CISSP certification: Full 125 question practice test #4 - test 2 (Anthony Today) Flashcards
(125 cards)
Which historical type of encryption involved the sender switching letters a certain number of spots forwards or back in the alphabet, with the receiver doing the same in the opposite direction?
A. Spartan Scytale
B. Vigenere cipher
C. Caesar cipher
D. Bazeries
C. Caesar cipher
Explanation: Caesar Cipher (Substitution) - Done by switching letters a certain numbers of spots in the alphabet. “Pass the exam" moved 3 back would be “Mxpp qeb buxj.”
In our authentication process we are wanting to add a pseudo random number to ensure old data is not replayed. Which of these would we add?
A. Salting
B. Clipping levels
C. Nonce
D. Key-streching
C. Nonce
Explanation:
Nonce: (arbitrary number that may only be used once). It is often a random or pseudo-random number issued in an authentication protocol to ensure that old communications cannot be reused in replay attacks. They can also be useful as initialization vectors and in cryptographic hash function.
What would a distance vector routing protocol use to determine the BEST route to a certain destination?
A. The best bandwidth to the destination
B. The aggregated payload and the bandwidth
C. Least hops to the destination
D. The path it used last time it sent data to that destination
C. Least hops to the destination
Explanation:
Distance vector routing protocols: Only focuses on how far the destination is in Hops (how many routers in between here and there). Does not care about bandwidth, it just uses the shortest path.
Looking at our information security governance, who would approve and sign off on our policies?
A. Senior management
B. The IT Teams
C. IT Security
D. IT management
A. Senior management
Explanation:
Policies are mandatory, they are high level and non-specific. They are contain “Patches, updates, strong encryption”, but they will not be specific to “OS, encryption type, vendor technology”. They are approved and often written by senior management.
In which type of software testing do we progressively test larger and larger groups of software components until the software works as a whole?
A. Reference checking
B. Integration testing
C. Penetration testing
D. Unit testing
B. Integration testing
Explanation:
Integration testing: Seeks to verify the interfaces between components against a software design. Integration testing works to expose defects in the interfaces and interaction between integrated components/modules. Progressively larger groups of software components are tested until the software works as a system.
We have realized our current use of magnetic stripe ID cards is not matching the security profile senior management wants. What could we use on the cards in addition to the magnetic stripe to make them smart cards?
A. UV printing
B. RFID Chip
C. Holograms
D. RFII Chip
B. RFID Chip|
Explanation:
Smart Cards and tokens (contact or contactless): They contain a computer circuit using an ICC (Integrated Circuit Chip).
As part of our Business Continuity Plan (BCP) and its sub plans we want to ensure we are redundant. Which of these is something we want to be redundant on?
A. Internet connections
B. People
C. Power
D. All of the above
D. All of the above
Explanation:
We want layers of redundancy, just like we have defense in depth. We want power, internet, path, hardware, system, backup, people, etc. redundancy.
We are wanting to hire outside penetration testers. Who in our organization would set the goals for the penetration test?
A. IT security leadership
B. IT security team
C. IT leadership
D. Senior management
D. Senior management
Explanation: Penetration Testing (Pen Testing), often called Ethical Hacking. Test if the vulnerabilities are exploitable. An authorized simulated attack on our organization that looks for security weaknesses, potentially gaining access to the systems, buildings and data. Senior management set the goals for the Pen testing. Why are we doing it? What are we trying to achieve? They have to sign off on it.
There are many risks in today’s increasing complex IT world, how we deal with them should be part of an overarching strategy. We could for instance be risk neutral or averse. Who would decide our organization’s risk appetite?
A. The IT security team
B. Senior management
C. The IT leadership team
D. Rules and regulations
B. Senior management
Explanation:
Governance – This is C-level Executives (Not you). Stakeholder needs, conditions and options are evaluated to define: Balanced agreed-upon enterprise objectives to be achieved. Setting direction through prioritization and decision making. Monitoring performance and compliance against agreed-upon direction and objectives. Risk appetite – Aggressive, neutral, adverse.
We are wanting to strengthen our detective access controls. Which of these could be something we would want to implement?
A. Patches
B. Encryption
C. IDS
D. Backups
C. IDS
Explanation:
Detective: Controls that detect during or after an attack – IDS, CCTV, Alarms, anti-virus.
Which process are we using when we approve alterations to our environment?
A. Project management
B. Patch management
C. Implementation management
D. Change management
D. Change management
Explanation:
Change Management: Often called change control, a formalized process on how we handle changes to our environments. If done right we will have full documentation, understanding and we communicate changes to appropriate parties. The change review board should be comprised of both IT and other operational units from the organization, we may consider impacts on IT, but we are there to serve the organization, they need to understand how it will impact them and raise concerns if they have any. A change is proposed to the change board, they research to understand the full impact of the change. The person or group submitting the change should clearly explain the reasons for the change, the pro’s and con’s of implementing and not implementing, any changes to systems and processes they know about and in general aide and support the board with as much information as needed.
As an IT Security professional, you are expected to perform your due diligence. What does this mean?
A. Continue the security practices of your company
B. Do what is right in the situation and your job. Act on the knowledge
C. Apply patches annually
D. Researching and acquiring the knowledge to do your job right
D. Researching and acquiring the knowledge to do your job right
Explanation:
Due Diligence – The research to build the IT Security architecture of your organization. Best practices and common protection mechanisms. Research of new systems before implementing.
When we are using VoIP for our phone calls, which protocol does it use to transmit data?
A. UDP
B. RDP
C. DHCP
D. TCP
A. UDP
Explanation:
VoIP (Voice over Internet Protocol): The digital information is packetized, and transmitted using UDP IP packets over a packet-switched network.
We are restoring services and applications back from our DR site to our original site after a security incident. Which applications would we move back FIRST?
A. Least critical
B. The least resource intensive
C. Most critical
D. The most resource intensive
A. Least critical
Explanation:
The BCP team has sub-teams responsible for rescue, recovery and salvage in the event of a disaster or disruption. Salvage team (failback): Responsible for returning our full infrastructure, staff and operations to our primary site or a new facility if the old site was destroyed. We get the least critical systems up first, we want to ensure the new sites is ready and stable before moving the critical systems back.
Why would we want to keep a positive pressure in our data center?
A. To get contaminants in
B. We wouldnt, we would keep a neutral pressure
C. The keep contaminants out
D. We wouldnt we would keep a negative pressure
C. The keep contaminants out
Explanation:
In our data center we want to keep a positive pressure to keep contaminants out, this can be dust particles that can set of particle sensors and release FM200 or another fire suppressant gas.
We are already using usernames and passwords online. Which of these could be something else we would add to get multifactor authentication?
A. Single-use password
B. Security questions
C. Challenge response
D. PINs
A. Single-use password
Explanation:
Single-use passwords are possession factors, you don’t remember them you have them on a piece of paper or on a token, we have multifactor authentication with the username, password and single-use password.
When someone is using a fake ID, it is an attack on which type of authentication?
A. Type 3
B. Type 4
C. Type 2
D. Type 1
C. Type 2
Explanation:
Something you have - Type 2 Authentication (ID, Passport, Smart Card, Token, cookie on PC etc.).
If we have 100 users in our organization that are all needing to communicate securely with each other, would symmetric or asymmetric encryption use the highest number of encryption keys?
A. They would use the same number of keys
B. We would need more information to be able to tell
C. Asymmetric
D. Symmetric
D. Symmetric
Explanation:
Symmetric would use 4950 keys (100x(100-1))/2, asymmetric uses 2 keys per person so 200 keys.
Which type of black-box testing would we submit random malformed data as inputs into the software?
A. Fuzz testing
B. Dynamic testing
C. Static testing
D. Synthetic transaction testing
A. Fuzz testing
Explanation:
Fuzzing (Fuzz testing): Testing that provides a lot of different malformed inputs to try to cause unauthorized access or for the application to enter unpredictable state or crash. If the program crashes or hangs the fuzz test failed. The Fuzz tester can enter values into the script or use pre-compiled random or specific values.
Jane is talking to a friend and is explaining what digital signatures do. Which of these could be something that she tells her friend is one of the MAIN reasons we use digital signatures?
A. Integrity
B. Availability
C. Authentication
D. Confidentiality
A. Integrity
Explanation:
Digital Signatures: Provides Integrity and Non-Repudiation.
You can MOST LIKELY be held liable when you display which of these?
A. Negligence
B. Due Care
C, Remorse
D. Due diligence
A. Negligence
Explanation:
Negligence (and Gross Negligence) is the opposite of Due Care. If a system under your control is compromised and you can prove you did your Due Care you are most likely not liable. If a system under your control is compromised and you did NOT perform Due Care you are most likely liable.
Which type of audit could we use to ensure our employees are following our policies?
A. Review Management
B. White Box testing
C. Review user logs
D. Self reviews
C. Review user logs
Explanation:
We would want to review user logs to see if they are following our policies.
Bob is telling the senior leadership team about how we use RAID. The CFO wants to know what that is an abbreviation of.
A. Reversed Array of Inexpensive Disks
B. Recursive Array of Independent Disks
C. Redundant Array of Inexpensive Disks
D. Real Array of Inexpensive Disks
C. Redundant Array of Inexpensive Disks
Explanation:
Redundant Array of Independent Disks (RAID): Comes in 2 basic forms, disk mirroring and disk striping. Disk mirroring: Writing the same data across multiple hard disks, this is slower, the RAID controller has to write all data twice. Uses at least 2 times as many disks for the same data storage, needs at least 2 disks. Disk striping: Writing the data simultaneously across multiple disks providing higher write speed. Uses at least 2 disks, and in itself does not provide redundancy. We use parity with striping for the redundancy, often by XOR, if we use parity for redundancy we need at least 3 disks.
Our organization is considering different types of intellectual protection options. Which of these is something that can be patented?
A. Logos
B. Software
C. Inventions
D. Public Domain (CC0) photos
C. Inventions
Explanation:
Patents: Protects inventions for 20 years (normally) – Cryptography algorithms can be patented. Inventions must be:Novel (New idea no one has had before). Useful (It is actually possible to use and it is useful to someone). Nonobvious (Inventive work involved).