Practice Test Flashcards
Domain 3
Matthew is the security administrator for a consulting firm and must enforce access controls that restrict users’ access based upon their previous activity. For example, once a consultant accesses data belonging to Acme Cola, a consulting client, they may no longer access data belonging to any of Acme’s competitors. What security model best fits Matthew’s needs?
a. Clark-Wilson
b. Biba
c. Bell-LaPadula
d. Brewer-Nash
D. The Brewer-Nash model allows access controls to change dynamically based upon a user’s actions. It is often used in environments like Matthew’s to implement a “Chinese wall” between data belonging to different clients.
Referring to the figure shown below, what is the earliest stage of a fire where it is possible to use detection technology to identify it?
Image reprinted from CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Edition © John Wiley & Sons 2015, reprinted with permission.
a. Incipient
b. Smoke
c. Flame
d. Heat
A. Fires may be detected as early as the incipient stage. During this stage, air ionization takes place and specialized incipient fire detection systems can identify these changes to provide early warning of a fire.
Ralph is designing a physical security infrastructure for a new computing facility that will remain largely unstaffed. He plans to implement motion detectors in the facility but would also like to include a secondary verification control for physical presence. Which one of the following would best meet his needs?
a. CCTV
b. IPS
c. Turnstiles
d. Faraday cages
A. Closed circuit television (CCTV) systems act as a secondary verification mechanism for physical presence because they allow security officials to view the interior of the facility when a motion alarm sounds to determine the current occupants and their activities.
Harry would like to retrieve a lost encryption key from a database that uses m of n control with m = 4 and n = 8. What is the minimum number of escrow agents required to retrieve the key?
a. 2
b. 4
c. 8
d. 12
B. In an m of n control system, at least m of n possible escrow agents must collaborate to retrieve an encryption key from the escrow database.
Fran’s company is considering purchasing a web-based email service from a vendor and eliminating its own email server environment as a cost-saving measure. What type of cloud computing environment is Fran’s company considering?
a. SaaS
b. IaaS
c. CaaS
d. PaaS
A. This is an example of a vendor offering a fully functional application as a web-based service. Therefore, it fits under the definition of Software as a Service (SaaS). In Infrastructure as a Service (IaaS), Compute as a Service (CaaS), and Platform as a Service (PaaS) approaches, the customer provides their own software. In this example, the vendor is providing the email software, so none of those choices are appropriate.
Bob is a security administrator with the federal government and wishes to choose a digital signature approach that is an approved part of the federal Digital Signature Standard under FIPS 186-4. Which one of the following encryption algorithms is not an acceptable choice for use in digital signatures?
a. DSA
b. HAVAL
c. RSA
d. ECDSA
B. The Digital Signature Standard approves three encryption algorithms for use in digital signatures: the Digital Signature Algorithm (DSA); the Rivest, Shamir, Adleman (RSA) algorithm; and the Elliptic Curve DSA (ECDSA) algorithm. HAVAL is a hash function, not an encryption algorithm. While hash functions are used as part of the digital signature process, they do not provide encryption.
Harry would like to access a document owned by Sally and stored on a file server. Applying the subject/object model to this scenario, who or what is the subject of the resource request?
a. Harry
b. Sally
c. Server
d. Document
A. In the subject/object model of access control, the user or process making the request for a resource is the subject of that request. In this example, Harry is requesting resource access and is, therefore, the subject.
Michael is responsible for forensic investigations and is investigating a medium severity security incident that involved the defacement of a corporate website. The web server in question ran on a virtualization platform, and the marketing team would like to get the website up and running as quickly as possible. What would be the most reasonable next step for Michael to take?
a. Keep the website offline until the investigation is complete.
b. Take the virtualization platform offline as evidence.
c. Take a snapshot of the compromised system and use that for the investigation.
d. Ignore the incident and focus on quickly restoring the website.
C. Michael should conduct his investigation, but there is a pressing business need to bring the website back online. The most reasonable course of action would be to take a snapshot of the compromised system and use the snapshot for the investigation, restoring the website to operation as quickly as possible while using the results of the investigation to improve the security of the site.
Helen is a software engineer and is developing code that she would like to restrict to running within an isolated sandbox for security purposes. What software development technique is Helen using?
a. Bounds
b. Input validation
c. Confinement
d. TCB
C. The use of a sandbox is an example of confinement, where the system restricts the access of a particular process to limit its ability to affect other processes running on the same system.
What concept describes the degree of confidence that an organization has that its controls satisfy security requirements?
a. Trust
b. Credentialing
c. Verification
d. Assurance
D. Assurance is the degree of confidence that an organization has that its security controls are correctly implemented. It must be continually monitored and re-verified.
What type of security vulnerability are developers most likely to introduce into code when they seek to facilitate their own access, for testing purposes, to software they developed?
a. Maintenance hook
b. Cross-site scripting
c. SQL injection
d. Buffer overflow
A. Maintenance hooks, otherwise known as backdoors, provide developers with easy access to a system, bypassing normal security controls. If not removed prior to finalizing code, they pose a significant security vulnerability if an attacker discovers the maintenance hook.
In the figure shown below, Sally is blocked from reading the file due to the Biba integrity model. Sally has a Secret security clearance and the file has a Confidential classification. What principle of the Biba model is being enforced?
a. Simple Security Property
b. Simple Integrity Property
c. *-Security Property
d. *-Integrity Property
B. The Simple Integrity Property states that an individual may not read a file classified at a lower security level than the individual’s security clearance.
Tom is responsible for maintaining the security of systems used to control industrial processes located within a power plant. What term is used to describe these systems?
a. POWER
b. SCADA
c. HAVAL
d. COBOL
B. Supervisory control and data acquisition (SCADA) systems are used to control and gather data from industrial processes. They are commonly found in power plants and other industrial environments.
Sonia recently removed an encrypted hard drive from a laptop and moved it to a new device because of a hardware failure. She is having difficulty accessing encrypted content on the drive despite the fact that she knows the user’s password. What hardware security feature is likely causing this problem?
a. TCB
b. TPM
c. NIACAP
d. RSA
B. The Trusted Platform Module (TPM) is a hardware security technique that stores an encryption key on a chip on the motherboard and prevents someone from accessing an encrypted drive by installing it in another computer.
Marcy would like to continue using some old DES encryption equipment to avoid throwing it away. She understands that running DES multiple times improves the security of the algorithm. What is the minimum number of times she must run DES on the same data to achieve security that is cryptographically strong by modern standards?
a. 2
b. 3
c. 4
d. 12
B. Running DES three times produces a strong encryption standard known as Triple DES, or 3DES. In order for this to provide additional security, DES must also be run using at least two different keys. NIST recommends use of three independent keys for the strongest version.
Questions 16–19 refer to the following scenario.
Alice and Bob would like to use an asymmetric cryptosystem to communicate with each other. They are located in different parts of the country but have exchanged encryption keys by using digital certificates signed by a mutually trusted certificate authority.
If Alice wishes to send Bob an encrypted message, what key does she use to encrypt the message? a. Alice’s public key b. Alice’s private key c. Bob’s public key d. Bob’s private key
C. In an asymmetric cryptosystem, the sender of a message always encrypts the message using the recipient’s public key.