CISSP Q v1.4 -- Domain 3 Flashcards
A data breach was discovered after a company’s usernames and password were posted to a hacker website. Afterwards, an analyst discovered the company stored credentials in plain text. Which of the following would help mitigate this type of breach in the future?
A. Create data loss controls that prevent documents from leaving the network.
B. Implement salting and hashing.
C. Configure the web content filter to block access to the forum.
D. Increase password complexity requirements.
B. Implement salting and hashing.
Passwords should not be stored in plain text!
We want to store passwords as hashed values, and salt them for extra security!
The hashing will protect us from insiders/hackers seeing the password, while the salt will make password cracking very difficult. The salt will also make rainbow tables useless!
(more salt related details in the slide notes)
Of the control type listed below, what would a mantrap (access control vestibule) be considered?
A. Preventative
B. Physical
C. Detective
D. Deterrent
B. Physical
A mantrap, access control vestibule, sally port, or air lock:
A physical security access control system comprising a small room with two sets of interlocking doors, such that the first set of doors must close before the second set opens. This mechanism seeks to eliminate the threat of piggybacking or tailgating.
There are three well-known TYPES of controls:
* Physical
* Technical/Logical
* Administrative/Management
(A), (C), and (D) are all CATEGORIES of control.
Given the following output on an attacker’s system:
Which of the following BEST describes the type of password attack the attacker is performing?
A. Dictionary
B. Pash-the-hash
C. Brute-force
D. Known plain text
A. Dictionary
A password that long was broken in a few minutes? Must be a dictionary attack; brute force attacks could take years to crack passwords of that length.
The components of this security model include subjects, objects, clearances, and who can have access to what. These components are related to which of the following security models?
A. The Bell-LaPadula Model
B. The Clark-Wilson Model
C. The Lipner Model
D. The Biba Model
A. The Bell-LaPadula Model- Confidentiality model
Biba is an integrity model, concerned with who can modify what. Clark Wilson does not discuss clearances, only integrity ideas. We can rule both of those out. With Bell-LaPadula (BLP) and Lipner remaining, BLP is the closest match to the description above. Lipner does have some element of BLP in it, but its still mostly defined by its integrity mechanisms and there is nothing integrity related in the question.
B. The Clark-Wilson Model - Integrity Model
C. The Lipner Model - Combination of Biba and Bell-Lapadula
D. The Biba Model - Integrity Model
Which of the following statements is true of Common Criteria’s Evaluation Assurance Levels (EALs)?
A. Common Criteria has 7 EALs against which a security product may be able to get certified.
B. Common Criteria has 7 EALs against which a security product maybe able to get accredited.
C. Common Criteria EALs can be used to cross-certify with the Information Technology Security Evaluation Criteria (ITSEC) ratings, but not the Trusted Computer System Evaluation Criteria (TCSEC) ratings.
D. Common Criteria EALs can be used to cross-certify with the Trusted Computer System Evaluation Criteria (TCSEC) ratings, but not the Information Technology Security Evaluation Criteria (ITSEC) ratings.
A. Common Criteria has 7 EALs against which a security product may be able to get certified.
A stream cipher works by using which of the following?
A. Bit-by-bit substitution with Exclusive Or (XOR) and a keystream
B. Confusion, diffusion, and permutation
C. Exclusive Or (XOR) and an initialization vector (IV)
D. An initialization vector (IV), the Temporal Key Integrity
Protocol (TKIP), and Wi-Fi Protected Access (WPA)
A. Bit-by-bit substitution with Exclusive Or (XOR) and a keystream
Stream ciphers should be used to protect data in transit.
Which cipher uses key words and numerous rows (traditionally 26), each one of which is offset by one?
A. The Rail/Fence cipher
B. The Running key cipher
C. The Vigenère cipher
D. The Vernam cipher
C. The Vigenère cipher
Answer (C) is correct. The RAIL fence only uses two rows. In the running key cipher, frequently used with the Vigenère cipher, text (typically from a book) is used to provide a very long keystream, ideally one as long as the message itself. Finally, the Vernam cipher, or One Time Pad (OTP) uses one time pads from a code book.
Upper management is looking to find a new cloud provider to host the company’s software as a service product. Considering the problems your organization had with the last provider, they instructed you to find a provider who has displayed good internal governance. What indicator should be used when looking for this new provider?
A. Maturity level
B. Risk identification
C. SOC reports
D. Loss history
A. Maturity level
Maturity levels (CMM) account for a better indication of governance, surpassing losses, audits, or the ability simply ID risk.
Which of the following is true with respect to the Operating System (OS) kernel?
- It loads and runs binary programs.
- It schedules task swapping
- It allocates memory and tracks the physical location of files on the computer’s hard disk.
- It must correctly manage input/output requests from software, andtranslate them into instructions for the Central Processing Unit (CPU).
A. 1 and 2
B. 2 and 3
C. 1, 2, and 3
D. 1, 2, 3, and 4
D. 1, 2, 3, and 4
The purpose of the kernel is described in Item 4, and the ways in which it achieves its purpose are described in 1, 2 and 3.
Which of the following allows two cooperating processes to transfer information in such a way that it violates the system’s security policy?
A. Partial disclosure
B. Full disclosure
C. Covert channel
D. Opensource
C. Covert channel
Answer (C) is correct, as it is the classic definition of what a covert channel achieves.
“A covert channel is a type of attack that creates a capability to transfer information objects between processes that are not supposed to be allowed to communicate by the computer security policy.”
A Certificate Authority (CA) will occasionally have to revoke a certificate it has published. How does the CA make this fact known to users who are trusting it to deliver reliable certificates?
A. The CA informs the RA and the RA sends this information to the CA’s membership.
B. The CA destroys its Digital Certificate Signing Key and creates a new one.
C. The CA informs the major browser vendors and they change their browsers so that they do not accept any Certificates signed by that version of the CA’s key.
D. The CA publishes a special list which includes details about revoked certificates.
D. The CA publishes a special list which includes details about revoked certificates.
The special list they are describing is known as the Certificate Revocation List (CRL).
What is the difference between a Registration Authority (RA) and a Certificate Authority (CA)?
A. An RA generates the user’s public/private key pair and saves the min the PKI database.
B. An RA verifies the user credentials, and the CA issues the digital certificate.
C. The CA generates the user’s public/private key pair and the RA generates the certificate.
D. The RA verifies the user credentials, and the CA generates the user’s public/private key pair.
B. An RA verifies the user credentials, and the CA issues the digital certificate.
At no point does an RA (the company) or the CA (a computer that makes certificates) generate the end users public/private key pair. This allows us to rule out everything except (B), which is 100% correct.
Which statement below BEST describes the difference between the Electronic Code Book (ECB) and the Counter (CTR) method of encryption?
A. ECB is a block cipher, whereas CTR does not stop errors from propagating.
B. ECB is a stream cipher, whereas CTR is a block cipher.
C. Encryption errors can propagate when ECB is used, but do not propagate when Counter is used.
D. ECB can only secure short messages, whereas CTR can secure long ones as well.
D. ECB can only secure short messages, whereas CTR can secure long ones as well.
Counter does not propagate errors, so Answer (A) is eliminated. Answer (B) has the cipher modes reversed, so it is incorrect. ECB does not propagate errors, so Answer (C) is eliminated.
Given the plain text word “rambo”, which of the following statements is correct?
A. A Caesar cipher for “rambo” would yield “abrmo.”
B. A collision occurs when two different cryptographic keys encrypt “rambo” and produce the same results.
C. A transposition cipher, with reorder sequence 53421 would yield “ombar.”
D. The SHA1 hash value for “rambo” would be exactly 16 bytes long.
C. A transposition cipher, with reorder sequence 53421 would yield “ombar.”
(A) Is incorrect. A Caesar cipher is a mono-alphabetic substitution cipher, where each letter in the plaintext is replaced by a letter a fixed number of positions down the alphabet. For example, D is rotated back by three to become A, and E would be rotated back three to become B, and so forth.
(B) Is incorrect. The term collision is tied to hashing and does not utilize keys. What they are describing in (B) is known as “Key Clustering”.
100
(D) Is incorrect. Sha1’s hash length/value is 20 bytes, aka 160 bits. Not 16 bytes.
Which of the following is correct?
A. An initialization vector (IV) is used to make sure that encryptions of important texts do not change each time they are encrypted.
B. Confusion refers to making the relationship between the cipher text and the key as complex as possible; diffusion refers to dissipating the statistical structure of the plaintext over the bulk of the cipher text.
C. Only one substitution and one permutation can occur in an SP- network.
D. The avalanche effect in an encryption algorithm means that the algorithm is resistant to small changes in the plaintext.
B. Confusion refers to making the relationship between the cipher text and the key as complex as possible; diffusion refers to dissipating the statistical structure of the plaintext over the bulk of the cipher text.
Answer (B) is correct. Claude Shannon first identified these two properties in his 1945 classified report, “A Mathematical Theory of Cryptography.” Answer (A) is incorrect; IVs are used to help ensure that text does completely change when encrypted. Answer (C) is wrong; SP networks use many rounds of both substitution and permutation. The AES cipher is an excellent example of this. Answer (D) is wrong, as with the avalanche effect, a small change in the text will produce a large change in the output.
Which statement BEST describes how the term “key space” affects “cryptanalysis”?
A. The larger the key space, the easier the cryptanalysis.
B. The key space doubles each time you add a bit to the key length, which makes cryptanalysis more difficult.
C. Cryptanalysis is designing algorithms, and key space means testing the keys to ensure they work properly.
D. Cryptanalysis is most often accomplished by systematically reducing the size of the keyspace.
B. The key space doubles each time you add a bit to the key length, which makes cryptanalysis more difficult.
(A) is the opposite of the truth. Similarly (C) is wrong, as Cryptography is about designing algorithms, and cryptanalysis is about breaking them. Finally, answer (D) is wrong, as it is not most often accomplished this way.
What are the key and block sizes for the AES algorithm?
A. Keys are 128 bits; blocks are 128 and 256 bits.
B. Keys are 128 bits, as are blocks.
C. Both keys and blocks can be 128, 192, and 256 bits.
D. Keys are 128, 192, and 256 bits and blocks are 128 bits.
D. Keys are 128, 192, and 256 bits and blocks are 128 bits.
Rjindael, the algorithm from which AES was derived, was able to use the range of block sizes described in Answer (C), but the NIST specification in 2001 for the new Advanced Encryption Standard specified a block size of 128 bits only. AES does allow 128, 192, and 256 bit keys, which eliminates Answers (A) and (B).
Which of the following contains BOTH a hashing and an asymmetric key algorithm?
A. DES and SHA2
B. SHA2 and MD5
C. MD5 and ECC
D. AES and ECC
C. MD5 and ECC
A. DES and SHA2 - Symmetric and Hashing
B. SHA2 and MD5 - Hashing and Hashing
C. MD5 and ECC - Hashing and Asymmetric
D. AES and ECC - Symmetric and Asymmetric
Which of the following is an attack against hashes?
A. Plain text Attack
B. Dictionary Attack
C. Stream cipher Attack
D. Cipher text attack
B. Dictionary Attack
Passwords are stored as hashes, and the only password attack listed is the Dictionary Attack. Other hashing attacks against passwords are the Birthday attack, the use of hash tables, and the use of rainbow tables. Answers (A) (C), and (D) are all attacks intended to find the key.
Which of the following is no longer a common and effective attack on wireless networks?
A. A Plaintext Attack
B. A Rainbow Table Attack
C. A Stream Cipher Attack
D. A Ciphertext Attack
C. A Stream Cipher Attack
Was, but is no longer” implies the use of WEP or WPA rather than WPA2, which was introduced in 2004. WEP and WPA used RC4, a stream cipher. Answers (A), (B) and (D) are all otherwise too broad.
The Simple Integrity Property provides what permission?
A. Read at the same level or at a higher level.
B. Write at the same level or at a lower level.
C. Read at the same level or at a lower level.
D. Write at the same level or at a higher level.
A. Read at the same level or at a higher level.
With integrity models you can
READ UP, but not DOWN.
WRITE DOWN, but not UP. (confidentiality models are the opposite)
The SIMPLE integrity property is a READ capability for the Biba model. This eliminates Answers (B) and (D) which concern the STAR property. In Biba, reading up is okay, but reading down is not, as you would thereby be accepting less accurate information. This eliminates Answer (C).
Which security model is designed to help ensure that high level activities (inputs) do not determine what low-level users can see (outputs)?
A. The Lattice model
B. The Information Flow model
C. The Clark-Wilson model
D. The Non-interference model
D. The Non-interference model
A non-interference model aims at a strict separation of differing security levels to ensure that higher-level activities don’t determine what lower-level users can see or gain access to.
(A) Lattice models allow for strict distinction between different levels and defines clear rules for interactions between them, such as Bell-LaPadula. (B) Information flow models focus on the ways in which information can flow or be exchanged within a system. (C) The Clark-Wilson model is an integrity model focused on ensuring well-formed transactions.
Originally there were three Cloud Service models (CSMs) and four Cloud Deployment models (CDMs). Which statement below has two original CSMs and two CDMs?
A. SaaS, IDaaS, Public, and Private
B. SaaS, PaaS, Community, and Hybrid
C. IaaS, PaaS, On-site and Off-site
D. Naas, CaaS, Hybrid, and Commercial
B. SaaS, PaaS, Community, and Hybrid
“on-site and off-site” are not deployment models.
Which fire prevention system does not hold water above the area it protects, contains multiple heat-sensing elements, and only begins to fill with water when the valve is triggered by excessive heat?
A. A Dry-Pipe System
B. A Deluge System
C. A Wet-Pipe System
D. A Pre-Action System
D. A Pre-Action System
A Dry-Pipe system only has one heat sensing element, which is the sprinkler head. Pre- Action systems, on the other hand, include both primary and secondary (supplemental) heat sensing elements. The supplemental sensor pre-fills the pipes before the primary sensor (the sprinkler head) triggers and sprays the water in the room