented according to its sensitivity level, the company can decide what security controls are necessary to protect different types of data. This ensures that information assets receive the appropriate level of protection, and classifications indicate the priority of that security protection. The primary purpose of data classification is to indicate the level of confidentiality, integrity, and availability protection that is required for each type of data set. Many people mistakenly only con- sider the confidentiality aspects of data protection, but we need to make sure our data is not modified in an unauthorized manner and that it is available when needed.
Data classification helps ensure data is protected in the most cost-effective manner.
Question No : 952 - (Topic 15)
In software development, which of the following entities normally signs the code to protect the code integrity?
A. The organization developing the code
B. The quality control group
C. The data owner
D. The developer
B. The quality control group
segregation / separation of duties
Question No : 953 - (Topic 15)
Which of the following BEST describes the purpose of the reference monitor when defining access control to enforce the security model?
A. Quality design principles to ensure quality by design
B. Policies to validate organization rules
C. Cyber hygiene to ensure organizations can keep systems healthy
D. Strong operational security to keep unit members safe
B. Policies to validate organization rules
Question No : 956 - (Topic 15)
A web-based application known to be susceptible to attacks is now under review by a senior developer. The organization would like to ensure this application Is less susceptible to injection attacks specifically,
What strategy will work BEST for the organization’s situation?
A. Do not store sensitive unencrypted data on the back end.
B. Whitelist input and encode or escape output before it is processed for rendering.
C. Limit privileged access or hard-coding logon credentials,
D. Store sensitive data in a buffer that retains data in operating system (OS) cache or memory.
B. Whitelist input and encode or escape output before it is processed for rendering.
Question No : 957 - (Topic 15)
A security professional has been assigned to assess a web application. The assessment report recommends switching to Security Assertion Markup Language (SAML). What is the PRIMARY security benefit in switching to SAML?
A. It uses Transport Layer Security (TLS) to address confidentiality.
B. it enables single sign-on (SSO) for web applications.
C. The users’ password Is not passed during authentication.
D. It limits unnecessary data entry on web forms.
B. it enables single sign-on (SSO) for web applications.
SAML is a popular SSO standard on the internet. It is used to exchange authentication and authorization (AA) information.
SAML Security Assertion Markup Language (SAML) is an open XML-based standard commonly used to exchange authentication and authorization (AA) information between federated organizations. It provides SSO capabilities for browser access. The Organization for the Advancement of Structured Information Standards (OASIS), a nonprofit consortium that encourages open standards development, adopted SAML 2.0 as an OASIS standard in 2005 and has maintained it since then. SAML 2.0 is a convergence of SAML 1.1, the Liberty Alliance Identity Federation Framework (ID-FF) 1.2, and Shibboleth 1.3. The SAML 2.0 specification utilizes three entities: the principal, the service provider, and the identity provider. For example, imagine Sally is accessing her investment account at ucanbeamillionaire.com. The site requires her to log on to access her account, and the site uses SAML. Principal or User AgentFor simplicity, think of Sally as the principal. She’s trying to access her investment account at ucanbeamillionaire.com. Service Provider (SP)In this scenario, the ucanbeamillionaire.com site is providing the service and is the service provider. Identity Provider (IdP)This is a third party that holds the user authentication and authorization information. When Sally accesses the site, it prompts her to enter her credentials. When she does, the site sends her credentials to the IdP. The IdP then responds with XML messages validating (or rejecting) Sally’s credentials and indicating what she is authorized to access. The site then grants her access to her account. The IdP can send three types of XML messages known as assertions: Authentication AssertionThis provides proof that the user agent provided the proper credentials, identifies the identification method, and identifies the time the user agent logged on. Authorization AssertionThis indicates whether the user agent is authorized to access the requested service. If the message indicates access is denied, it indicates why. Attribute AssertionAttributes can be any information about the user agent. Clearly, there is much more going on here. If you want to dig into the details, the www.oasis-open.org/standards site has more details on SAML 2.0. Many cloud service providers include SAML in their solutions because it simplifies the services for their customers. SAML provides authentication assertion, attribute assertion, and authorization assertion.
Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (Sybex Study Guide) (pp. 691-692). Wiley. Kindle Edition.
Question No : 958 - (Topic 15)
Which element of software supply chain management has the GREATEST security risk to organizations?
A. New software development skills are hard to acquire.
B. Unsupported libraries are often used.
C. Applications with multiple contributors are difficult to evaluate. D. Vulnerabilities are difficult to detect.
B. Unsupported libraries are often used.
Question No : 964 - (Topic 15)
Which organizational department is ultimately responsible for information governance related to e-mail and other e-records?
A. Audit
B. Compliance
C. Legal
D. Security
C. Legal
Question No : 967 - (Topic 15)
Which of the following BEST describes when an organization should conduct a black box security audit on a new software product?
A. When the organization wishes to check for non-functional compliance
B. When the organization wants to enumerate known security vulnerabilities across their infrastructure
C. When the organization has experienced a security incident
D. When the organization is confident the final source code is complete
A. When the organization wishes to
Question No : 968 - (Topic 15)
Which of the following will accomplish Multi-Factor Authentication (MFA)?
A. Issuing a smart card with a user-selected Personal Identification Number (PIN)
B. Requiring users to enter a Personal Identification Number (PIN) and a password
C. Performing a palm and retinal scan
D. Issuing a smart card and a One Time Password (OTP) token
A. Issuing a smart card with a user-selected Personal Identification Number (PIN)
Authentication using two or more factors to achieve authentication. Factors include: (i) something you know (e.g. password/personal identification number (PIN)); (ii) something you have (e.g., cryptographic identification device, token); or (iii) something you are (e.g., biometric).
Question No : 969 - (Topic 15)
What level of Redundant Array of Independent Disks (RAID) is configured PRIMARILY for high-performance data reads and writes?
A. RAID-0
B. RAID-1
C. RAID-5
D. RAID-6
A. RAID-0
Question No : 971 - (Topic 15)
When reviewing the security logs, the password shown for an administrative login event was ‘ OR ‘ ‘1’=’1’ –. This is an example of which of the following kinds of attack?
A. Brute Force Attack
B. Structured Query Language (SQL) Injection
C. Cross-Site Scripting (XSS)
D. Rainbow Table Attack
B. Structured Query Language (SQL) Injection
Question No : 972 - (Topic 15)
The Open Web Application Security Project’s (OWASP) Software Assurance Maturity Model (SAMM) allows organizations to implement a flexible software security strategy to
measure organizational impact based on what risk management aspect?
A. Risk tolerance
B. Risk exception
C. Risk treatment
D. Risk response
D. Risk response
Question No : 976 - (Topic 15)
What type of investigation applies when malicious behavior is suspected between two organizations?
A. Regulatory
B. Criminal
C. Civil
D. Operational
C. Civil
Question No : 977 - (Topic 15)
Which security evaluation model assesses a product’s Security Assurance Level (SAL) in comparison to similar solutions?
A. Payment Card Industry Data Security Standard (PCI-DSS)
B. International Organization for Standardization (ISO) 27001
C. Common criteria (CC)
D. Control Objectives for Information and Related Technology (COBIT)
C. Common criteria (CC)
Question No : 978 - (Topic 15)
Which of the following is used to ensure that data mining activities Will NOT reveal sensitive data?
A. Implement two-factor authentication on the underlying infrastructure.
B. Encrypt data at the field level and tightly control encryption keys.
C. Preprocess the databases to see if information can be disclosed from the learned patterns.
D. Implement the principle of least privilege on data elements so a reduced number of users can access the database.
D. Implement the principle of least privilege on data elements so a reduced number of users can access the database.
Question No : 980 - (Topic 15)
Which of the following is the MOST secure password technique?
A. Passphrase
B. One-time password
C. Cognitive password
D. Ciphertext
A. Passphrase
Question No : 981 - (Topic 15)
Which of the following ensures old log data is not overwritten?
A. Increase log file size
B. Implement Syslog
C. Log preservation
D. Log retention
C. Log preservation
Question No : 982 - (Topic 15)
An organization seeks to use a cloud Identity and Access Management (IAM) provider whose protocols and data formats are incompatible with existing systems.
Which of the following techniques addresses the compatibility issue?
A. Require the cloud IAM provider to use declarative security instead of programmatic authentication checks
B. Integrate a Web-Application Firewall (WAF) in reverse-proxy mode in front of the service provider
C. Apply Transport Layer Security (TLS) to the cloud-based authentication checks
D. Install an on-premise Authentication Gateway Service (AGS) in front of the service provider
D. Install an on-premise Authentication Gateway Service (AGS) in front of the service provider
In the last 15 years a company has experienced three electrical failures. The cost associated with each failure is listed below.
Availability = $60,000
Integrity = 10,000
Confidentiality = 0
Total = $70K
Which of the following would be a reasonable annual loss expectation?
A. 140,000
B. 3,500
C. 350,000
D. 14,000
D. 14,000
ALE = ARO x SLE
ARO = (Number of Failures) / (Number of Years)
ARO = 3 / 15
ARO = 0.2 (per year)
Total SLE = 70,000
Therefore, ALE is 0.2 x 70,000 = 14,000