Operations Security Flashcards

1
Q

The PRIMARY purpose of operations security is
A. Protect the system hardware from environment damage.
B. Monitor the actions of vendor service personnel.
C. Safeguard information assets that are resident in the system.
D. Establish thresholds for violation detection and logging.

A

Answer: C
Explanation: I think A or C could be the answers. I am leaning towards the C answer but use your
best judgment. “Operations Security can be described as the controls over the hardware in a computing facility, the data media used in a facility, and the operators using these resources in a facility…A Cissp candidate will be expected to know the resources that must be protected, the privileges that must be restricted, the control mechanisms that are available, the potential for access abuse, the appropriate controls, and the principles of good practice.” -Ronald Krutz The CISSP PREP Guide (gold edition) pg 297

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following is not a component of a Operations Security “triples”?  
A. Asset 
B. Threat 
C. Vulnerability 
D. Risk
A

Answer: D
Reference: pg 298 Krutz: CISSP Study Guide: Gold Edition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A periodic review of user account management should not determine:
A. Conformity with the concept of least privilege
B. Whether active accounts are still being used
C. Strength of user-chosen passwords
D. Whether management authorizations are up-to-date

A

Answer: C
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following functions is less likely to be performed by a typical security administrator?
A. Setting user clearances and initial passwords
B. Adding and removing system users
C. Setting or changing file sensitivity labels
D. Reviewing audit data

A

Answer: B
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Who is responsible for setting user clearances to computer-based information?  
A. Security administrators 
B. Operators 
C. Data owners 
D. Data custodians
A

Answer: A
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Who is the individual permitted to add users or install trusted programs?    
A. Database Administrator 
B. Computer Manager 
C. Security Administrator 
D. Operations Manager
A
Answer: D 
Explanation: Typical system administrator or enhanced operator functions can include the following Installing system software 
Starting up (booting) and shutting down a system Adding and removing system users Performing back-ups and recovery Handling printers and managing print queues -Ronald Krutz The CISSP PREP Guide (gold edition) pg 305-304
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
In Unix, which file is required for you to set up an environment such that every user on the other host is a trusted user that can log into this host without authentication?    
A. /etc/shadow 
B. /etc/host.equiv 
C. /etc/passwd 
D. None of the choices.
A

Answer: B
Explanation: The /etc/hosts.equiv file is saying that every user on the other host is a trusted user and allowed to log into this host without authentication (i.e. NO PASSWORD). The only thing that must exist for a user to log in to this system is an /etc/passwd entry by the same login name the user is currently using. In other words, if there is a user trying to log into this system whose login name is “bhope”, then there must be a “bhope” listed in the /etc/passwd file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

For what reason would a network administrator leverage promiscuous mode?
A. To screen out all network errors that affect network statistical information.
B. To monitor the network to gain a complete statistical picture of activity.
C. To monitor only unauthorized activity and use.
D. To capture only unauthorized internal/external use.

A

Answer: B
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following questions is less likely to help in assessing controls over hardware and software maintenance?
A. Is access to all program libraries restricted and controlled?
B. Are integrity verification programs used by applications to look for evidences of data tampering, errors, and omissions?
C. Is there version control?
D. Are system components tested, documented, and approved prior to promotion to production?

A

Answer: B
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following correctly describe “good” security practice?
A. Accounts should be monitored regularly.
B. You should have a procedure in place to verify password strength.
C. You should ensure that there are no accounts without passwords.
D. All of the choices.

A

Answer: D
Explanation: In many organizations accounts are created and then nobody ever touches those accounts again. This is a very poor security practice. Accounts should be monitored regularly, you should look at unused accounts and you should have a procedure in place to ensure that departing employees have their rights revoke prior to leaving the company. You should also have a procedure in place to verify password strength or to ensure that there are no accounts without passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Access to the \_\_\_\_\_\_\_\_\_ account on a Unix server must be limited to only the system administrators that must absolutely have this level of access.    
A. Superuser of inetd. 
B. Manager or root. 
C. Fsf or root 
D. Superuser or root.
A

Answer: D
Explanation: Access to the superuser or root account on a server must be limited to only the system administrators that must absolutely have this level of access. Use of programs such as SUDO is recommended to give limited and controlled root access to administrators that have a need for such access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which of the following files should the security administrator be restricted to READ only access?  
A. Security parameters 
B. User passwords 
C. User profiles 
D. System log
A

Answer: D
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Root login should only be allowed via:   
A. Rsh 
B. System console 
C. Remote program 
D. VNC
A

Answer: B
Explanation: The root account must be the only account with a user ID of 0 (zero) that has open access to the UNIX shell. It must not be possible for root to sign on directly except at the system console. All other access to the root account must be via the ‘su’ command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does “System Integrity” mean?
A. The software of the system has been implemented as designed.
B. Users can’t tamper with processes they do not own
C. Hardware and firmware have undergone periodic testing to verify that they are functioning properly
D. Design specifications have been verified against the formal top-level specification

A

Answer: C
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Operations Security seeks to primarily protect against which of the following?  
A. object reuse 
B. facility disaster 
C. compromising emanations 
D. asset threats
A

Answer: D
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
In order to avoid mishandling of media or information, you should consider using:    
A. Labeling 
B. Token 
C. Ticket 
D. SLL
A

Answer: A
Explanation: In order to avoid mishandling of media or information, proper labeling must be used. All tape, floppy disks, and other computer storage media containing sensitive information must be externally marked with the appropriate sensitivity classification. All tape, floppy disks, and other computer storage media containing unrestricted information must be externally marked as such. All printed copies, printouts, etc., from a computer system must be clearly labeled with the proper classification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
In order to avoid mishandling of media or information, which of the following should be labeled?     
A. All of the choices. 
B. Printed copies 
C. Tape 
D. Floppy disks
A

Answer: A
Explanation: In order to avoid mishandling of media or information, proper labeling must be used.
All tape, floppy disks, and other computer storage media containing sensitive information must be externally marked with the appropriate sensitivity classification. All tape, floppy disks, and other computer storage media containing unrestricted information must be externally marked as such. All printed copies, printouts, etc., from a computer system must be clearly labeled with the proper classification. As a rule of thumb, you should have an indication of the classification of the document. The classification is based on the sensitivity of information. It is usually marked at the minimum on the front and back cover, title, and first pages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
Compact Disc (CD) optical media types is used more often for:  
A. very small data sets 
B. very small files data sets 
C. larger data sets 
D. very aggregated data sets
A

Answer: A
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
At which temperature does damage start occurring to magnetic media?  
A. 100 degrees 
B. 125 degrees 
C. 150 degrees 
D. 175 degrees
A

Answer: A
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following statements pertaining to air conditioning for an information processing facility is correct?
A. The AC units must be controllable from outside the area
B. The AC units must keep negative pressure in the room so that smoke and other gases are forced out of the room
C. The AC units must be on the same power source as the equipment in the room to allow for easier shutdown
D. The AC units must be dedicated to the information processing facilities

A

Answer: D
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
Removing unnecessary processes, segregating inter-process communications, and reducing executing privileges to increase system security is commonly called    
A. Hardening 
B. Segmenting 
C. Aggregating 
D. Kerneling
A

Answer: A
Explanation: What is hardening? Naturally, there is more than one definition, but in general, one tightens control using policies which affect authorization, authentication and permissions. Nothing happens by default. You only give out permission after thinking about it, something like “deny all” to everyone, then “allow” with justification. Shut off everything, then only turn on that which must be turned on. It is not unlike locking every single door, window and access point in your house, then unlocking only those that need to be. It is quite common for users to take all the defaults when their new system gets turned on making for instant vulnerability. A major problem is trying to figure out where all those details are that need to be turned off, without making the system unusable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
Which of the following RAID levels functions as a single virtual disk?  
A. RAID Level 7 
B. RAID Level 5 
C. RAID Level 10 
D. RAID Level 2
A

Answer: D
Explanation: RAID level 2 would be our guess, but all of them can function as a single virtual disk, that is what logical drives present.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
Which of the following takes the concept of RAID 1 (mirroring) and applies it to a pair of servers?  
A. A redundant server implementation 
B. A redundant client implementation 
C. A redundant guest implementation 
D. A redundant host implementation
A

Answer: A

Explanation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
Which of the following enables the drive array to continue to operate if any disk or any path to any disk fails?  
A. RAID Level 7 
B. RAID Level 1 
C. RAID Level 2 
D. RAID Level 5
A

Answer: A
Explanation: “RAID Level 7 is a variation of RAID 5 wherein the array functions as a single virtual disk in the hardware. This is sometimes simulated by software running over a RAID level 5 hardware implementation, which enables the drive array to continue to operate if any disk or any path to any disk fails. It also provides parity protection.” Pg 91 Krutz: CISSP Prep Guide: Gold Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
Depending upon the volume of data that needs to be copied, full backups to tape can take:  
A. an incredible amount of time 
B. a credible amount of time 
C. an ideal amount of time 
D. an exclusive amount of time
A

Answer: A
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which one of the following entails immediately transmitting copies of on-line transactions to a remote computer facility for back?
A. Archival storage management (ASM)
B. Electronic vaulting
C. Hierarchical storage management (HSM)
D. Data compression

A

Answer: B
Explanation: “Electronic vaulting makes an immediate copy of a changed file or transaction and sends it to a remote location where the original backup is stored….Another technology used for automated backups is hierarrchial storage management (HSM). In this situation, the HSM system dynamically manages the storage and covery of files, which are copied to storage media devices that vary in speed and cost. The faster media hold the data that is accessed more often and the seldom-useed files are stored on the slower devices, or near-line devices. The different storage media rang from optical disk, magnetic disks, and tapes. Pg. 619 Shon Harris CISSP All-In-One Certification Exam Guide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
When continuous availability (24 hours-a-day processing) is required, which one of the following provides a good alternative to tape backups?    
A. Disk mirroring 
B. Backup to jukebox 
C. Optical disk backup 
D. Daily archiving
A

Answer: B
Explanation: Hierarchical Storage Management (HSM). HSM provides continuous on-line backup by using optical or tape ‘jukeboxes,’ similar to WORMs. It appears as an infinite disk to the system, and can be configured to provide the closest version of an available real-time backup. This is commonly employed in very large data retrieval systems.” Pg. 71 Krutz: The CISSP Prep Guide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
Zip/Jaz drives are frequently used for the individual backups of small data sets of:
A. specific application data 
B. sacrificial application data 
C. static application data 
D. dynamic application data
A

Answer: A
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
With non-continuous backup systems, data that was entered after the last backup prior to a system crash will have to be:  
A. recreated 
B. created 
C. updated 
D. deleted
A

Answer: A
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
The alternate processing strategy in a business continuity plan can provide for required backup computing capacity through a hot site, a cold site, or    
A. A dial-up services program. 
B. An off-site storage replacement. 
C. An online backup program. 
D. A crate and ship replacement.
A

Answer:
C Explanation: What I believe is being wanted here is not the other data center backup alternatives but transaction redundancy implementation. The CISSP candidate should understand the three concepts used to create a level of fault tolerance and redundancy in transaction processing. While these processes are not used solely for disaster recovery, they are often elements of a larger disaster recovery plan. If one or more of these processes are employed, the ability of a company to get back online is greatly enhanced.
Ronald Krutz The CISSP PREP Guide (gold edition) pg 394 (they are Electronic Vaulting, Remote journaling, and Database shadowing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
The 8mm tape format is commonly used in Helical Scan tape drives, but was superseded by:  
A. Digital Linear Tape (DLT) 
B. Analog Linear Tape (ALT) 
C. Digital Signal Tape (DST) 
D. Digital Coded Tape (DCT)
A

Answer: A
Explanation: “8mm Tape. This format was commonly used in Helical Scan tape drives, but was superseded by Digital Linear Tape (DLT).” Pg 95 Krutz: CISSP Prep Guide: Gold Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
The spare drives that replace the failed drives are usually hot swappable, meaning they can be replaced on the server in which of the following scenarios?  
A. system is up and running 
B. system is quiesced but operational 
C. system is idle but operational 
D. system is up and in single-user-mode
A

Answer: A
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
Primarily run when time and tape space permits, and is used for the system archive or baselined tape sets is the: 
A. full backup method 
B. Incremental backup method 
C. differential backup method 
D. tape backup method
A

Answer: A
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
This backup method makes a complete backup of every file on the server every time it is run by:  
A. full backup method 
B. incremental backup method 
C. differential backup method 
D. tape backup method
A

Answer: A
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
A backup of all files that are new or modified since the last full backup is    
A. In incremental backup 
B. A father/son backup 
C. A differential backup 
D. A full backup
A

Answer: C
Explanation: “Incremental backup -A procedure that backs up only those files that have been modified since the previous backup of any sort. It does remove the archive attribute. Differential backup - A procedure that backs up all files that have been modified since the last full backup. It does not remove the archive attribute.” - Shon Harris All-in-one CISSP Certification Guide pg 618

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What two factors should a backup program track to ensure the serviceability of backup tape media?
A. The initial usage data of the media and the number of uses.
B. The physical characteristics and rotation cycle of the media.
C. The manufactured and model number of the tape media.
D. The frequency of usage and magnetic composition.

A

Answer: B
Explanation: The answer should be B. The physical charecteristics (what type of tape drive) and rotation cyle. (Frequency of backup cycles and retention timE.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
Which of the following virus types changes some of its characteristics as it spreads?  
A. boot sector 
B. parasitic 
C. stealth 
D. polymorphic
A

Answer: D
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which one of the following is a good defense against worms?
A. Differentiating systems along the lines exploited by the attack.
B. Placing limits on sharing, writing, and executing programs.
C. Keeping data objects small, simple, and obvious as to their intent.
D. Limiting connectivity by means of well-managed access controls.

A

Answer: B
Explanation: Take as general information regarding worms “Although the worm is not technically malicious, opening the attachment allows the file to copy itself to the user’s PC Windows folder and then send the .pif-based program to any e-mail address stored on the hard drive. Ducklin said the huge risks associated with accepting program files such as .pif, .vbs (visual basic script) or the more common .exe (executable) as attachments via e-mail outweighs the usefulness of distributing such files in this manner. “There’s no business sense for distributing programs via e-mail,” he said. To illustrate the point, Ducklin said six of the top 10 viruses reported to Sophos in April spread as Windows programs inside e-mails.” http://security.itworld.com/4340/030521stopworms/page_1.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
An active content module, which attempts to monopolize and exploits system resources is called a   
A. Macro virus 
B. Hostile applet 
C. Plug-in worm 
D. Cookie
A

Answer: B
Explanation: This applet can execute in the network browser and may contain malicious code. The types of downloadable programs are also known as mobile code. -Ronald Krutz The CISSP PREP Guide (gold edition) pg 361
“ActiveX Controls are Microsoft’s answer to Sun’s Java applets. They operate in a very similar fashion, but they are implemented using any on of a variety of languages, including Visual Basic, C, C++ and Java. There are two key distinctions between Java applets and ActiveX controls. First, ActiveX controls use proprietary Microsoft technology and, therefore, can only execute on systems running Microsoft operating systems. Second, ActiveX controls are not subject to the sandbox restrictions placed on Java applets. They have full access to the Windows operating environment and can perform a number of privileged actions. Therefore, special precautions must be taken when deciding which ActiveX controls to download and execute. Many security administrators have taken the somewhat harsh position of prohibiting the download of any ActiveX content from all but a select handful of trusted sites.” Pg. 214 Tittel: CISSP Study Guide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Macro viruses written in Visual Basic for Applications (VBA) are a major problem because
A. Floppy disks can propagate such viruses.
B. These viruses can infect many types of environments.
C. Anti-virus software is usable to remove the viral code.
D. These viruses almost exclusively affect the operating system.

A

Answer: D
Explanation: VBA is typically Windows OS base, so Unlikely many types of environments, but impact the OS (need a real reference source to justify this though).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q
What is the term used to describe a virus that can infect both program files and boot sectors?    
A. Polymorphic 
B. Multipartite 
C. Stealth 
D. Multiple encrypting
A

Answer: B
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Why are macro viruses easy to write?
A. Active contents controls can make direct system calls
B. The underlying language is simple and intuitive to apply.
C. Only a few assembler instructions are needed to do damage.
D. Office templates are fully API compliant.

A

Answer: B
Explanation: Macro Languages enable programmers to edit, delete, and copy files. Because these languages are so easy to use, many more types of macro viruses are possible. - Shon Harris All-in-one CISSP Certification Guide pg 785

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which one of the following traits allows macro viruses to spread more effectively than other types?
A. They infect macro systems as well as micro computers.
B. They attach to executable and batch applications.
C. They can be transported between different operating systems.
D. They spread in distributed systems without detection

A

Answer: C
Explanation: Macro virus is a virus written in one of these programming languages and is platform independent. They infect and replicate in templates and within documents. - Shon Harris All-in-one CISSP Certification Guide pg 784

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

In what way could Java applets pose a security threat?
A. Their transport can interrupt the secure distribution of World Wide Web pages over the Internet by removing SSL and S-HTTP
B. Java interpreters do not provide the ability to limit system access that an applet could have on a client system
C. Executables from the Internet may attempt an intentional attack when they are downloaded on a client system
D. Java does not check the bytecode at runtime or provide other safety mechanisms for program isolation from the client system.

A

Answer: C Explanation: “Java Security Java applets use a security scheme that employs a sandbox to limit the applet’s access to certain specific areas within the user’s system and protects the system from malicious or poorly written applets. The applet is supposed to run only within the sandbox. The sandbox restricts the applet’s environment by restricting access to a user’s hard drives and system resources. If the applet does not go outside the sandbox, it is considered safe.
However, as with many other things in the computing world, the bad guys have figured out how to escape their confines and restrictions. Programmers have figured out how to write applets that enable the code to access hard drives and resources that are supposed to be protected by the Java security scheme. This code can be malicious in nature and cause destruction and mayhem to the user and her system.
Java employs a sandbox in its security scheme, but if an applet can escape the confines of the sandbox, the system can be easily compromised.” Pg 726 Shon Harris: All-In-One CISSP Certification Guide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What setup should an administrator use for regularly testing the strength of user passwords?
A. A networked workstation so that the live password database can easily be accessed by the cracking program
B. A networked workstation so the password database can easily be copied locally and processed by the cracking program
C. A standalone workstation on which the password database is copied and processed by the cracking program
D. A password-cracking program is unethical; therefore it should not be used.

A

Answer: C
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q
On UNIX systems, passwords shall be kept:    
A. In any location on behalf of root. 
B. In a shadow password file. 
C. In the /etc/passwd file. 
D. In root.
A

Answer: B
Explanation: When possible, on UNIX systems, passwords shall not be kept in the /etc/passwd file, but rather in a shadow password file which can be modified only by root or a program executing on behalf of root.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q
Which of the following would constitute the best example of a password to use for access to a system by a network administrator?  
A. holiday 
B. Christmas12
C. Jenny&30 
D. TrZc&45g
A

Answer: D

Explanation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q
Which of the following is not a media viability control used to protect the viability of data storage media?  
A. clearing 
B. marking 
C. handling 
D. storage
A

Answer: A
Explanation: Handling – how it can be transported / under what controls Storage – where and how it can be stored Marking – how the media should be labeled
Reference: pg 315 Krutz: CISSP Study Guide: Gold Edition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q
Which of the following refers to the data left on the media after the media has been erased?  
A. remanence 
B. recovery 
C. sticky bits 
D. semi-hidden
A

Answer: A
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q
What is the main issue with media reuse?  
A. Degaussing 
B. Data remanence 
C. Media destruction 
D. Purging
A

Answer: B
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What should a company do first when disposing of personal computers that once were used to
store confidential data?
A. Overwrite all data on the hard disk with zeroes
B. Delete all data contained on the hard disk
C. Demagnetize the hard disk
D. Low level format the hard disk

A

Answer: C
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q
Which of the following is not a critical security aspect of Operations Controls?  
A. Controls over hardware 
B. data media used 
C. Operations using resources 
D. Environment controls
A

Answer: D
Explanation: Handling – how it can be transported / under what controls Storage – where and how it can be stored Marking – how the media should be labeled
Reference: pg 311 Krutz: CISSP Prep Guide: Gold Edition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q
What tool is being used to determine whether attackers have altered system files of executables?    
A. File Integrity Checker 
B. Vulnerability Analysis Systems 
C. Honey Pots 
D. Padded Cells
A

Answer: A
Explanation: Although File Integrity Checkers are most often used to determine whether attackers have altered system files or executables, they can also help determine whether vendor-supplied bug patches or other desired changes have been applied to system binaries. They are extremely valuable to those conducting a forensic examination of systems that have been attacked, as they allow quick and reliable diagnosis of the footprint of an attack. This enables system managers to optimize the restoration of service after incidents occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

A system file that has been patched numerous times becomes infected with a virus. The anti-virus software warns that disinfecting the file can damage it. What course of action should be taken?
A. Replace the file with the original version from master media
B. Proceed with automated disinfection
C. Research the virus to see if it is benign
D. Restore an uninfected version of the patched file from backup media

A

Answer: A
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

In an on-line transaction processing system, which of the following actions should be taken when erroneous or invalid transactions are detected?
A. The transactions should be dropped from processing B. The transactions should be processed after the program makes adjustments
C. The transactions should be written to a report and reviewed
D. The transactions should be corrected and reprocessed

A

Answer: C
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Which of the following is a reasonable response from the intrusion detection system when it detects Internet Protocol (IP) packets where the IP source address is the same as the IP destination address?
A. Allow the packet to be processed by the network and record the event.
B. Record selected information about the item and delete the packet.
C. Resolve the destination address and process the packet.
D. Translate the source address and resend the packet.

A

Answer: B
Explanation: RFC 1918 and RFC 2827 state about private addressing and ip spoofing using the same source address as destination address. Drop the packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Which of the following is not a good response to a detected intrusion?
A. Collect additional information about the suspected attack
B. Inject TCP reset packets into the attacker’s connection to the victim system
C. Reconfigure routers and firewalls to block packets from the attacker’s apparent connection
D. Launch attacks or attempt to actively gain information about the attacker’s host

A

Answer: D
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Once an intrusion into your organizations information system has been detected, which of the following actions should be performed first?
A. Eliminate all means of intruder access
B. Contain the intrusion
C. Determine to what extent systems and data are compromised
D. Communicate with relevant parties

A

Answer: B
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

After an intrusion has been contained and the compromised systems having been reinstalled, which of the following need not be reviewed before bringing the systems back to service?
A. Access control lists
B. System services and their configuration
C. Audit trails
D. User accounts

A

Answer: C
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Which of the following includes notifying the appropriate parties to take action in order to determine the extent of the severity of an incident and to remediate the incident’s effects?
A. Intrusion Evaluation (IE) and Response
B. Intrusion Recognition (IR) and Response
C. Intrusion Protection (IP) and Response
D. Intrusion Detection (ID) and Response

A

Answer: D
Explanation: “Intrusion Detection (ID) and Response is the task of monitoring systems for evidence of an intrusion or an inappropriate usage. This includes notifying the appropriate parties to take action in order to determine the extent of the severity of an incident and to remediate the incident’s effects.” Pg 86 Krutz: CISSP Prep Guide: Gold Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q
Which of the following is used to monitor network traffic or to monitor host audit logs in order to determine violations of security policy that have taken place?  
A. Intrusion Detection System 
B. Compliance Validation System 
C. Intrusion Management System 
D. Compliance Monitoring System
A

Answer: A
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Which of the following is not a technique used for monitoring?
A. Penetration testing
B. Intrusion detection
C. Violation processing (using clipping levels)
D. Countermeasures testing

A

Answer: D
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Which one of the following is NOT a characteristic of an Intrusion Detection System? (IDS)
A. Determines the source of incoming packets.
B. Detects intruders attempting unauthorized activities.
C. Recognizes and report alterations to data files.
D. Alerts to known intrusion patterns.

A

Answer: C
Explanation: Software employed to monitor and detect possible attacks and behaviors that vary from the normal and expected activity. The IDS can be network-based, which monitors network traffic, or host-based, which monitors activities of a specific system and protects system files and control mechanisms. - Shon Harris All-in-one CISSP Certification Guide pg 932

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

An IDS detects an attack using which of the following?
A. an event-based ID or a statistical anomaly-based ID B. a discrete anomaly-based ID or a signature-based ID C. a signature-based ID or a statistical anomaly-based ID
D. a signature-based ID or an event-based ID

A

Answer: C
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q
Which of the following monitors network traffic in real time?  
A. network-based IDS 
B. host-based IDS 
C. application-based IDS 
D. firewall-based IDS
A

Answer: A
Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q
What technology is being used to detect anomalies?  
A. IDS 
B. FRR 
C. Sniffing 
D. Capturing
A

Answer: A
Explanation: Intrusion Detection is a quickly evolving domain of expertise. In the past year we have seen giant steps forward in this area. We are now seeing IDS engines that will detect anomalies, and that have some built-in intelligence. It is no longer a simple game of matching signatures in your network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

IDSs verify, itemize, and characterize threats from:
A. Inside your organization’s network.
B. Outside your organization’s network.
C. Outside and inside your organization’s network.
D. The Internet.

A

Answer: C
xplanation: IDSs verify, itemize, and characterize the threat from both outside and inside your organization’s network, assisting you in making sound decisions regarding your allocation of computer security resources. Using IDSs in this manner is important, as many people mistakenly deny that anyone (outsider or insider) would be interested in breaking into their networks. Furthermore, the information that IDSs give you regarding the source and nature of attacks allows you to make decisions regarding security strategy driven by demonstrated need, not guesswork or folklore.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q
IDS can be described in terms of what fundamental functional components?
A. Response 
B. Information Sources 
C. Analysis 
D. All of the choices.
A

Answer: D
Explanation: Many IDSs can be described in terms of three fundamental functional components: Information Sources - the different sources of event information used to determine whether an intrusion has taken place. These sources can be drawn from different levels of the system, with network, host, and application monitoring most common. Analysis - the part of intrusion detection systems that actually organizes and makes sense of the events derived from the information sources, deciding when those events indicate that intrusions are occurring or have already taken place. The most common analysis approaches are misuse detection and anomaly detection. Response - the set of actions that the system takes once it detects intrusions. These are typically grouped into active and passive measures, with active measures involving some automated intervention on the part of the system, and passive measures involving reporting IDS findings to humans, who are then expected to take action based on those reports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q
What are the primary goals of intrusion detection systems? (Select all that apply.)    
A. Accountability 
B. Availability 
C. Response 
D. All of the choices
A

Answer: A,C
Explanation: Although there are many goals associated with security mechanisms in general, there are two overarching goals usually stated for intrusion detection systems. Accountability is the capability to link a given activity or event back to the party responsible for initiating it. This is essential in cases where one wishes to bring criminal charges against an attacker. The goal statement associated with accountability is: “I can deal with security attacks that occur on my systems as long as I know who did it (and where to find them.)” Accountability is difficult in TCP/IP networks, where the protocols allow attackers to forge the identity of source addresses or other source identifiers. It is also extremely difficult to enforce accountability in any system that employs weak identification and authentication mechanisms. Response is the capability to recognize a given activity or event as an attack and then taking action to block or otherwise affect its ultimate goal. The goal statement associated with response is “I don’t care who attacks my system as long as I can recognize that the attack is taking place and block it.” Note that the requirements of detection are quite different for response than for accountability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q
What is the most common way to classify IDSs?    
A. Group them by information source. 
B. Group them by network packets. 
C. Group them by attackers. 
D. Group them by signs of intrusion.
A

Answer: A
Explanation: The most common way to classify IDSs is to group them by information source. Some IDSs analyze network packets, captured from network backbones or LAN segments, to find attackers. Other IDSs analyze information sources generated by the operating system or application software for signs of intrusion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q
The majority of commercial intrusion detection systems are:    
A. Identity-based 
B. Network-based 
C. Host-based 
D. Signature-based  
Answer: B
A

Explanation: The majority of commercial intrusion detection systems are network-based. These IDSs detect attacks by capturing and analyzing network packets. Listening on a network segment or switch, one network-based IDS can monitor the network traffic affecting multiple hosts that are connected to the network segment, thereby protecting those hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Which of the following is a drawback of Network-based IDSs?
A. It cannot analyze encrypted information.
B. It is very costly to setup.
C. It is very costly to manage.
D. It is not effective.

A

Answer: A
Explanation: Network-based IDSs cannot analyze encrypted information. This problem is increasing as more organizations (and attackers) use virtual private networks. Most network-based IDSs cannot tell whether or not an attack was successful; they can only discern that an attack was initiated. This means that after a network-based IDS detects an attack, administrators must manually investigate each attacked host to determine whether it was indeed penetrated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Host-based IDSs normally utilize information from which of the following sources?
A. Operating system audit trails and system logs.
B. Operating system audit trails and network packets.
C. Network packets and system logs.
D. Operating system alarms and system logs.

A

Answer: A
Explanation: Host-based IDSs normally utilize information sources of two types, operating system audit trails, and system logs. Operating system audit trails are usually generated at the innermost (kernel) level of the operating system, and are therefore more detailed and better protected than system logs. However, system logs are much less obtuse and much smaller than audit trails, and are furthermore far easier to comprehend. Some host-based IDSs are designed to support a centralized IDS management and reporting infrastructure that can allow a single management console to track many hosts. Others generate messages in formats that are compatible with network management systems.

74
Q

When comparing host based IDS with network based ID, which of the following is an obvious advantage?
A. It is unaffected by switched networks.
B. It cannot analyze encrypted information.
C. It is not costly to setup.
D. It is not costly to manage.

A

Answer: A
Explanation: Host-based IDSs are unaffected by switched networks. When Host-based IDSs operate on OS audit trails, they can help detect Trojan horse or other attacks that involve software integrity breaches. These appear as inconsistencies in process execution.

75
Q

You are comparing host based IDS with network based ID. Which of the following will you consider as an obvious disadvantage of host based IDS?
A. It cannot analyze encrypted information.
B. It is costly to remove.
C. It is affected by switched networks.
D. It is costly to manage.

A

Answer: D
Explanation: Host-based IDSs are harder to manage, as information must be configured and managed for every host monitored. Since at least the information sources (and sometimes part of the analysis engines) for host-based IDSs reside on the host targeted by attacks, the IDS may be attacked and disabled as part of the attack. Host-based IDSs are not well suited for detecting network scans or other such surveillance that targets an entire network, because the IDS only sees those network packets received by its host. Host-based IDSs can be disabled by certain denial-of-service attacks

76
Q
Which of the following IDS inflict a higher performance cost on the monitored systems?    
A. Encryption based 
B. Host based 
C. Network based 
D. Trusted based
A

Answer: B
Explanation: Host-based IDSs use the computing resources of the hosts they are monitoring, therefore inflicting a performance cost on the monitored systems.

77
Q

Application-based IDSs normally utilize information from which of the following sources?
A. Network packets and system logs.
B. Operating system audit trails and network packets.
C. Operating system audit trails and system logs.
D. Application’s transaction log files.

A

Answer: D
Explanation: Application-based IDSs are a special subset of host-based IDSs that analyze the events transpiring within a software application. The most common information sources used by application-based IDSs are the application’s transaction log files.

78
Q
Which of the following are the major categories of IDSs response options?    
A. Active responses 
B. Passive responses 
C. Hybrid 
D. All of the choices.
A

Answer: D
Explanation: Once IDSs have obtained event information and analyzed it to find symptoms of attacks, they generate responses. Some of these responses involve reporting results and findings to a pre-specified location. Others involve more active automated responses. Though researchers are tempted to underrate the importance of good response functions in IDSs, they are actually very important. Commercial IDSs support a wide range of response options, often categorized as active responses, passive responses, or some mixture of the two.

79
Q
Alarms and notifications are generated by IDSs to inform users when attacks are detected. The most common form of alarm is:    
A. Onscreen alert 
B. Email 
C. Pager 
D. Icq
A

Answer: A
Explanation: Alarms and notifications are generated by IDSs to inform users when attacks are detected. Most commercial IDSs allow users a great deal of latitude in determining how and when alarms are generated and to whom they are displayed. The most common form of alarm is an onscreen alert or popup window. This is displayed on the IDS console or on other systems as specified by the user during the configuration of the IDS. The information provided in the alarm message varies widely, ranging from a notification that an intrusion has taken place to extremely detailed messages outlining the IP addresses of the source and target of the attack, the specific attack tool used to gain access, and the outcome of the attack. Another set of options that are of utility to large or distributed organizations are those involving remote notification of alarms or alerts. These allow organizations to configure the IDS so that it sends alerts to cellular phones and pagers carried by incident response teams or system security personnel

80
Q
Which of the following is a valid tool that complements IDSs?    
A. All of the choices.
B. Padded Cells 
C. Vulnerability Analysis Systems 
D. Honey Pots
A

Answer: A
Explanation: Several tools exist that complement IDSs and are often labeled as intrusion detection products by vendors since they perform similar functions. They are Vulnerability Analysis Systems, File Integrity Checkers, Honey Pots, and Padded Cells.
“IDS-Related Tools Intrusion detection systems are often deployed in concert with several other components. These IDS-related tools expand the usefulness and capabilities of IDSs and make IDSs more efficient and less prone to false positives. These tools include honey pots, padded cells, and vulenerability scanners.” Pg. 46 Tittel: CISSP Study Guide

81
Q
A problem with a network-based ID system is that it will not detect attacks against a host made by an intruder who is logged in at which of the following?  
A. host’s terminal 
B. guest’s terminal 
C. client’s terminal 
D. server’s terminal
A

Answer: A
Explanation:

82
Q
When the IDS detect attackers, the attackers are seamlessly transferred to a special host. This method is called:    
A. Vulnerability Analysis Systems 
B. Padded Cell 
C. Honey Pot 
D. File Integrity Checker
A

Answer: B
Explanation: Padded cells take a different approach. Instead of trying to attract attackers with tempting data, a padded cell operates in tandem with traditional IDS. When the IDS detect attackers, it seamlessly transfers then to a special padded cell host.

83
Q
Which of the following is a weakness of both statistical anomaly detection and pattern matching?    
A. Lack of ability to scale. 
B. Lack of learning model. 
C. Inability to run in real time. 
D. Requirement to monitor every event.
A

Answer: B
Explanation: Disadvantages of Knowledge-based ID systems: This system is resources-intensive; the knowledge database continually needs maintenance and updates New, unique, or original attacks often go unnoticed.Disadvantages of Behavior-based ID systems: The system is characterized by high false alarm rates. High positives are the most common failure of ID systems and can create data noise that makes the system unusable. The activity and behavior of the users while in the networked system might not be static enough to effectively implement a behavior-based ID system. -Ronald Krutz The CISSP PREP Guide (gold edition) pg 88

84
Q

The two most common implementations of Intrusion Detection are which of the following?
A. They commonly reside on a discrete network segment and monitor the traffic on that network segment
B. They commonly will not reside on a discrete network segment and monitor the traffic on that network segment
C. They commonly reside on a discrete network segment but do not monitor the traffic on that network segment
D. They commonly do not reside on a discrete network segment and monitor the traffic on that network segment

A

Answer: A
Explanation:

85
Q

What are the primary approaches IDS takes to analyze events to detect attacks?
A. Misuse detection and anomaly detection.
B. Log detection and anomaly detection.
C. Misuse detection and early drop detection.
D. Scan detection and anomaly detection.

A

Answer: A
Explanation: There are two primary approaches to analyzing events to detect attacks: misuse detection and anomaly detection. Misuse detection, in which the analysis targets something known to be “bad”, is the technique used by most commercial systems. Anomaly detection, in which the analysis looks for abnormal patterns of activity, has been, and continues to be, the subject of a great deal of research. Anomaly detection is used in limited form by a number of IDSs. There are strengths and weaknesses associated with each approach, and it appears that the most effective IDSs use mostly misuse detection methods with a smattering of anomaly detection components.

86
Q
Misuse detectors analyze system activity and identify patterns. The patterns corresponding to know attacks are called:    
A. Attachments 
B. Signatures 
C. Strings 
D. Identifications
A

Answer: B
Explanation: Misuse detectors analyze system activity, looking for events or sets of events that match a predefined pattern of events that describe a known attack. As the patterns corresponding to known attacks are called signatures, misuse detection is sometimes called “signature-based detection.” The most common form of misuse detection used in commercial products specifies each pattern of events corresponding to an attack as a separate signature. However, there are more sophisticated approaches to doing misuse detection (called “state-based” analysis techniques) that can leverage a single signature to detect groups of attacks.

87
Q

Which of the following is an obvious disadvantage of deploying misuse detectors?
A. They are costly to setup.
B. They are not accurate.
C. They must be constantly updated with signatures of new attacks.
D. They are costly to use.

A

Answer: C
Explanation: Misuse detectors can only detect those attacks they know about - therefore they must be constantly updated with signatures of new attacks. Many misuse detectors are designed to use tightly defined signatures that prevent them from detecting variants of common attacks. Statebased misuse detectors can overcome this limitation, but are not commonly used in commercial IDSs.

88
Q
What detectors identify abnormal unusual behavior on a host or network?
A. None of the choices. 
B. Legitimate detectors. 
C. Anomaly detectors. 
D. Normal detectors.
A

Answer: C
Explanation: Anomaly detectors identify abnormal unusual behavior (anomalies) on a host or network. They function on the assumption that attacks are different from “normal” (legitimate) activity and can therefore be detected by systems that identify these differences. Anomaly detectors construct profiles representing normal behavior of users, hosts, or network connections. These profiles are constructed from historical data collected over a period of normal operation. The detectors then collect event data and use a variety of measures to determine when monitored activity deviates from the norm.

89
Q
A network-based IDS is which of the following?  
A. active while it acquires data 
B. passive while it acquires data 
C. finite while it acquires data 
D. infinite while it acquires data
A

Answer: B
Explanation:

90
Q
Which of the following usually provides reliable, real-time information without consuming network or host resources?  
A. network-based IDS 
B. host-based IDS 
C. application-based IDS 
D. firewall-based IDS
A

Answer: A Explanation: “A network-based IDS has little negative affect on overall network performance, and because it is deployed on a single-purpose system, it doesn’t adversely affect the performance of any other computer.” Pg 34 Krutz: CISSP Prep Guide: Gold Edition.

91
Q
Which of the following would assist in intrusion detection?  
A. audit trails 
B. access control lists 
C. security clearances 
D. host-based authentication
A

Answer: A
Explanation:

92
Q

Using clipping levels refers to:
A. setting allowable thresholds on reported activity
B. limiting access to top management staff
C. setting personnel authority limits based on need-to-know basis
D. encryption of data so that it cannot be stolen

A

Answer: A
Explanation:

93
Q

In what way can violation clipping levels assist in violation tracking and analysis?
A. Clipping levels set a baseline for normal user errors, and violations exceeding that threshold will be recorded for analysis of why the violations occurred
B. Clipping levels enable a security administrator to customize the audit trail to record only those violations which are deemed to be security relevant
C. Clipping levels enable the security administrator to customize the audit trail to record only actions for users with access to user codes with a privileged status
D. Clipping levels enable a security administrator to view all reductions in security levels which have been made to user codes which have incurred violations

A

Answer: A
Explanation:

94
Q
When establishing a violation tracking and analysis process, which one of the following parameters is used to keep the quantity of data to manageable levels?    
A. Quantity baseline 
B. Maximum log size 
C. Circular logging 
D. Clipping levels
A

Answer: D
Explanation: To make violation tracking effective, clipping levels must be established. A clipping level is a baseline of user activity that is considered a routine level of user errors. When a clipping level is exceeded, a violation record is then produced. Clipping levels are also used for variance detection. -Ronald Krutz The CISSP PREP Guide (gold edition) pg 318

95
Q
Audit trails based upon access and identification codes establish…    
A. intrusion detection thresholds 
B. individual accountability 
C. audit review criteria 
D. individual authentication
A

Answer: B
Explanation: Accountability is another facet of access control. Individuals on a system are responsible for their actions. This accountability property enables system activities to be traced to the proper individuals. Accountability is supported by audit trails that record events on the system and on the network. Audit trails can be used for intrusion detection and for the reconstruction of past events. -Ronald Krutz The CISSP PREP Guide (gold edition) pg 65

96
Q

The primary reason for enabling software audit trails is which of the following?
A. Improve system efficiency
B. Improve response time for users
C. Establish responsibility and accountability
D. Provide useful information to track down processing errors

A

Answer: C
Explanation: “Auditing capabilities ensure that users are accountable for their actions, verify that the security polices are enforced, and are used as investigation tools.” Pg 161 Shon Harris: All-inOne CISSP Certification

97
Q
Tracing violations, or attempted violations of system security to the user responsible is a function of?    
A. authentication 
B. access management 
C. integrity checking 
D. accountability
A

Answer: D
Explanation: Auditing capabilities ensure that users are accountable for their actions, verify that the security policies are enforced, worked as a deterrent to improper actions, and are used as investigation tools. - Shon Harris All-in-one CISSP Certification Guide pg 182

98
Q

According to the Minimum Security Requirements (MSR) for Multi-User Operating Systems (NISTIR 5153) document, which of the following statements pertaining to audit data recording is incorrect?
A. The system shall provide end-to-end user accountability for all security-relevant events
B. The system shall protect the security audit trail from unauthorized access
C. For maintenance purposes, it shall be possible to disable the recording of activities that require privileges.
D. The system should support an option to maintain the security audit trail data in encrypted format

A

Answer: C
Explanation:

99
Q

Which of the following questions is less likely to help in assessing controls over audit trails?
A. Does the audit trail provide a trace of user actions?
B. Are incidents monitored and tracked until resolved?
C. Is access to online logs strictly controlled?
D. Is there separation of duties between security personnel who administer the access control function and those who administer the audit trail?

A

Answer: B
Explanation:

100
Q
You should keep audit trail on which of the following items?
A. Password usage. 
B. All unsuccessful logon. 
C. All of the choices. 
D. All successful logon.
A

Answer: C
Explanation: Keep audit trail of password usage; log all Successful logon, Unsuccessful logon, Date, Time, ID, Login name. Control maximum logon attempt rate where possible.Where possible users must be automatically logged off after 30 minutes of inactivity.

101
Q

In addition to providing an audit trail required by auditors, logging can be used to
A. provide backout and recovery information
B. prevent security violations
C. provide system performance statistics
D. identify fields changed on master files.

A

Answer: B
Explanation: Auditing tools are technical controls that track activity within a network on a network device or on a specific computer. Even though auditing is not an activity that will deny an entity access to a network or computer, it will track activities so a network administrator can understand the types of access that took place, identify a security breach, or warn the administrator of suspicious activity. This can be used to point out weakness of their technical controls and help administrators understand where changes need to be made to preserve the necessary security level within the environment. . - Shon Harris All-in-one CISSP Certification Guide pg 179-180

102
Q
Which of the following should NOT be logged for performance problems?    
A. CPU load. 
B. Percentage of use. 
C. Percentage of idle time. 
D. None of the choices.
A

Answer: D
Explanation: The level of logging will be according to your company requirements. Below is a list of items that could be logged, please note that some of the items may not be applicable to all operating systems. What is being logged depends on whether you are looking for performance problems or security problems. However you have to be careful about performance problems that could affect your security.

103
Q
Which of the following should be logged for security problems?    
A. Use of mount command. 
B. Percentage of idle time. 
C. Percentage of use. 
D. None of the choices.
A

Answer: A
Explanation: The level of logging will be according to your company requirements. Below is a list of items that could be logged, please note that some of the items may not be applicable to all operating systems. What is being logged depends on whether you are looking for performance problems or security problems. However you have to be careful about performance problems that could affect your security.

104
Q
Which of the following services should be logged for security purpose? 
A. bootp 
B. All of the choices. 
C. sunrpc 
D. tftp
A

Answer: B
Explanation: Request for the following services should be logged: systat, bootp, tftp, sunrpc, snmp, snmp-trap, nfs.

105
Q
The auditing method that assesses the extent of the system testing, and identifies specific program logic that has not been tested is called    
A. Decision process analysis 
B. Mapping 
C. Parallel simulation 
D. Test data method
A

Answer: D
Explanation: “Testing of software modules or unit testing should be addressed when the modules are being designed. Personnel separate from the programmers should conduct this testing. The test data is part of the specifications. Testing should not only check the modules using normal and valid input data, but it should also check for incorrect types, out-of-range values, and other bounds and/or conditions. Live or actual field data is not recommended for use in the testing procedures because both data types might not cover out-of-range situations and the correct outputs of the test are unknown. Special test suites of data that exercise all paths of the software to the fullest extent possible and whose corrected resulting outputs are known beforehand should be used.” Pg. 345 Krutz: The CISSP Prep Guide: Gold Edition.

106
Q
Who should NOT have access to the log files?
A. Security staff. 
B. Internal audit staff. 
C. System administration staff. 
D. Manager’s secretary.
A

Answer: D
Explanation: Logs must be secured to prevent modification, deletion, and destruction. Only authorized persons should have access or permission to read logs. A person is authorized if he or she is a member of the internal audit staff, security staff, system administration staff, or he or she has a need for such access to perform regular duties.

107
Q

Which of the following correctly describe the use of the collected logs?
A. They are used in the passive monitoring process only.
B. They are used in the active monitoring process only.
C. They are used in the active and passive monitoring process.
D. They are used in the archiving process only.

A

Answer: C
Explanation: All logs collected are used in the active and passive monitoring process. All logs are kept on archive for a period of time. This period of time will be determined by your company policies. This allows the use of logs for regular and annual audits if retention is longer then a year. Logs must be secured to prevent modification, deletion, and destruction.

108
Q
All logs are kept on archive for a period of time. What determines this period of time? 
A. Administrator preferences. 
B. MTTR 
C. Retention polices 
D. MTTF
A

Answer: C
Explanation: All logs collected are used in the active and passive monitoring process. All logs are kept on archive for a period of time. This period of time will be determined by your company policies. This allows the use of logs for regular and annual audits if retention is longer then a year. Logs must be secured to prevent modification, deletion, and destruction.

109
Q

Logs must be secured to prevent:
A. Creation, modification, and destruction.
B. Modification, deletion, and initialization.
C. Modification, deletion, and destruction.
D. Modification, deletion, and inspection.

A

Answer: C
Explanation: All logs collected are used in the active and passive monitoring process. All logs are kept on archive for a period of time. This period of time will be determined by your company policies. This allows the use of logs for regular and annual audits if retention is longer then a year. Logs must be secured to prevent modification, deletion, and destruction.

110
Q
To ensure dependable and secure logging, all computers must have their clock synchronized to: 
A. A central timeserver. 
B. The log time stamp. 
C. The respective local times. 
D. None of the choices.
A

Answer: A
Explanation: The following pre-requisite must be met to ensure dependable and secure logging: All computers must have their clock synchronized to a central timeserver to ensure accurate time on events being logged. If possible all logs should be centralized for easy analysis and also to help detect patterns of abuse across servers. Logging information traveling on the network must be encrypted if possible. Log files are stored and protected on a machine that has a hardened shell. Log files must not be modifiable without a trace or record of such modification.

111
Q
To ensure dependable and secure logging, logging information traveling on the network should be:    
A. Stored 
B. Encrypted 
C. Isolated 
D. Monitored
A

Answer: B
Explanation: The following pre-requisite must be met to ensure dependable and secure logging: All computers must have their clock synchronized to a central timeserver to ensure accurate time on events being logged. If possible all logs should be centralized for easy analysis and also to help detect patterns of abuse across servers. Logging information traveling on the network must be encrypted if possible. Log files are stored and protected on a machine that has a hardened shell. Log files must not be modifiable without a trace or record of such modification.

112
Q
The activity that consists of collecting information that will be used for monitoring is called:    
A. Logging 
B. Troubleshooting 
C. Auditing 
D. Inspecting
A

Answer: A
Explanation: Logging is the activity that consists of collecting information that will be used for monitoring and auditing. Detailed logs combined with active monitoring allow detection of security issues before they negatively affect your systems.

113
Q
How often should logging be run?    
A. Once every week. 
B. Always 
C. Once a day. 
D. During maintenance.
A

Answer: B
Explanation: Usually logging is done 24 hours per day, 7 days per week, on all available systems and services except during the maintenance window where some of the systems and services may not be available while maintenance is being performed.

114
Q

Which of the following are security events on Unix that should be logged?
A. All of the choices.
B. Use of Setgid.
C. Change of permissions on system files.
D. Use of Setuid.

A
Answer: A 
Explanation:  The following file changes, conditions, and events are logged: 
rhosts. 
UNIX Kernel. 
/etc/password. 
rc directory structure. 
bin files. 
lib files. 
Use of Setuid. 
Use of Setgid. 
Change of permission on system or critical files.
115
Q
Which of the following are potential firewall problems that should be logged?    
A. Reboot 
B. All of the choices. 
C. Proxies restarted. 
D. Changes to configuration file.
A

Answer: B
Explanation: The following firewall configuration problem are logged: Reboot of the firewall. Proxies that cannot start (e.g. Within TIS firewall).
Proxies or other important services that have died or restarted. Changes to firewall configuration file. A configuration or system error while firewall is running.

116
Q
Which of the following is required in order to provide accountability?  
A. Authentication 
B. Integrity 
C. Confidentiality 
D. Audit trails
A

Answer: A
Reference: pg 5 Tittel: CISSP Study Guide

117
Q
The principle of accountability is a principle by which specific action can be traced back to:    
A. A policy 
B. An individual 
C. A group 
D. A manager
A

Answer: B
Explanation: The principle of accountability has been described in many references; it is a principle by which specific action can be traced back to an individual. As mentioned by Idrach, any significant action should be traceable to a specific user. The definition of “Significant” is entirely dependant on your business circumstances and risk management model. It was also mentioned by Rino that tracing the actions of a specific user is fine but we must also be able to ascertain that this specific user was responsible for the uninitiated action.

118
Q
The principle of \_\_\_\_\_\_\_\_\_ is a principle by which specific action can be traced back to anyone of your users.    
A. Security 
B. Integrity 
C. Accountability 
D. Policy
A

Answer: C
Explanation: The principle of accountability has been described in many references; it is a principle by which specific action can be traced back to an individual. As mentioned by Idrach, any significant action should be traceable to a specific user. The definition of “Significant” is entirely dependent on your business circumstances and risk management model. It was also mentioned by Rino that tracing the actions of a specific user is fine but we must also be able to ascertain that this specific user was responsible for the uninitiated action.

119
Q
According to the principle of accountability, what action should be traceable to a specific user?    
A. Material 
B. Intangible 
C. Tangible 
D. Significant
A

Answer: D
Explanation:
The principle of accountability has been described in many references; it is a principle by which specific action can be traced back to an individual. As mentioned by Idrach, any significant action should be traceable to a specific user. The definition of “Significant” is entirely dependent on your business circumstances and risk management model. It was also mentioned by Rino that tracing the actions of a specific user is fine but we must also be able to ascertain that this specific user was responsible for the uninitiated action.

120
Q
Which of the following best ensures accountability of users for actions taken within a system or domain?  
A. Identification 
B. Authentication 
C. Authorization 
D. Credentials  
Answer: A
A

Explanation: “Identification is the process by which a subject professes an identify and accountability is initiated.” Pg 149 Tittel: CISSP Study Guide
“Identification and authentication are the keystones of most access control systems. Identification is the act of a user professing an identify to a system, usually in the form of a log-on ID to the system. Identification establishes user accountability for the actions on the system. Authentication is verification that the user’s claimed identity is valid and is usually implemented through a user password at log-on time.” Pg 36 Krutz: The CISSP Prep Guide

121
Q
Individual accountability does not include which of the following?  
A. unique identifiers 
B. policies & procedures 
C. access rules 
D. audit trails
A

Answer: B
Explanation:

122
Q

Controls provide accountability for individuals who are accessing sensitive information. This accountability is accomplished:
A. through access control mechanisms that require identification and authentication and through the audit function.
B. through logical or technical controls involving the restriction of access to systems and the protection of information
C. through logical or technical controls but not involving the restriction of access to systems and the protection of information.
D. through access control mechanisms that do not require identification and authentication and do not operate through the audit function.

A

Answer: A
Explanation:

123
Q
What types of computer attacks are most commonly reported by IDSs?    
A. System penetration 
B. Denial of service 
C. System scanning 
D. All of the choices
A

Answer: D
Explanation: Three types of computer attacks are most commonly reported by IDSs: system scanning, denial of service (DOS), and system penetration. These attacks can be launched locally, on the attacked machine, or remotely, using a network to access the target. An IDS operator must understand the differences between these types of attacks, as each

124
Q
Operation security requires the implementation of physical security to control which of the following?  
A. unauthorized personnel access 
B. incoming hardware 
C. contingency conditions 
D. evacuation procedures
A

Answer: A
Explanation:

125
Q
Configuration Management is a requirement for the following level(s)?  
A. B3 and A1 
B. B1, B2 and B3 
C. A1 
D. B2, B3, and A1
A

Answer: D
Reference: pg 306 Krutz: CISSP Study Guide: Gold Edition

126
Q

Which of the following is not concerned with configuration management?
A. Hardware
B. Software
C. Documentation
D. They all are concerned with configuration management

A

Answer: D
Explanation:

127
Q

Configuration Management controls what?
A. Auditing of changes to the Trusted Computing Base
B. Control of changes to the Trusted Computing Base
C. Changes in the configuration access to the Trusted Computing Base
D. Auditing and controlling any changes to the Trusted Computing Base

A

Answer: D
Explanation: “Official Definition of Configuration Management
Identifying, controlling, accounting for and auditing changes made to the baseline TCB, which includes changes to hardware, software, and firmware.
A System that will control changes and test documentation through the operational life cycle of a system.” Pg 698 Shon Harris: All-in-One CISSP Certification edministrator role is clearly defined, and the system must be able to recover from failures without its security level being compromised.” Pg. 226 Shon Harris CISSP All-In-One Exam Guide

128
Q

In addition to ensuring that changes to the computer system take place in an identifiable and controlled environment, configuration management provides assurance that future changes:
A. The application software cannot bypass system security features.
B. Do not adversely affect implementation of the security policy.
C. The operating system is always subjected to independent validation and verification.
D. In technical documentation maintain an accurate description of the Trusted Computer Base.

A

Answer: B
Explanation: “The primary security goal of configuration management is to ensure that changes to the system do not unintentionally diminish security.” Pg 306 Krutz: CISSP Prep Guide: Gold Edition.

129
Q

Which set of principal tasks constitutes configuration management?
A. Program management, system engineering, and quality assurance.
B. Requirements verification, design, and system integration and testing.
C. Independent validation and verification of the initial and subsequent baseline.
D. Identification, control, status accounting, and auditing of changes.

A

Answer: D
Explanation: Configuration management is the process of tracking and approving changes to a system. It involves identifying, controlling, and auditing all changes made to the system.
Pg. 223 Krutz: The CISSP Prep Guide

130
Q

If the computer system being used contains confidential information, users must not:
A. Leave their computer without first logging off.
B. Share their desks.
C. Encrypt their passwords.
D. Communicate

A

Answer: A
Explanation: If the computer system being used or to which a user is connected contains sensitive or confidential information, users must not leave their computer, terminal, or workstation without first logging off. Users should be reminded frequently to follow this rule.

131
Q
Separation of duties is valuable in deterring:    
A. DoS 
B. external intruder 
C. fraud 
D. Trojan house
A

Answer: C
Explanation: Separation of duties is considered valuable in deterring fraud since fraud can occur if an opportunity exists for collaboration between various jobs related capabilities. Separation of duty requires that for particular sets of transactions, no single individual be allowed to execute all transactions within the set. The most commonly used examples are the separate transactions needed to initiate a payment and to authorize a payment. No single individual should be capable of executing both transactions.

132
Q
What principle requires that for particular sets of transactions, no single individual be allowed to execute all transactions within the set?    
A. Use of rights 
B. Balance of power 
C. Separation of duties 
D. Fair use
A

Answer: C
Explanation: Separation of duties is considered valuable in deterring fraud since fraud can occur if an opportunity exists for collaboration between various jobs related capabilities. Separation of duty requires that for particular sets of transactions, no single individual be allowed to execute all transactions within the set. The most commonly used examples are the separate transactions needed to initiate a payment and to authorize a payment. No single individual should be capable of executing both transactions.

133
Q
Separation of duty can be:    
A. Dynamic only 
B. Encrypted 
C. Static only 
D. Static or dynamic
A

Answer: D
Explanation: Separation of duty can be either static or dynamic. Compliance with static separation requirements can be determined simply by the assignment of individuals to roles and allocation of transactions to roles. The more difficult case is dynamic separation of duty where compliance with requirements can only be determined during system operation. The objective behind dynamic separation of duty is to allow more flexibility in operations.

134
Q

What is the company benefit, in terms of risk, for people taking a vacation of a specified minimum length?
A. Reduces stress levels, thereby lowering insurance claims.
B. Improves morale, thereby decreasing errors.
C. Increases potential for discovering frauds.
D. Reduces dependence on critical individuals.

A

Answer: C
Explanation: Mandatory vacations are another type of administrative control that may sound a bit odd at first. Chapter 3 touches on reasons to make sure that employees take their vacations; this has to do with being able to identify fraudulent activities and enable job rotation to take place. Shon Harris All-in-one CISSP Certification Guide pg 810

135
Q

Which of the following would be less likely to prevent an employee from reporting an incident?
A. They are afraid of being pulled into something they don’t want to be involved with
B. The process of reporting incidents is centralized
C. They are afraid of being accused of something they didn’t do
D. They are unaware of the company’s security policies and procedures

A

Answer: B
Explanation: Reasons why a user won’t report an incident (page 882 of Shon Harris 5th edition) - Afraid of being pulled into something - afraid of being accused Logically, they may be unaware of the procedure No reason that reporting incidents to a centralized location would be a problem so that leaves that as the answer.

136
Q

Employee involuntary termination processing should include
A. A list of all passwords used by the individual.
B. A report on outstanding projects.
C. The surrender of any company identification.
D. Signing a non-disclosure agreement.

A

Answer: C
Explanation: “Before the employee is released, all organization-specific identification, access, or security badges as well as cards, keys, and access tokens should be collected.”
Pg. 173 Tittel: CISSP Study Guide

137
Q
Which trusted facility management concept implies that two operators must review and approve the work of each other?  
A. Two-man control 
B. Dual control 
C. Double control 
D. Segregation control
A

Answer: A
Explanation: “In the concept of two-man control, two operators review and approve the work of each other. The purpose of two-man control is to provide accountability and to minimize fraud in highly sensitive or high-risk transactions. The concept of dual control means that both operators are needed to complete a sensitive task.” Pg. 303 Krutz: The CISSP Prep Guide: Gold Edition.

138
Q
When two operators review and approve the work of each other, this is known as?  
A. Dual control 
B. Two-man control 
C. Two-fold control 
D. Twin control
A

Answer: B
Explanation:

139
Q

What security procedure forces an operator into collusion with an operator of a different category to have access to unauthorized data?
. Enforcing regular password changes
B. Management monitoring of audit logs
C. Limiting the specific accesses of operations personnel
D. Job rotation of people through different assignments

A

Answer: C
Explanation:

140
Q

Which of the following user items can be shared?
A. Password
B. Home directory
C. None of the choices.

A

Answer: C
Explanation: Each user assigned directory (home directory) is not to be shared with others. None of the choices is correct.

141
Q

What should you do to the user accounts as soon as employment is terminated?
A. Disable the user accounts and erase immediately the data kept.
B. Disable the user accounts and have the data kept for a specific period of time.
C. None of the choices.
D. Maintain the user accounts and have the data kept for a specific period of time.

A

Answer: B
Explanation: A record of user logins with time and date stamps must be kept. User accounts shall be disabled and data kept for a specified period of time as soon as employment is terminated. All users must log on to gain network access.

142
Q

What is the main objective of proper separation of duties?
A. To prevent employees from disclosing sensitive information
B. To ensure access controls are in place
C. To ensure that no single individual can compromise a system
D. To ensure that audit trails are not tampered with

A

Answer: C
Explanation: “Separation of duties (also called segregation of duties) assigns parts of tasks to different personnel. Thus if no single person has total control of the system’s security mechanisms, the theory is that no single person can completely compromise the system.”
Pg. 303 Krutz: The CISSP Prep Guide: Gold Edition

143
Q

What are the benefits of job rotation?
A. All of the choices.
B. Trained backup in case of emergencies.
C. Protect against fraud.
D. Cross training to employees.

A

Answer: A
Explanation: Job assignments should be changed periodically so that it is more difficult for users to collaborate to exercise complete control of a transaction and subvert it for fraudulent purposes. This principle is effective when used in conjunction with a separation of duties. Problems in effectively rotating duties usually appear in organizations with limited staff resources and inadequate training programs. Rotation of duties will protect you against fraud; provide cross training to your employees, as well as assuring trained backup in case of emergencies.

144
Q
Which of the following control pairing include organizational policies and procedures, preemployment background checks, strict hiring practices, employment agreements, friendly and unfriendly employee termination procedures, vacation scheduling, labeling of sensitive materials, increased supervision, security awareness training, behavior awareness, and sign-up procedures to obtain access to information systems and networks in?  
A. Preventive/Administrative Pairing 
B. Preventive/Technical Pairing 
C. Preventive/Physical Pairing 
D. Detective/Administrative Pairing
A

Answer: A
Explanation:

145
Q

Which of the following are functions that are compatible in a properly segregated environment?
A. Application programming and computer operation
B. Systems programming and job control analysis
C. Access authorization and database administration
D. Systems development and systems maintenance

A

Answer: D
Explanation:

146
Q

Which of the following are functions that are compatible in a properly segregated environment?
A. Security administration and quality assurance
B. Security administration and data entry
C. Security administration and application programming
D. Application programming and data entry

A

Answer: A
Explanation: Security Administration and Quality Assurance are the most similar tasks.
Administrative Management: Administrative management is a very important piece of operational security. One aspect of administrative management is dealing with personnel issues. This includes separation of duties and job rotation. The objective of separation of duties is to ensure that one person acting alone cannot compromise the company’s security in any way. High-risk activities should be broken up into different parts and distributed to different individuals. This way the company does not need to put a dangerously high level of trust on certain individuals and if fraud were to take place, collusion would need to be committed, meaning more than one person would have to be involved in the fraudulent activity.
Separation of duties also helps to prevent many different types of mistakes that can take place if one person is performing a task from the beginning to the end. For instance, a programmer should not be the one to test her own code. A different person with a different job and agenda should perform functionality and integrity testing on the programmer’s code because the programmer may have a focused view of what the program is supposed to accomplish and only test certain functions, input values, and in certain environments.
Another example of separation of duties is the difference between the functions of a computer operator versus the functions of a system administrator. There must be clear cut lines drawn between system administrator duties and computer operator duties. This will vary from environment to environment and will depend on the level of security required within the environment. The system administrators usually have responsibility of performing backups and recovery procedures, setting permissions, adding and removing users, setting user clearance, and developing user profiles. The computer operator on the other hand, may be allowed to install
ISC CISSP Exam
“Pass Any Exam. Any Time.” - www.actualtests.com 294
software, set an initial password, alter desktop configurations, and modify certain system parameters. The computer operator should not be able to modify her own security profile, add and remove users globally, or set user security clearance. This would breach the concept of separation of duties.
Pg 808-809 Shon Harris: All-In-One CISSP Certification

147
Q

Which of the following are functions that are compatible in a properly segregated environment?
A. Data entry and job scheduling
B. Database administration and systems security
C. Systems analyst and application programming
D. Security administration and systems programming

A

Answer: A
Explanation: The two most similar jobs are Data Entry and Job Scheduling, so they need not be segregated.
Administrative Management: Administrative management is a very important piece of operational security. One aspect of administrative management is dealing with personnel issues. This includes separation of duties and job rotation. The objective of separation of duties is to ensure that one person acting alone cannot compromise the company’s security in any way. Highrisk activities should be broken up into different parts and distributed to different individuals. This way the company does not need to put a dangerously high level of trust on certain individuals and if fraud were to take place, collusion would need to be committed, meaning more than one person would have to be involved in the fraudulent activity.
Separation of duties also helps to prevent many different types of mistakes that can take place if one person is performing a task from the beginning to the end. For instance, a programmer should not be the one to test her own code. A different person with a different job and agenda should perform functionality and integrity testing on the programmer’s code because the programmer may have a focused view of what the program is supposed to accomplish and only test certain functions, input values, and in certain environments.
Another example of separation of duties is the difference between the functions of a computer operator versus the functions of a system administrator. There must be clear cut lines drawn between system administrator duties and computer operator duties. This will vary from environment to environment and will depend on the level of security required within the environment. The system administrators usually have responsibility of performing backups and recovery procedures, setting permissions, adding and removing users, setting user clearance, and developing user profiles. The computer operator on the other hand, may be allowed to install software, set an initial password, alter desktop configurations, and modify certain system parameters. The computer operator should not be able to modify her own security profile, add and remove users globally, or set user security clearance. This would breach the concept of separation of duties.
Pg 808-809 Shon Harris: All-In-One CISSP Certification Exam Guide

148
Q

Which of the following are functions that are compatible in a properly segregated environment?
A. Application programming and computer operation
B. Systems programming and job control analysis
C. Access authorization and database administration
D. System development and systems maintenance

A

Answer: D
Explanation: If you think about it, System development and system maintenance are perfectly compatible, you can develop in the systems for certain time, and when it time for a maintenance, you stop the development process an make the maintenance. It’s a pretty straight forward process. The other answer do not provide the simplicity and freedom of this option.
Incorrect answer: Access authorization and database administration are NEVER compatible.

149
Q

Controls are implemented to:
A. eliminate risk and reduce potential for loss
B. mitigate risk and eliminate the potential for loss
C. mitigate risk and reduce the potential for loss
D. eliminate risk and eliminate the potential for loss

A

Answer: C
Explanation:

150
Q
A timely review of system access audit records would be an example of which of the basic security functions?  
A. avoidance 
B. deterrence 
C. prevention 
D. detection
A

Answer: D
Explanation:

151
Q
A security control should    
A. Allow for many exceptions. 
B. Cover all contingencies. 
C. Not rely on the security of its mechanism. 
D. Change frequently.
A

Answer: C
Explanation:

152
Q

What set of principles is the basis for information systems controls?
A. Authentication, audit trails, and awareness briefings
B. Individual accountability, auditing, and separation of duties
C. Need to know, identification, and authenticity
D. Audit trails, limited tenure, and awareness briefings

A

Answer: C
Explanation: “In addition to the CIA Triad, there is a plethora of other security-related concepts, principles, and tenants that should be considered and addressed when designing a security policy and deploying a security solution. This section discusses privacy, identification, authentication, authorization, accountability, nonrepudiation, and auditing.” Pg. 133 Tittel: CISSP Study Guide

153
Q
An audit trail is a category of what control?    
A. System, Manual 
B. Detective, Technical 
C. User, Technical 
D. Detective, Manual
A

Answer: B
Explanation: Detective Technical Controls warn of technical Access Control violations. Under this category you would find the following: Audit trails Violation reports Intrusion detection system Honeypot

154
Q
An IDS is a category of what control?   
A. Detective, Manual 
B. Detective, Technical 
C. User, Technical 
D. System, Manual
A

Answer: B
Explanation: Detective Technical Controls warn of technical Access Control violations. Under this category you would find the following: Audit trails Violation reports Intrusion detection system Honeypot

155
Q
Technical controls such as encryption and access control can be built into the operating system, be software applications, or can be supplemental hardware/software units. Such controls, also known as logical controls, represent which pairing?  
A. Preventive/Administrative Pairing 
B. Preventive/Technical Pairing 
C. Preventive/Physical Pairing 
D. Detective/Technical Pairing
A

Answer: B
Explanation:

156
Q

Which one of the following can be identified when exceptions occur using operations security detective controls?
A. Unauthorized people seeing confidential reports.
B. Unauthorized people destroying confidential reports.
C. Authorized operations people performing unauthorized functions.
D. Authorized operations people not responding to important console messages.

A

Answer: C
Explanation: C is the one that makes the most sense. [Operation Security] Detective Controls are used to detect an error once it has occurred. Unlike preventative controls, these controls operate after the fact and can be used to track an unauthorized transaction for prosecution, or to lessen an error’s impact on the system by identifying it quickly. An example of this type of control is an audit trail. -Ronald Krutz The CISSP PREP Guide (gold edition) pg 299

157
Q
Which of the following is not an example of an operation control?  
A. backup and recovery 
B. audit trails 
C. contingency planning 
D. operations procedures
A

Answer: C
Explanation: “Operation controls are the mechanisms and daily procedures that provide protection for systems.”
When designing a protection scheme for resources, it is important to keep the following aspects or elements of the IT infrastructure in mind: Communication hardware/software Boundary devices Processing equipment Password files Application program libraries Application source code Vendor software Operating System System Utilities Directories and address tables Proprietary packages Main storage
Removable storage Sensitive/critical data System logs/audit trails Violation reports Backup files and media Sensitive forms and printouts Isolated devices, such as printers and faxes Telephone network”
Pg 406-407 Tittel: CISSP Study Guide

158
Q
Which of the following is not an example of an operational control?  
A. backup and recovery 
B. audit trails 
C. contingency planning 
D. operations procedures
A

Answer: B
Explanation: Audit Trails are under Operations Security Auditing opposed to Operations Security Operations Controls.
“Operations Controls embody the day-to-day procedures used to protect computer operations. The concepts of resource protection, hardware/software control, and privileged entity must be understood by the CISSP candidate.” Pg. 311 Krutz: The CISSP Prep Guide: Gold Edition

159
Q

Access control allows you to exercise directing influence over which of the following aspects of a system?
A. Behavior, user, and content provider.
B. Behavior, use, and content.
C. User logs and content.
D. None of the choices.

A

Answer: B
Explanation: Access control is the collection of mechanisms that permits managers of a system to exercise a directing or restraining influence over the behavior, use, and content of a system. It permits management to specify what users can do, which resources they can access, and what operations they can perform on a system.

160
Q
\_\_\_\_\_\_\_\_\_\_\_\_ is the means by which the ability to do something with a computer resource is explicitly enabled or restricted.    
A. Access control 
B. Type of access 
C. System resource 
D. Work permit
A

Answer: A
Explanation: Access is the ability to do something with a computer resource (e.g., use, change, or view). Access control is the means by which the ability is explicitly enabled or restricted in some way (Usually through physical and system-based controls). Computer-based access controls can prescribe not only who or what process may have access to a specific system resource, but also the type of access that is permitted. These controls may be implemented in the computer system or in external devices.

161
Q

The ability to do something with a computer resource can be explicitly enabled or restricted through:
A. Physical and system-based controls.
B. Theoretical and system-based controls.
C. Mental and system-based controls.
D. Physical and trap-based controls.

A

Answer: A
Explanation: Access is the ability to do something with a computer resource (e.g., use, change, or view). Access control is the means by which the ability is explicitly enabled or restricted in some way (Usually through physical and system-based controls). Computer-based access controls can prescribe not only who or what process may have access to a specific system resource, but also the type of access that is permitted. These controls may be implemented in the computer system or in external devices.

162
Q
The main categories of access control do NOT include:    
A. Administrative Access Control 
B. Logical Access Control 
C. Random Access Control 
D. Physical Access Control
A

Answer: C
Explanation: There are several different categories of access control. The main categories are: –Physical Access Control –Administrative Access Control –Logical Access Control –Data Access Control

163
Q
You have very strict Physical Access controls. At the same time you have loose Logical Access Controls. What is true about this setting?    
A. None of the choices. 
B. It can 100% secure your environment. 
C. It may secure your environment. 
D. It may not secure your environment.
A

Answer: D
Explanation: Access control is a bit like the four legs of a chair. Each of the legs must be equal or else an imbalance will be created. If you have very strict Physical Access controls but very poor Logical Access Controls then you may not succeed in securing your environment.

164
Q
Which of the following is not a detective technical control?    
A. Intrusion detection system 
B. Violation reports 
C. Honeypot 
D. None of the choices.
A
Answer: D 
Explanation:  Detective Technical Controls warn of technical Access Control violations. Under this category you would find the following: 
Audit trails 
Violation reports 
Intrusion detection system 
Honeypot
165
Q
A business continuity plan is an example of which of the following?  
A. Corrective Control 
B. Detective Control 
C. Preventive Control 
D. Compensating Control
A

Answer: A
Explanation:

166
Q
\_\_\_\_\_\_\_\_ Technical Controls warn of technical Access Control violations.    
A. Elusive 
B. Descriptive 
C. Corrective 
D. Detective
A

Answer: D
Explanation: Detective Technical Controls warn of technical Access Control violations. Under this category you would find the following: Audit trails Violation reports Intrusion detection system Honeypot

167
Q
A two factor authentication method is considered a:
A. Technical control 
B. Patching control 
C. Corrective control 
D. Systematic control
A
Answer: A 
Explanation:  By technical controls we mean some or all of the following: 
Access Control software 
Antivirus Software 
Passwords Smart Cards 
Encryption Call-back systems 
Two factor authentication  
Note: logical & technical controls are used interchangeably (pg 158 of CISSP / Shon Harris / 5th edition)
168
Q
Which of the following are NOT considered technical controls?    
A. Access Control software 
B. Man trap 
C. Passwords 
D. Antivirus Software
A
Answer: B 
Explanation:  By technical controls we mean some or all of the following: 
Access Control software 
Antivirus Software Passwords 
Smart Cards Encryption 
Call-back systems 
Two factor authentication
169
Q
\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ are the technical ways of restricting who or what can access system resources.    
A. Preventive Manual Controls 
B. Detective Technical Controls 
C. Preventive Circuit Controls 
D. Preventive Technical Controls
A

Answer: D
Explanation: Preventive Technical Controls are the technical ways of restricting who or what can access system resources and what type of access is permitted. Its purpose is to protect the OS and other systems from unauthorized modification or manipulation. It is usually built into an operating system, or it can be a part of an application or program, or an add-on security package, or special components to regulate communication between computers. It also protects the integrity and availability by limiting the number of users and/or processes. These controls also protect confidential information from being disclosed to unauthorized persons.

170
Q
Which of the following is not a form of detective administrative control?  
A. Rotation of duties 
B. Required vacations 
C. Separation of duties 
D. Security reviews and audits
A

Answer: C
Explanation: Separation of duties is a PREVENTIVE Administrative Control. The other 3 are DETECTIVE Administrative Controls.
ISC CISSP Exam
“Pass Any Exam. Any Time.” - www.actualtests.com 307

Detective Administrative Controls Detective administrative controls are used to determine how well security policies and procedures are complied with, to detect fraud, and to avoid employing persons that represent an unacceptable security risk. This type of control includes: • Security reviews and audits. • Performance evaluations. • Required vacations. • Background investigations. • Rotation of duties.
Reference: http://cccure.org/Documents/HISM/015-019.html

171
Q
Preventive Technical Controls are usually built:    
A. By using MD5. 
B. Into an operating system. 
C. By security officer. 
D. By security administrator.
A

Answer: B
Explanation: Preventive Technical Controls are the technical ways of restricting who or what can access system resources and what type of access is permitted. Its purpose is to protect the OS and other systems from unauthorized modification or manipulation. It is usually built into an operating system, or it can be a part of an application or program, or an add-on security package, or special components to regulate communication between computers. It also protects the integrity and availability by limiting the number of users and/or processes. These controls also protect confidential information from being disclosed to unauthorized persons.

172
Q

Preventive Technical Controls cannot:
A. Protect the OS from unauthorized modification.
B. Protect confidential information from being disclosed to unauthorized persons.
C. Protect the OS from unauthorized manipulation.
D. Protect users from being monitored.

A

Answer: D
Explanation: Preventive Technical Controls are the technical ways of restricting who or what can access system resources and what type of access is permitted. Its purpose is to protect the OS and other systems from unauthorized modification or manipulation. It is usually built into an operating system, or it can be a part of an application or program, or an add-on security package, or special components to regulate communication between computers. It also protects the integrity and availability by limiting the number of users and/or processes. These controls also protect confidential information from being disclosed to unauthorized persons.

173
Q

How do Preventive Technical Controls protect system integrity and availability?
A. By limiting the number of threads only.
B. By limiting the number of system variables.
C. By limiting the number of function calls only.
D. By limiting the number of users and/or processes.

A

Answer: D
Explanation: Preventive Technical Controls are the technical ways of restricting who or what can access system resources and what type of access is permitted. Its purpose is to protect the OS and other systems from unauthorized modification or manipulation. It is usually
ISC CISSP Exam
“Pass Any Exam. Any Time.” - www.actualtests.com 309
built into an operating system, or it can be a part of an application or program, or an add-on security package, or special components to regulate communication between computers. It also protects the integrity and availability by limiting the number of users and/or processes. These controls also protect confidential information from being disclosed to unauthorized persons.

174
Q
Which of the following is NOT a type of access control?   
A. Intrusive 
B. Deterrent 
C. Detective 
D. Preventive
A

Answer: A
Explanation: There are different types of access control. Access controls can be categorized as follows: Preventive (in order to avoid occurrence)
Detective (in order to detect or identify occurrences) Deterrent (in order to discourage occurrences) Corrective (In order to correct or restore controls) Recovery (in order to restore resources, capabilities, or losses)

175
Q
As a type of access control, which of the following asks for avoiding occurrence?    
A. Preventive 
B. Deterrent 
C. Intrusive 
D. Detective
A

Answer: A
Explanation: There are different types of access control. Access controls can be categorized as follows: Preventive (in order to avoid occurrence) Detective (in order to detect or identify occurrences) Deterrent (in order to discourage occurrences) Corrective (In order to correct or restore controls) Recovery (in order to restore resources, capabilities, or losses)

176
Q
As a type of access control, which of the following asks for identifying occurrences?    
A. Deterrent 
B. Preventive 
C. Detective 
D. Intrusive
A

Answer: C
Explanation: There are different types of access control. Access controls can be categorized as follows: Preventive (in order to avoid occurrence) Detective (in order to detect or identify occurrences) Deterrent (in order to discourage occurrences) Corrective (In order to correct or restore controls) Recovery (in order to restore resources, capabilities, or losses)

177
Q
As a type of access control, which of the following asks for discouraging occurrence?  
A. Detective
B. Intrusive 
C. Deterrent 
D. Preventive
A

Answer: C
Explanation: There are different types of access control. Access controls can be categorized as follows: Preventive (in order to avoid occurrence) Detective (in order to detect or identify occurrences) Deterrent (in order to discourage occurrences) Corrective (In order to correct or restore controls) Recovery (in order to restore resources, capabilities, or losses)

178
Q
As a type of access control, which of the following asks for restoring controls?    
A. Deterrent 
B. Intrusive 
C. Corrective 
D. Preventive
A

Answer: C
Explanation: There are different types of access control. Access controls can be categorized as follows: Preventive (in order to avoid occurrence) Detective (in order to detect or identify occurrences) Deterrent (in order to discourage occurrences) Corrective (In order to correct or restore controls) Recovery (in order to restore resources, capabilities, or losses)

179
Q
QUESTION NO: 654  
What type of access control focuses on restoring resources?    
A. Recovery 
B. Preventive 
C. Intrusive 
D. Corrective
A

Answer: A
Explanation: There are different types of access control. Access controls can be categorized as follows: Preventive (in order to avoid occurrence) Detective (in order to detect or identify occurrences) Deterrent (in order to discourage occurrences) Corrective (In order to correct or restore controls) Recovery (in order to restore resources, capabilities, or losses)

180
Q
Access control is the collection of mechanisms that permits managers of a system to exercise influence over the use of:    
A. A man guard 
B. An IS system 
C. A threshold 
D. A Trap
A

Answer: B
Explanation: Access control is the collection of mechanisms that permits managers of a system to exercise a directing or restraining influence over the behavior, use, and content of a system. It permits management to specify what users can do, which resources they can access, and what operations they can perform on a system.