Sybex Practice test 1 Flashcards
Which of the following confidentiality security models ensures that a subject with clearance level of Secret can write only to objects classified as Secret or Top Secret?
A. Biba
B. Clark Wilson
C. Brewer Nash
D. Bell-LaPadula
D. Bell-LaPadula
Explanation:
The goal of the confidentiality model Bell-LaPadula is to keep secret data secret and share secret data when it is allowed to be shared
Your organization needs a security model for integrity where the subject cannot send messages to object of higher integrity. Which of the following is unique to the BIba model and will accommodate that need?
A. Simple
B. Star
C. Invocation
D. Strong
C. Invocation
Explanation:
The BIba model is a state transition system for computer security. Data is grouped into ordered levels of integrity. The model was created so that subjects cannot corrupt the data. Invocation properties mean that a process from below cannot even request a higher access. It can only work with the same or lower levels.
You need to assign permissions so that users can access only the resources they need to complete specific tasks. Which security tenet did you use to meet the need?
A. Separation of duties
B. Need to know
C. Job rotation
D. Least privilege
D. Least privilege
Explanation:
Least privilege is assigning permissions so that users can access only those resources required to do their job.
Alice needs some help developing security policy documentation. She turns to you for help in developing a document that contains instructions or information on how to remain in compliance with regulators. What document do you need to develop?
A. Procedures
B. Standards
C. Policy
D. Guidelines
B. Standards
Explanation:
A standard is a kind of security policy that defines how to remain in compliance with best practices and industry standards. Procedures are the step by step instructions on how to implement those best practices. Guidelines are used to create the procedures. Policies are at the highest level and describe the mission and goals. Policies are usually non specific and goal oriented
Your external audit submitted the final report to the board of directors and upper management. Who is responsible for implementing the recommendations in this report?
A. End users
B. Internal auditors
C. Security administrators
D. Senior management
D. Senior management
Explanation:
Senior management is always responsible for security within an organization. They are responsible for following the recommendations of the auditor
You are a system analyst conducting a vulnerability assessment. Which of the following is not a requirement for you to know?
A. Access Controls
B. Understanding of the systems to be evaluated
C. Potential threats
D. Passwords
D. Passwords
Explanation:
A list of root passwords is not a requirement. A vulnerability assessment is the testing of systems and access controls for weaknesses
You are made aware of a threat that involves a hacking group holding large amounts of information about your company. What best describes the threat you face from this hacking group?
A. DoS
B. TCO
C. Latency
D. Data mining
D. Data mining
Explanation:
With the amount of information online today, data mining is a threat that involves taking large amounts of that information for aggregation. An attacker can use this technique to find patterns on how you conduct business and find critical times when systems are most vulnerable
You are evaluating the risk for your data center. You assigned threat, vulnerability and impact a score from 1 to 10. The data center scores are as follows: Threat:4, Vulnerability:2, Impact: 6. What is the risk?
A. 12
B. 16
C. 48
D. 35
C. 48
Explanation:
To quantitatively evaluate risk, you must assess threat, vulnerability and impact. The equation is Risk = Threat x Vulnerability. In our scenario, the answer is 4 x 2 x 6 = 48
Your customer facing website experiences some failures. The security engineer analyzed the situation and believes it is the web application firewall. Syslog shows that the WAF was down twice for a total of 3 hours in the past 72 hours. Which of the following is your mean time to repair?
A. 2.5 hours
B. 1.5 hours
C. 34.5 hours
D. 3 hours
B. 1.5 hours
Explanation:
The MTTR is calculated by using the total maintenance time as the numerator and the total number of repairs as the denominator. The 3 hours divided by the two times it went down gives you an MTTR of 1.5
Intrusions are usually detected in one of three basic ways. Which detection method can reassemble packets and look at higher layer activity?
A. Signature recognition
B. Heuristic detection
C. Anomaly detection
D. Protocol decoding
D. Protocol decoding
Explanation:
Protocol decoding IDP tools can reassemble packets and look at higher layer activity like protocols that operate at the application layer
In a social engineering campaign, you were provided with the birthday of your victims. You invent a scenario to engage the victim using this information. What is this type of social engineering called?
A. Pretexting
B. Phishing
C. Baiting
D. Diversion
A. Pretexting
Explanation:
Pretexting takes real knowledge of a victim and uses that to attempt to get even more information. This type of scenario will engage and increase the chance the victim will fall for the pretext
Your office managed received a voicemail from a vendor wanting to confirm a delivery time and address. The delivery time is correct, but the address is not. What possibly happened?
A. Baiting
B. Waterholing
C. Phishing
D. Diversion
D. Diversion
Explanation:
Diversion is a social engineering campaign that targets vendor delivery or transport companies. The objective of this type of trick is to make the delivery of goods to another location rather than the original
Your compliance auditor requires an inventory of all wireless devices. What is the best search engine to use?
A. Shodan
B. WiGLE
C. Wireshark
D. BurpSuite
B. WiGLE
Explanation:
WiGLE is a search engine that maps 802.11 wireless networks. This site is searchable and has vast amounts of statistics for network admins and compliance auditors. It is also freely available to attackers
A member of your dev team was fired for harassment. The company is concerned with the security of the project and proprietary code this developer had access to. What is the best way to ensure the integrity of this project?
A. Peer review
B. Red box test
C. Gray box test
D. Black box test
D. Black box test
Explanation:
In this type of situation, the best protection is to hire an expert external red team to do a black box test of the program/product/code. A peer review may not discover items, and if collusion was in play, this would not work
As a security architect, you are responsible for making all systems come together and work properly and securely. Your tester is logged into the system as a user, testing the internal mechanisms of the application. This enables an exhaustive test very similar to what an attacker might accomplish. What type of test is this?
A. A gray box
B. A black box
C. A red box
D. A clear box
A. A gray box
Explanation:
A grey box test is an intermediary level test. Because testers have knowledge of the system, they give input to the systems, check if the result is what was expected and then check what the result is. This test combines the white box and black box tests