Security Architecture and Engineering Flashcards
This domain represents 13% of the CISSP exam. Security must be incorporated into the design of information systems, as well as being key to the facilities housing information systems and workers.
Q. 1 What’s considered a sufficient fencing height to keep out casual intruders?
12 feet 3 to 4 feet 12 feet with one strand of barbed wire 8 feet with three strands of barbed wire
3 to 4 feet
[Security Engineering] Three to four feet is a sufficient height to deter casual physical intruders.
Q. 2 How does soda acid aid in fire suppression?
It reduces the fire’s oxygen supply It isolates the fire’s fuel supply It lowers the temperature below what the fire needs to sustain itself It extinguishes the fire through a chemical reaction
It isolates the fire’s fuel supply
[Security Engineering] Soda acid prevents the fire’s fuel supply from reacting with oxygen in the fire triangle.
Q. 3 What’s the principal feature of a mantrap?
Its advanced metal detecting capability Only one of its two doors can be opened at a time The high speed by which people can enter and exit a facility Its biometric identifying capabilities
Only one of its two doors can be opened at a time
[Security Engineering] A mantrap controls physical access by permitting only one door in a controlled pair to be open at a time.
Q. 4 What’s one possible weakness of a BIOS password intended to protect hard disk data?
It may be possible to read the hard disk data by placing it in another computer It might not provide disk encryption The encryption used is generally weak It can be defeated by connecting jumpers together on the system board
It may be possible to read the hard disk data by placing it in another computer
[Asset Security] Some BIOS passwords prevent only that particular computer from accessing the hard drive; therefore, they don’t actually protect the hard drive’s contents.
Q. 5 The major hierarchical classes of security protection defined in the Orange Book (TCSEC) include which of the following? Drag and drop the correct answer(s) from top to bottom.
Compartmentalized protection Discretionary protection Mandatory protection Total protection Minimal protection Verified protection
Discretionary protection
Mandatory protection
Minimal protection
Verified protection
[Security Engineering] The major hierarchical classes of security protection defined in the Orange Book (TCSEC) are Minimal protection (D), Discretionary protection (C), Mandatory protection (B), and Verified protection (A).
Q. 6 After a power failure, the security doors in a data center permit all personnel to access the facility. This is known as
Fail open Fail closed Control closed Control open
Fail open
[Security Engineering] “Fail open” describes the condition in which an access controls permits access in the event of an abnormal condition, such as a power failure.
Q. 7 The model that assigns classification levels to materials and to individuals to determine who can view materials based upon their classification is known as
The DoD multilevel security model The Bell-LaPadula model The Clark-Wilson model The information flow model
The Bell-LaPadula model
[Security Engineering] The Bell-LaPadula model is used to control access to information based on the classification of that information and the clearance level of the individual who wants to view it.
Q. 8 An asymmetric cryptosystem is also known as a
Message digest Hash function Public key cryptosystem Secret key cryptosystem
Public key cryptosystem
[Security Engineering] Asymmetric cryptosystems also are known as public key cryptosystems.
Q. 9 To what height should a critical building be illuminated at night?
4 feet 8 feet 12 feet 24 feet
8 feet
[Security Engineering] Eight feet is a sufficient height to provide visibility of most physical intruder activities at night.
Q. 10 A database containing the data structures used by an application is known as
A data encyclopedia A data dictionary Metadata A schema
A data dictionary
[Security Engineering] A data dictionary contains information about an application’s data structures, including table names, field names, indexes, and so on.
Q. 11 The sum total of all protection mechanisms in a system is known as a
Trusted Computing Base Protection domain Trusted path Summation Protection Mechanism
Trusted Computing Base
[Security Engineering] The Trusted Computing Base (TCB) is the complete set of hardware, firmware, and/or software components that are critical to a computer system’s security.
Q. 12 An algorithm that’s easy to compute in the forward direction but difficult to compute backwards is known as
A block cipher A stream cipher A public key function A one-way function
A one-way function
[Security Engineering] A one-way function is easy to compute in the forward direction but very difficult to run backwards.
Q. 13 A chart of privileges and subjects is known as a(n)
Protection ring Chart of accounts Access control list Access matrix
Access matrix
[Security Engineering] An access matrix is used to map subjects to capabilities.
Q. 14 The amount of effort required to break a given ciphertext is known as the
Work factor Effort function Cryptanalysis Extraction
Work factor
[Security Engineering] Work factor describes the amount of time and/or effort required to break a ciphertext.
Q. 15 What term refers to an object, such as memory space in a program or a storage block on media, that may present a risk of data remanence if it is not properly cleared?
Data residency Data resiliency Object reuse Data at rest
Object reuse
[Asset Security] Object reuse is the term that refers to an object that may present a risk of data remanence if it is not properly cleared. Data residency refers to the physical or geographic location of data. Data resiliency refers to the persistent nature of data. Data at rest refers to data that is located on storage media.
Q. 16 Which of the following are examples of third-generation programming languages? Drag and drop the correct answer(s) from top to bottom.
Klingon BASIC C/C++ Assembler FORTRAN Java
BASIC
C/C++
FORTRAN
Java
[Security Engineering] C/C++, BASIC, FORTRAN, and Java are all examples of third-generation programming languages. An assembler is a program used to convert software code to machine language. Klingon is a fictional language used by a fictional warlike humanoid alien species, not a programming language.
Q. 17 Why would a user’s public encryption key be widely distributed?
So that cryptographers can attempt to break it Because it is encrypted So that others can send encrypted messages to the user So that the user can decrypt messages from any location
So that others can send encrypted messages to the user
[Security Engineering] In public key cryptography, the public key doesn’t reveal any information about the secret key.
Q. 18 European ITSEC level F-C2 is equivalent to what U.S. TCSEC level?
D C1 C2 B2
C2
[Security Engineering] The European ITSEC level F-C2 corresponds to U.S. TCSEC level C2.
Q. 19 The purpose of an operating system is to
Manage hardware resources Compile program code Decompile program code Present a graphic interface to users
Manage hardware resources
[Security Engineering] An operating system (OS) manages computer hardware and presents a consistent interface to application programs and tools.
Q. 20 Object-oriented databases
Are well-suited to the storage and manipulation of complex data types Use fewer system resources than relational databases Are easier to learn than relational databases Have severe restrictions on the types and sizes of data elements
Are well-suited to the storage and manipulation of complex data types
[Security Engineering] Object-oriented databases are well-suited for complex and large data types, but consume far more system resources than relational databases and have steep learning curves.