CISSP Exam Prep Questions, Answers & Explanations
CISSP Exam Prep Questions, Answers & Explanations
Exam Prep
Questions, Answers & Explanations
CISSP® Exam Prep
Questions, Answers & Explanations
© Copyright 2015 by SSI Logic. Printed and bound in the United States of America.
All rights reserved. No part of this book may be reproduced or transmitted in any
form or by any means, electronic or mechanical, or incorporated into any
information retrieval system, electronic or mechanical, without the written
permission of the copyright owner. Fifth Edition.
Although the author and publisher of this work have made every effort to ensure
accuracy and completeness of content entered in this book, we assume no
responsibility for errors, inaccuracies, omissions, or inconsistencies included
herein. Any similarities of people, places, or organizations are completely
unintentional.
ISBN-10: 0982576846
ISBN-13: 978-0982576847
Welcome
CISSP Exam Overview
Additional Resources
Thank you for selecting SSI Logic’s CISSP® Exam Prep – Questions, Answers, and
Explanations for your CISSP study needs. The goal of this book is to provide
condensed mock exams and practice tests which allow you to become comfortable
with the pace, subject matter, and difficulty of the Certified Information Systems
Security Professional (CISSP) certification exam.
The content in this book is designed to optimize the time you spend studying in
multiple ways.
2. Passing score requirements in this book are slightly higher than the real exam;
allowing you to naturally adjust to a higher test score requirement.
3. Practice exams included in this book cover the entire scope of the CISSP exam,
while shorter quizzes focus only on specific CISSP Common Body of
Knowledge (CBK) Domains.
The practice exam content in this book is structured into two general types of exam
preparation:
• “Lite” Mock Exams, which allow you to test your knowledge across
condensed versions of the CISSP exam; designed to be completed within one
hour.
• Domain Area Quizzes, which reflect brief practice tests focused on specific
CBK® Domain Areas; designed to be completed in 15 to 30 minutes,
depending on the exercise.
We wish you the best of luck in your pursuit to become a certified CISSP.
CISSP® Exam Overview
The CISSP practice questions in this book reflect the Domain areas presented in the
official CISSP Common Body of Knowledge (CBK).
As of March 2015, the CISSP certification has been acquired by more than 98,000
individuals worldwide. The CISSP certification is a globally recognized credential,
with individuals certified in more than 130 countries. On average, salaries
associated with CISSP certified professionals are consistently ranked high among
the IT industry, with an average salary of $98,986 per year.
The CISSP exam is designed to objectively assess and measure Information Security
knowledge. Concepts covered in the CISSP exam are directly derived from the eight
domains of the CISSP Common Body of Knowledge (CBK).
The actual CISSP exam is offered via computer based testing (CBT), in addition to
proctored, paper-based exams. A summary of the exam structure and passing
requirements are as follows:
• There are 250 total multiple choice questions which make up the CISSP exam
• Individuals have 6 hours to complete the exam
• The passing grade required is a scaled score of 700 out of a possible 1000
points
The eight CBK® Domains covered by the CISSP exam are listed below.
Test Description
This is a cumulative CISSP Mock Exam which used as a baseline score for your
CISSP aptitude. This practice test includes questions from all eight domains of the
CISSP CBK.
Test Questions
A. A script test
B. An ICE test
C. A self-test
D. An EICAR test
A. Administrator hook
B. Database program
C. Security bypasser
D. Maintenance hook
B. Agile methodology
C. Division of labor
D. Separation of duties
5. A user logged into an online banking system using a secure connection and
performed certain online transactions. She left her desk for about 5 minutes and
then returned to continue a transaction on the online banking system. At this
time, the online banking system required her to login again. Which of the
following is a reason this could happen?
A. All secure connections are setup such that they timeout automatically after 5
minutes. Hence it is important to ensure that a periodic refresh is done every
5 minutes so that the web server doesn't log the user out.
B. When a web session is idle for a period of time, the internet connection gets
timed out. Hence the user needs to login again into the online banking
system.
C. This is most likely a bug in the online banking software and the user needs
to register a formal complaint.
D. When a web session is idle for a specified period of time, the connection is
closed out since the web server does not receive a cookie from the session.
The cookie has a timestamp and as a result the session gets timed out.
A. Ampere
B. Tropic
C. Tempest
D. Faraday
7. Although the terms event and incident are often used interchangeably, they are
different. Which of the following statements is incorrect in this context?
10. A bank is planning to implement a security model which allows for dynamic
changing of access controls to prevent conflict of interest. Which of the
following would fit this requirement?
D. Biba model
11. Two sets of computers are communicating with each other. One set of
computers uses session keys while the other set of computers uses static
symmetric keys. Which of the two is preferable to provide better protection?
A. Static symmetric keys provide better protection than session keys since they
are valid only for one session.
B. Both session keys and static symmetric keys provide equal protection since
they are valid only for multiple sessions.
C. Session keys provide better protection than static symmetric keys since they
are valid only for one session.
D. Both session keys and static symmetric keys provide equal protection since
they are valid only for one session.
12. Which of the following types of plans establishes personnel safety and
evacuation procedures?
C. IT contingency plan
13. Lighting in buildings is often controlled such that lights in different parts of the
building turn on and off at different times. This gives potential intruders the
impression that there are people at work in different parts of the building. What
is this called?
A. Bypass lighting
B. Standby lighting
C. Standoff lighting
D. Controlled lighting
14. Which of the following proxy firewalls does not operate at the networking
layer of the OSI model?
A. Stateless proxy
B. Packet filtering
C. Stateful proxy
D. Kernel proxy
B. Clustering helps in load balancing where each system takes a part of the
processing load.
C. Clustering provides failover such that other systems continue to work if one
fails.
16. A vandal stole a hardcopy of a list of credit card numbers and typed these into a
spreadsheet on his computer. However, he was arrested by the police and his
computer was seized. What category of computer crime law would apply?
B. Computer-induced crime
C. Computer-assisted crime
D. Computer-targeted crime
17. A frame relay is a WAN solution that allows multiple companies and networks
to share a WAN media. In this context, what is the equipment used at the
company-end (such as a router or a switch) called?
A. Decryption
B. Reverse analysis
D. Reverse engineering
19. Which of the following represents the correct sequence of activities in the event
of a disaster?
B. Futuristic assessment
B. Every week
C. Every month
22. A company decided to use combination locks on the doors of its data
processing center. Once the combination has been set, what is the usual
guideline followed to change it?
A. Every year and when an employee who knows the code leaves the company
B. Every month
C. Every week and when an employee who knows the code leaves the company
D. Every six months and when an employee who knows the code leaves the
company
23. At a generic level, evidence of a crime needs to be relevant to the case at hand
and meet the criteria of the five rules of evidence. These rules states that:
24. A security officer would like to ensure that an early warning is received in case
a fire breaks out. The early warning can then be used to sound a warning alarm
to start off evacuation procedures. Which of these may be used as an early-
warning device?
A. Smoke-activated detectors
B. Fire suppressors
C. Heat-activated detectors
D. Fixed-temperature sensors
25. Which of these is not a best practice for physical security in organizations?
C. Force all guests to go to a front desk and sign in before entering a facility
A. Give the employee a month's notice, disable his accounts at the end of 30
days, and have a security guard escort the employee out of the facility after
the necessary exit formalities have been completed.
B. Disable the employee's accounts right away and have a security guard escort
the employee out of the facility after the necessary exit formalities have been
completed.
C. Give the employee a week's notice, disable his accounts at the end of 7 days,
and have a security guard escort the employee out of the facility after the
necessary exit formalities have been completed.
D. Give the employee a day's notice, disable his accounts at the end of the day,
and have a security guard escort the employee out of the facility after the
necessary exit formalities have been completed.
27. Privacy is a serious issue as the world relies more and more on technology and
the user of computers / digital information. What law protects US citizens'
sensitive information collected by government agencies?
C. HIPAA
28. Companies normally have an acceptable use policy which indicates what
software users can install. What type of controls should be put in place to
prevent unauthorized users from being able to install unauthorized software?
A. Physical controls
B. Administrative controls
C. Hardware controls
D. Technical controls
B. Static mapping
A. Include all employees in the most critical operations as part of its first
exercise.
D. Include only a small group of people as part of its first test exercise.
A. ISO 31000
B. ISO 14001
C. ISO 9000
D. ISO/IEC 27001
35. A company recognized the need to have a business continuity plan in place.
Which of the following guidelines will help the company in this process?
A. NIST 900-34
B. ISO 9000:34
C. ISO 800-34
D. NIST 800-34
36. In which type of operating system do all of the operating system's functionality
work in ring 0 and in privileged or supervisory mode?
B. Virtual machines
37. Critical data needs to be protected from accidental or malicious changes. Such
data needs to be accessed through properly formatted requests. Which of the
following concepts does not use such a methodology?
A. Polymorphism
B. Protection domains
C. Data hiding
D. Layering
A. HAVAL
B. Message digest
C. Checksums
D. Diffie-Hellmann algorithm
39. A company had sensitive data stored in a database. It wanted to ensure that
certain data was not available to lower-level users. The company created a table
containing multiple tuples with the same primary keys and each instance was
distinguished by a security level. The data for the lower-levels was changed to
some arbitrary values. Hence, lower-level users who accessed the data received
a fake view of the data. What is this called?
A. Views
B. Polymorphism
C. Multi-tuple security
D. Polyinstantiation
5. D - Online banking software uses secure connections. They use cookies with
timestamps on them and the web server periodically requests the cookie to
ensure that the session has not been hijacked. When the system is inactive for a
period of time, the web server does not receive the cookie when it requests for
it. Hence it times out the user's session and requires a re-login. [Asset Security]
8. B - The next step in the process would be to monitor and evaluate the program.
This would include reviewing logs, audit results, and service level agreements.
This would also include development of improvements to the program.
[Security and Risk Management]
10. A - The Brewer and Nash model allows access controls that can change
dynamically depending on the actions of a user. It ensures that conflict of
interest is protected. [Security Engineering]
11. C - Session keys provide better protection than static symmetric keys since they
are valid only for one session. Hence if an attacker were to capture a session
key it would no longer be valid for the next session and the window of
opportunity available to the attacker is very limited. [Asset Security]
12. D - Organizations usually have various types of recovery plans. The Occupant
emergency plan specifically establishes personnel safety and evacuation
procedures. As a general principle, human life is given the highest priority in
the event of a disaster. [Security and Risk Management]
14. D - In a kernel proxy firewall, all the inspection and processing takes place in
the kernel and does not need to be passed up to a higher software layer for
processing. The other three firewall proxies work in the network layer.
[Communications and Network Security]
15. D - Clustering offers good scalability since a group of servers can be viewed
logically as a single server to users and can be managed as a single logical
system. [Security Operations]
17. A - The equipment used at the company's end is called Data Terminal
Equipment (DTE). It could be a router or a switch and provides connectivity
between the company's own network and the frame relay network. DCE is the
equipment used by the service provider. [Communications and Network
Security]
19. C - Once a disaster strikes, Interim operations kick in. These include emergency
responses and situational assessments. This is then followed by alternate
operations during which recovery and restoration operations are performed.
This then allows the company to recover back to normal operations. [Security
and Risk Management]
20. B - Futuristic assessment is not a specific type of threat assessment. The other
three are valid types of threat assessments and cover a large number of areas
such as loss of key personnel, physical control weaknesses, emergency plan
assessment, telecommunications availability, continuity planning etc. [Security
and Risk Management]
21. D - The necessary level of security required and the frequency of use of a
cryptographic key determine how often the key should be changed. For
example, a small retail store may only change its keys once a month whereas a
military establishment may change them every day. [Asset Security]
22. D - The combinations need to be changed at least every six months. Changing
them every week may be too much of an overhead. Additionally they also need
to be changed whenever an employee who know the combination leaves the
company. [Security Operations]
23. B - At a generic level, evidence in a computer crime needs to be relevant to the
case at hand. The five rules of evidence are that it should be authentic, accurate,
complete, convincing and admissible. [Security and Risk Management]
25. B - Having trees very close to a facility may be a security hazard since they will
enable intruders to gain access to upper-story windows / balconies / skylights.
This needs to be balanced with the objective of concealing a facility. [Security
Operations]
26. B - Although it may seem harsh to do so, it is best to ensure that the termination
happens quickly and in such a manner that the disgruntled employee cannot
cause any harm prior to his/her exit. The company's HR policies will dictate the
actual procedure but in case of disgruntled employees, their accounts / accesses
should be disabled right away and they should be escorted out of the facility by
security guards or supervisor after complying with necessary exit formalities.
[Security and Risk Management]
27. D - The Federal privacy act protects US citizens' sensitive information that is
collected by government agencies. It states that data must be collected in a fair
and lawful manner. The data must be held for a reasonable amount of time and
used only for the purpose for which it was collected. [Security and Risk
Management]
28. D - Technical controls need to be in place to ensure that unauthorized users are
not able to install unauthorized software in the environment. These consist of
password and resource management, identification and authentication methods,
configuration of the infrastructure etc. [Security Operations]
31. D - Once written plans have been developed, they need to be tested for specific
weaknesses. Companies cannot afford to have any impact to normal operations.
Hence the tests should be carried using a small group of people from various
departments until each learns his / her responsibility. Testing on all employees
may actually disrupt operations as also may testing on the most critical
department. On the other hand testing on the least critical department may not
yield useful results. [Security and Risk Management]
33. A - A hidden data element (HDE) is not one of the items defined by the Clark-
Wilson model. The other three are defined by the model. Additionally, an
unconstrained data item is used to define data not controlled by the Clark-
Wilson model. [Security Engineering]
34. D - ISO / IEC 27001 specifies the requirements for establishing, implementing,
operating, monitoring, reviewing, maintaining and improving a documented
information security management system.
ISO 9001 deals with quality management, ISO 14001 deals with environment
management and ISO 31000 deals with risk management. [Security and Risk
Management]
35. D - The National Institute of Standards and Technology (NIST) has put together
a set of best practices and documented them as a series of steps in the NIST 800-
34 document. Although this specifically deals with IT contingency plans, the
steps are the same while creating enterprise-wide BCPs. [Security and Risk
Management]
36. C - In a monolithic operating system, all of the kernel's activity takes place in
privileged or supervisory mode. Hence, all the functionality is in ring 0. This
improves performance but causes a security risk since more code runs in
privileged mode and can be exploited by attackers. [Security Engineering]
37. A - Data hiding, layering and protection domains are different terms used to
describe the same concept. The methodology used by them is that the secure
data cannot be accessed except via a set of properly formatted requests sent to
system APIs. Polymorphism is not used in this context. [Security Engineering]
38. C - Checksums are simple error detecting codes and are used in symmetric key
cryptography to ensure message integrity. The checksum is created and
appended to a message. The receiver will decrypt the message and generate
their own checksum to verify the integrity of the message. [Asset Security]
39. D - This is known as polyinstantiation and is used for very sensitive data. A
simpler strategy would be to simply deny access when a lower-level user
accesses a higher-level object. However, this indirectly gives the lower-level
user information that sensitive data exists at that level. Polyinstantiation
overcomes this issue. [Software Development Security]
40. D - The ordered database management model is not a valid one. The other three
choices are valid. Of the three types, the hierarchical database model is the
oldest. [Software Development Security]
CISSP Mock Exam (LITE) - 1
Practice Questions
Test Description
This is a cumulative CISSP Mock Exam which can be used as a benchmark for your
CISSP aptitude. This practice test includes questions from all eight domains of the
CISSP CBK.
Test Questions
1. An Internet Service Provider adds a large generator and battery bank to its
infrastructure. Which of the following needs to be added to the list of
operational procedures?
A. A requirement
B. A start-up
C. A guideline
D. A baseline
3. Although less common today, phreakers are special class of hackers who
manipulate telephone systems to receive free services. Which of the following
is NOT used by phreakers?
A. Red Box
B. Blue Box
C. Black Box
D. Teal Box
4. A lawyer serves notice on a business entity for a civil wrong against a business
entity that he represents. This would be dealt with under:
A. Criminal law
B. Administrative law
C. Tort law
D. Cyber Law
5. The most important goal for the results of any computer forensics should be
which of the following?
A. Equipment Redeployment
C. Admissibility in Court
6. A company uses asymmetric cryptography and a public key system. The private
key will be known only to the company while the public key will be known to
everyone. In such a public key system:
A. Only the public key can be used to encrypt data but the data can be decrypted
with either the private or public keys
B. Both the public key and the private key can be used to encrypt and decrypt
data. Data encrypted with the private key can be decrypted with either the
private or public keys.
C. Both the public key and the private key can be used to encrypt and decrypt
data. Data encrypted with the private key requires the public key to be
decrypted.
D. Only the public key can be used to encrypt data and the private key is
required to decrypt it.
A. Malicious threats
B. Accidental threats
C. Environmental threats
D. External threats
B. Redacted Printouts
A. Viruses
B. Spyware
C. Rootkits
D. Backdoors
11. The AIC triad is made up of three main principles of information security:
availability, integrity and confidentiality. Which of the following threats can
compromise availability?
A. Password leak
B. Social engineering
C. Dumpster diving
D. Denial-of-Service attack
12. While setting up measures for handling fire hazards, you are concerned that
activation of sprinklers, immediately following the detection of a fire may
interfere with evacuation activities. Which of the following may be a good
option to pursue in such a case?
A. Use of a low-pressure sprinkler system
13. John is a web developer. What would be the best way for him to connect to a
database without exposing its physical location and passwords used to connect
to it?
14. A fire broke out due to a leak in the diesel tank of a back-up power generator.
Which of the following should not be used to put out such a fire?
A. Carbon di-oxide
B. Water
C. Monoammonimum phosphate
D. Sodium bi-carbonate
15. Which of the following is the cause of most information breaches in email?
A. System errors
B. Spam
D. Intentional abuse
16. What classification of gate is designed to secure an industrial yard where only
authorized individuals are permitted entry and which is not expected to serve
the general public?
A. Class I
B. Class IV
C. Class II
D. Class III
17. When two different keys generate the same output for the same message, what
is it called?
A. Wardialing
B. Polyinstantiation
C. Collision
D. D. CORBA
18. Ray wants to ensure that a message he sends to Ron is not altered in any way. He
encrypts the message's value and includes it with his message (he does this by
digitally signing his message). What does Ron have to do to ensure the message
came from Ray?
A. Ron needs to perform the hashing function on the message and come up
with a hash value. Ron will then decrypt the hash value sent in the message
using Ray's public key and compare with the hash value he obtained. If they
are the same, it indicates the message was not altered.
B. Ron needs to perform the hashing function on the message and come up
with a hash value. Ron will then decrypt the hash value sent in the message
using Ray's private key and compare with the hash value he obtained. If they
are the same, it indicates the message was not altered.
C. Ron needs to perform the hashing function on the message and come up
with a hash value. Ron will then decrypt the hash value sent in the message
using his public key and compare with the hash value he obtained. If they are
the same, it indicates the message was not altered.
D. Ron needs to perform the hashing function on the message and come up
with a hash value. Ron will then decrypt the hash value sent in the message
using his private key and compare with the hash value he obtained. If they
are the same, it indicates the message was not altered.
19. Karen is in charge of her company's Internet security. She decides to implement
a fake DMZ that hosts a specialized server. This server holds no data, but
answers any scan or hack attempt with positive results. The purpose is to trick
an attacker into wasting enough time on this system so that detection
possibilities are increased. This type of system is commonly known as:
A. Honeypot
B. Hobgoblin
C. Spamtrap
D. Pitfall
20. During a security audit, an external auditor finds several unlocked electrical
panels in common areas. She writes this up as a potential security issue. Which
of the following groups of people is most likely to cause a potential security
hazard by taking advantage of the unsecured panels?
A. Auditors
B. Hackers
C. Administrators
D. Disgruntled Employees
21. Which of the following teams is responsible for starting recovery of the
original site in the aftermath of a disaster?
A. Restoration team
B. Backup team
C. Assessment team
D. Salvage team
22. Because of the size of Alex's company, it has been decided that rotation of
duties is not practical. Which of the following is another good way to detect
fraudulent activity?
B. Wire Sniffers
C. Mandatory Vacations
D. Video Surveillance
23. What type of virus infects both the boot sector and executable files?
A. Polymorphic
B. Self-garbling
C. Multipart
D. Meme
A. Immunization
B. Heuristic detection
C. Signature-based detection
D. Fingerprint detection
25. Which of the following options best describes mature procedures and
processes?
A. Well-documented
B. Well-known
C. Ad-Hoc
D. Obsolete
26. A systems analyst designs an access control software application such that the
authentication and authorization processes are independent ones that happen
sequentially. Which of the following vulnerabilities can a hacker use to break
into such a system?
A. Code jam
C. Two-factor authentication
D. Race condition
C. Use of SSL
B. A hub
C. A repeater
D. A bridge
29. Two mechanisms by which malicious code may be detected are via
___________ for known viruses and ___________ for unknown viruses.
D. Signatures / Heuristics
30. Intrusion detection systems are used to determine if attacks are occurring on a
network. You have been asked to implement an intrusion detection system that
uses predefined knowledge about attacks to determine if an attack is occurring.
Which one of the following would you consider?
31. Which of the following physical security controls are preventative rather than
detective?
A. Guard Dogs
B. Logging
C. Motion Sensors
D. Padlocks
A. Safety-Deposit Box
B. 24-bit Encryption
C. Software Escrow
D. Non-Disclosure Agreement
A. Use a SAN.
B. Use RAIT
C. Use RAID
D. Use RAIL
34. Data leakage can cause huge losses to the company depending on the criticality
of the data. Companies can look at publicly available data to understand the
channels from which data is lost and plug potential security loopholes. Which
of the following are the top two (in that order) causes for loss of data?
A. Internet, Emails
C. Emails, Internet
D. Mobile devices, Internet
36. Due to recent security breaches, the security administrator of a large financial
institution has mandated that all critical data infrastructure be secured by three-
factor authentication. Which of the following choices best meets the
requirement?
37. A company uses a particular combination of a word, name, shape, color, sound,
symbol as their corporate “signature.” These are registered to prevent copying
by others. What is this known as?
A. Copyright
B. Trademark
C. Trade Secret
D. Corporation
38. Which type of attack introduces fake packets into the data stream so that the
session can be hijacked?
A. Sniffer Attack
C. DNS Poisoning
39. Company guidelines have required you to use a biometric system as one of the
authentication methods. You are okay with a situation where authorized users
are rejected, but would like to ensure that the system rejects unauthorized users
to a high degree of accuracy. Which of the following error rates are you more
likely to prefer?
A. Revisioning
B. Authorization
C. Authentication
D. Provisioning
CISSP Mock Exam (LITE) - 1
Answer Key and Explanations
3. D - A blue box simulates a particular calling tone, enabling the theft of long-
distance service. A red box simulates the alert tones of coins being deposited
into a pay phone. A black box manipulates line voltage to enable toll-free
calling. [Security and Risk Management]
5. C - A clear chain-of-custody and excellent forensic methods are the end goal.
Poor forensics will destroy the best evidence in a criminal case. [Security and
Risk Management]
8. D - Low humidity conditions are conducive for static electricity which can
damage computer equipment. On the other hand, high humidity causes
corrosion. Hence the humidity needs to be optimally controlled. [Security
Operations]
A - A database view is a custom subset of data based upon a query. It is easy and
9. effective because it runs against live data and only returns selected data sets. All
of the other options require significant effort and expense. [Software
Development Security]
11. D - A DoS attack attempts to disrupt or totally disable client access to one or
more systems. This results in systems not being available. The other three
options listed may impact integrity / confidentiality. [Security and Risk
Management]
12. B - A dry pipe system may be used in such a case. Typically, the valve which
needs to be activated by the smoke/fire sensor is activated in a delayed manner.
The delay allows evacuation activities to take place without interference due to
the sprinklers. [Security Operations]
13. C - A Data Source Name (DSN) is a logical name for the data store and does not
use the drive letter or directory location of the database. This can be used when
programming using Open Database Connectivity interface (ODBC). [Software
Development Security]
14. B - A fire due to a diesel leak is classified as a class B fire, which includes fires
due to petroleum products and coolants. Water should not be used in trying to
put out such a fire. [Security Operations]
15. C - A long chain of forwards is often the culprit when private information is
breached. An email, with private information, circulated between departments
internal to the organization, could get forwarded to an external party without
the entire contents of the message being checked. This then results in loss of
private information. [Security and Risk Management]
16. D - A gate is the movable part of a barrier that is designed to control physical
access. There are four main classifications for vehicular gates. A Class III gate
is designated for industrial usage, and is not intended to be accessed by the
general public. [Security Operations]
17. C - A good hash function should never produce identical hash values. Doing so
is called a collision. Collision is the basis of hash cracking techniques. [Asset
Security]
18. A - A hash value that was encrypted with a sender's private key is called a digital
signature. Since Ray has encrypted the hash value with his private key, Ron will
have to decrypt the message with Ray's public key and compare it to the hash
value that he got when he performed the hashing function on the message.
[Asset Security]
19. A - A honeypot is a system that attempts to lure attackers away from real
information and data assets. Multiple honeypots can act together and it would be
called a honeynet. [Communications and Network Security]
21. D - The salvage team is responsible for starting work on the recovery of the
original site. This team (like a restoration team) needs to know how to do many
tasks such as installing operating systems, handling wiring requirements,
setting up workstations, servers etc. [Security and Risk Management]
23. C - A multipart virus first finds its way into system memory, and then infects the
boot sector of the hard drive. It then infects the entire system. [Security and Risk
Management]
24. B - A proactive technique that can detect malware is called Heuristic detection.
This is in contrast to signature-based detection (fingerprint detection), which
can not do this. [Software Development Security]
26. D - A race condition is a situation where two or more processes use a shared
resource and perform their operations in an incorrect order due to non-
availability of the resource. If authentication and authorization are split as
separate functions, there is a possibility that an attacker uses a race condition to
have the authorization step completed before authentication. This will allow
access into the system. [Identity and Access Management]
27. B - A replay attack involves an attacker grabbing traffic from a valid, legitimate
session, and then 'replaying' it, giving the impression that it is valid traffic, and
authenticating his session. The counter to this is to use some mechanism of a
time-based (or timestamp) validation so that the information grabbed by the
attacker is no longer “current”. [Software Development Security]
32. C - A Software Escrow is a third party who is entrusted with the final source
code as a protection to both the development entity and the purchasing entity.
No other choice offers a complete solution. [Software Development Security]
33. A - A Storage Area Network (SAN) is used in large-sized companies that need
to handle large volumes of data. SANs provide the necessary redundancy and
fault-tolerance apart from being extremely reliable. RAID and RAIT cannot be
used for such a requirement. [Security Operations]
34. D - A survey of various types of data leaks has revealed that mobile devices
head the list, followed by the Internet as the single largest causes. [Security
Operations]
35. C - A system that offers the best functionality and ease of use is one that usually
has little security in place. In contrast a completely secure system is one that
almost none can use. In practice, a trade-off is achieved between the two
extremes, based on what is acceptable. [Software Development Security]
39. D - A Type I error occurs when authorized users are rejected by the biometric
system whereas Type II errors occur when unauthorized users are accepted by
the system. In an ideal scenario, both types of errors should tend to zero. Since
the intent is to have a highly secure system even at the cost of higher Type I
errors, the correct answer is 25% Type I errors and 1% Type II errors. [Identity
and Access Management]
Test Description
This practice test specifically targets your knowledge of the Security and Risk
Management domain area.
Test Questions
A. Standards
B. Baselines
C. Practices
D. Policies
3. Which of the following terms refers to a security hole that could result in an
attack on a system?
A. Risk
B. Exposure
C. Threat
D. Vulnerability
4. Before Joan can begin work at her new job, she must undergo a Criminal
Background Check and participate in Security Awareness Training. What type
of control are these preventative measures?
A. Technical Controls
B. Administrative Controls
C. Physical Controls
D. Resident Controls
5. After risks are mitigated, what is the amount of risk remaining called?
C. Residual Risk
D. Exposure Factor
7. Senior management plans to implement a security policy that outlines what can
and cannot be done with employees' e-mail for monitoring purposes and to
address privacy issues. What would such a security policy be called?
A. Advisory
B. Issue-specific
C. System-specific
D. Organizational
A. Risk
B. Exposure
C. Vulnerability
D. Loss
9. Which of the following contains general approaches that also provide the
necessary flexibility in the event of unforeseen circumstances?
A. Policies
B. Standards
C. Procedures
D. Guidelines
10. Non-enforced password management on servers and workstations would be
defined as a:
A. Risk
B. Threat Agent
C. Vulnerability
D. Threat
B. Classify only data that is digital in nature and exists on the company servers.
C. Classify all data irrespective of the format it exists in (paper, digital, audio,
video)
D. Classify only data that is digital in nature and exists on the company servers,
desktops and all computers in the company.
12. In a secure network, personnel play a key role in the maintenance and
promotion of security procedures. Which of the following roles is responsible
for ensuring that the company complies with software license agreements?
A. Product-line manager
B. Process owner
C. Solution provider
D. Data analyst
13. Once risk assessment of a company is performed, threats and vulnerabilities are
identified and the total / residual risk is determined. Which of the following is
not one of the ways in which risk is handled?
A. Risk Inference
B. Risk Mitigation
C. Risk Acceptance
D. Risk Avoidance
14. Steve is doing risk analysis as part of his company's Information Risk
Management. He ends up with a calculation that the annualized loss expectancy
(ALE) due to a virus attack on the company's network is $ 25000. He also
calculates that the single loss expectancy (SLE) due to this event would be $
25000. What can you say about the annualized rate of occurrence (ARO)?
15. Which of the following statements is not true with respect to the relationships
between threat, vulnerability, exposure, countermeasure and risk?
1. C - A quantitative risk analysis calculates the ALE, which is the annual loss of
an asset if expected threats are realized. This value allows the company to
evaluate the financial implications of potential threats. ALE is calculated as the
product of Single Life Expectancy (SLE) and the Frequency per year, also
known as Annual Rate of Occurrence (ARO). [Security and Risk Management]
11. C - It might appear that one only needs to classify “digital data”. However, all
data needs to be classified, irrespective of the format in which it exists.
[Security and Risk Management]
12. A - Product-line managers are responsible for ensuring that license agreements
are complied with. They are also responsible for translating business objectives
and specifications for the developer of a product or solution. [Security and Risk
Management]
13. A - Risk Inference is not a valid way to handle Risk. Risks are usually dealt with
in four ways - risk mitigation, risk avoidance, risk transference and risk
acceptance. [Security and Risk Management]
14. D - The annualized loss expectancy is obtained by the product of the single loss
expectancy and the annualized rate of occurrence. In this instance, the ALE
equals the SLE, hence the ARO equals 1.0 [Security and Risk Management]
Test Description
This is a cumulative CISSP Mock Exam which can be used as a benchmark for your
CISSP aptitude. This practice test includes questions from all eight domains of the
CISSP CBK.
Test Questions
1. Which of the following choices is an easy and less expensive way to improve
physical security?
A. Surveillance Cameras
B. Man Traps
C. Bunkering
D. Additional Lighting
A. ARP / DNS
B. ARP / RARP
C. RARP / DNS
D. DNS / ARP
A. IMAP4
B. X.400
C. SMTP
D. POP3
C. HTTPS is the same as S-HTTP and both protect the communication channel
between two computers.
C. The realm key used for initial trusted communications is easily hacked.
7. Which of the following locations would be the least useful in keeping a copy of
a business continuity and disaster recovery plan?
A. An offsite location.
B. A backup location.
8. Data on a server has been compromised due to a hack into the system. A
forensic investigator needs to copy the data on a hard disk on the server. Which
of these will be the first step to be performed as part of the process?
A. Use a file copy method to make sure that all files (including hidden and
system files) are copied.
D. Ensure that the new media into which the hard disk is being copied is
properly purged.
10. A company has implemented an HTTP/HTTPS proxy server for the purpose of
filtering World Wide Web content. Administrators place the proxy server so
that it physically resides on the local area network. They assign it an IP address
and the internal interface of the border firewall is then configured to only
accept port 80/443 requests from the IP address. What is this an example of?
A. AD
B. DAC
C. ACL
D. RBAC
11. When an attacker is considering attacking a networked target, what is the first
thing he or she does?
B. Hijack a session
D. A port scan
B. Vulnerability
C. Exploit
D. Worm
13. Samantha works for an accounting firm with the responsibility of traveling to
client sites to assist in SOX compliance checking. Which of the following
accurately describes this work?
A. External Audit
D. Internal Audit
B. External Audit
C. Internal Audit
15. Senior management plans to implement a security policy that outlines what can
and cannot be done with employees' e-mail for monitoring purposes and to
address privacy issues. What would such a security policy be called?
A. Advisory
B. Issue-specific
C. Organizational
D. System-specific
16. A hospital is setting up a Magnetic Resonance Imaging (MRI) center. You are
called in to advise the hospital during the planning phase. Which type of cabling
would you advise the hospital to use for this center, given that cost is not a
major concern?
A. UTP
B. Fiber-optic cabling
C. Copper cables
D. STP
17. Concurrency issues within a database due to improper table locking can cause
tables to be over-written with stale information. What sort of an issue is this?
A. Confidentiality
B. Relativity
C. Availability
D. Integrity
18. Which of the following mechanisms ensures the integrity of data held within a
database?
A. Multi-level commit
B. Four-phase commit
C. Single-phase commit
D. Two-phase commit
19. What kind of a policy would a large organization typically enforce during a 15-
day period prior to New Year's day?
A. Apply a restriction on emails and ensure that no executable file attachments
are allowed entry or exit the company.
C. Regulate all email traffic and apply a restriction on the kinds of attachments
that can be allowed via email.
20. Evaluation Assurance Levels (EALs) are assigned under the Common Criteria
Model, and give an indication of the thoroughness of testing. A formally
verified system design would be classified as:
A. EAL5
B. EAL7
C. EAL1
D. EAL6
A. Cables that are not in use should be disconnected from networking devices.
22. The process by which the credentials of one entity is established to another
utilizing credentials such as passwords, one-time tokens, or PIN numbers is
known as:
A. Authentication
B. Accountability
C. Administration
D. Authorization
23. A key logger and remote admin tool was used to harvest passwords and the
digital signature of a senior officer of a brokerage firm. Several orders to sell
were then issued without approval, all signed by the firm's digital signature.
What basic goal of cryptosystems has been compromised?
A. Secrecy
B. Integrity
C. Confidentiality
D. Authenticity
24. The process of granting privileges to an entity based upon the time of day,
group membership, network address, or verification of its credentials is known
as:
A. Authorization
B. Administration
C. Authentication
D. Accounting
25. An important tool used in risk management is risk analysis. Which statement
about risk analysis is not true?
27. This early security model was constructed mainly for the purpose of preserving
the confidentiality of data. It is characterized by the concepts of “cannot read
up” and “cannot write down”. Which of the following security models does this
most likely refer to?
A. Bell-LaPadula Model
B. Clark-Wilson Model
D. Biba Model
28. Biometric devices are among the most accurate and secure methods of
authentication available. However, some users find them obtrusive and are
therefore reluctant to use them. What biometric recognition system is the most
widely accepted and implemented?
D. Fingerprint based
29. If asked to select a fast and relatively unbreakable algorithm amongst the
choices of DES, Double DES, Blowfish and Triple DES, which one would you
choose?
A. DES
B. Blowfish
C. Triple DES
D. Double DES
30. This security model was developed to prevent potential conflicts of interest. It
employs dynamic access controls that change depending on a subject's access
history. Which of the following security models does this describe?
A. Biba Model
C. Clark-Wilson Model
D. Bell-LaPadula Model
31. When a graph of the error rate in a biometric system is plotted against its
sensitivity, the point where the false accept rate intersects the false reject rate
curve is known as:
A. DMZ
B. FRR
C. CER
D. FAR
32. You are currently doing a comprehensive technical evaluation on the security
components within your organization. What does this refer to?
A. Affirmation
B. Accreditation
C. Hallmark
D. Certification
A. Accreditation, Authorization
B. Certification, Accreditation
C. Auditing, Authorization
D. Auditing, Certification
34. Which of the following is not part of the current state assessment phase for
BCP/DRP?
C. Threat analysis
35. What type of iris lens would typically be used in an area that has fixed lighting?
A. Manual
B. Annuciator
C. Automatic
D. Charged-coupled
37. A company encrypts a file with AES encryption. It is sent to the intended
recipient via email with the password in the body of the message. If the email is
intercepted, which basic goal of a cryptosystem has been compromised?
A. Nonrepudiation
B. Integrity
C. Confidentiality
D. Authenticity
38. A purchasing agent is placing an order using a credit card account. The account
number is on the order form. Which of the following ways would be the least
secure method to complete this transaction?
A. HTTPS
B. Courier Service
C. Fax
D. Postal Mail
39. A security professional has been invited to be on the panel during the planning
phase of constructing and setting up a data center. Which of these would be a
good suggestion from her?
D. Construct the data center as a single room on the highest floor of the
building to avoid break-ins.
40. The AIC triad is made up of three main principles of information security:
availability, integrity and confidentiality. Which of the following threats can
compromise data integrity?
A. Viruses
B. Social engineering
D. Dumpster diving
CISSP Mock Exam (LITE) - 2
Answer Key and Explanations
3. B - Advisory policies explain to employees the actions and conduct that should
and should not take place within the company. These policies also describe the
consequences of failing to follow the organization's rules and procedures.
[Security and Risk Management]
5. D - Although both HTTPS and S-HTTP sound very similar, they are different in
that, HTTPS is used to protect the communication channel between two
computers while S-HTTP protects a message that is sent from one computer to
the other. [Asset Security]
7. D - Among the choices listed, the primary facility is the least effective for
storage of the business continuity and disaster recovery plans. This is because
in case of a disaster striking the facility, it may not be possible to retrieve the
plans. The other choices, including keeping a copy of the plan in the BCP
coordinator's home will serve the purpose. [Security and Risk Management]
8. D - Among the given choices, the first step to be performed is to purge the new
media completely before copying the hard disk contents. There have been
instances where the media has contained prior information and was considered
inadmissible in courts. [Security and Risk Management]
9. B - Intrusion Detection Systems are quite expensive. The other choices listed
are valid characteristics of IDSs. [Security Operations]
10. C - An Access Control List (ACL) is a filter that can be configured, in this case,
to drop packets that do not come from a particular source. This configuration is
sometimes referred to as a “Proxy on a Stick,” and can be more stable than a
multi-homed proxy system. [Identity and Access Management]
11. D - An attacker will first need to know what ports are open on a system so that
the attack strategy can be built from that knowledge. An attacker can also run
exploitation scripts but they will take much longer and may be of no use if a
web server is not running on the target machine. [Security Operations]
13. A - An external auditor is hired to assist an organization. This can take the form
of an on-going contractor engagement, or a brief spot-check. [Security
Operations]
14. C - An internal auditor works for the organization. While some auditors can
also perform penetration testing, it is usually not their main job function.
[Security Operations]
17. D - When data becomes inconsistent or untrustworthy, the integrity of the data is
said to be compromised. Neither availability nor confidentiality is not an issue
here. [Software Development Security]
19. C - As a trend, it has been found that a number of new viruses are released
during the holiday season prior to New Year. The vulnerability that is exploited
is that many emails with attachments (not only executables) that are carriers of
viruses get exchanged during the holiday season. Having a restrictive email
attachment policy helps control this to some extent. [Software Development
Security]
20. B - As the assurance levels increase, the thoroughness and testing performed
increases. Thus the package where system design is verified and tested is the
highest level EAL7 [Security Engineering]
21. D - UTP cables are not necessarily safe. It is possible to tap into the middle of
UTP cables and use sniffers to capture network traffic. [Security Operations]
22. A - Authentication verifies that the credentials submitted by an entity match its
stored information. Authentication does not track usage or actions
(accountability) or prevent / deny access to resources (authorization). Often,
multifactor authentication is used for better authentication. This is a
combination of something you know (password / PIN), something you have
(smartcard/token), and/or something you are (biometrics). [Identity and Access
Management]
23. D - Authenticity means that the sender is validated and identified. In this case,
the messages were all properly sent and executed using the firm's digital
signature but they were not authentic. [Asset Security]
24. A - Authorization allows users access to resources. It ensures that an entity has
been given the necessary rights and privileges to perform requested actions.
[Identity and Access Management]
25. D - The Herzberg principle is not related to risk analysis. The other three are
valid statements. [Security and Risk Management]
26. B - Content-dependent access control is based on the sensitivity of the data. The
more sensitive the data, the lesser the number of individuals who will have
access to it. [Software Development Security]
27. A - Bell-LaPadula was created for the U.S. Military in the 1970s for to protect
secret information from leaking on multi-user and time-share mainframes. In
such a system a subject cannot read information at a higher security level, or
cannot read “up.” At the same time, to prevent declassifying data
inappropriately, a subject cannot save data to a lower security level, or cannot
write “down.” [Security Engineering]
30. B - Brewer and Nash was created to prevent conflicts of interest. For instance,
an accounting firm has financial data from two companies that compete. An
accountant who accesses the records of one is automatically locked away from
accessing the records of the other. This method is significantly different from
Bell-LaPadula, Biba, and Clark-Wilson in that the privileges dynamically adjust
based upon activity. [Security Engineering]
31. C - CER, or the Crossover Error Rate is the point at which the FAR (False
Accept Rate) crosses the FRR (False Reject Rate). A DMZ is a demilitarized
zone and is a networking concept. [Identity and Access Management]
34. D - Design initial acceptance testing of plans is done in the design and
development phase of the BCP/DRP. The other three activities listed are done
during the current state assessment phase. [Security and Risk Management]
36. C - Conclusive evidence would be the strongest and would not require any
corroboration. [Security and Risk Management]
37. C - Confidentiality means that unauthorized users cannot access the protected
information. This is not a breach in authenticity because the source was never in
question. [Asset Security]
38. C - Courier Services can be bonded. There are many laws that make tampering
with U.S. Mail a federal offense. HTTPS is a relatively secure asynchronously
encrypted transmission. However, there is no guarantee that a fax will be picked
up from the machine by the intended recipient. [Security Operations]
39. B - Data centers should typically be at ground level so that they can be easily
accessed by emergency crew. They should also be constructed as a single room
which makes it easier to secure. The other options listed are not preferred ones.
[Security Operations]
Test Description
This practice test specifically targets your knowledge of the Identity and Access
Management domain area.
A. A program that captures UserID / password values as they are entered by the
user
3. You use an access card to access specific rooms within a building. In the context
of three-factor authentication, which of the following does the access card
represent?
A. Something you have
4. Randy has worked in an organization for fifteen years. He has been granted
accesses to various systems and they have never been revoked. If the company
has to be compliant with Sarbanes-Oxley (SOX) regulations, at a minimum,
how often does Randy's manager need to review his access permissions?
A. Annually
B. Every month
5. Greg is a security professional and wants to ensure that users do not access the
company's HR database between 10 PM and 5 AM. Which of the following
access control mechanisms might he employ?
B. Smart Cards
A. Password Aging
B. One-time password
D. Password Checkers
7. Which of these access control models is most likely to be used by the United
States military?
A. DAC
B. MAC
C. AAA
D. RBAC
8. In which of the following access control models does the owner of a file have
the maximum flexibility to grant another user access to a file?
A. Type II Error
B. Type I Error
C. Type IV Error
10. A hacker managed to hack into a computer system and stole some financial
information related to the profitability of a company. Such information would
normally be classified as:
A. Public
B. Secret
C. Unclassified
D. Sensitive
B. The security level of the subject is equal to or greater than that of the
object's classification
D. The security level of the subject is lesser than that of the object's
classification
A. CER of 90
B. CER of 3
C. CER of 10
D. CER of 97
14. The junior manager of a finance department was granted access privileges to
all files on the company server including employee performance details,
employee payroll details, client feedback reports. This is a situation that should
best be avoided and is termed as:
A. Access creep
B. Authorization creep
C. Excessive privileges
D. Excessive read
15. You are trying to book a holiday package through a website on the internet. You
log in to the holiday resort's website and are automatically able to make your
airline and car rental reservations on different websites without needing to sign
in again. This would be possible through:
A. Digital sign-on
B. Password synchronization
C. Single Sign-on
D. Federation
Domain Area Test: Identity and Access Management
Answer Key and Explanations
3. A - Access cards, keys, swipe cards, and badges are all examples of something
you have. They are physical devices that you carry on your person so that you
can be authenticated when you wish to access something. [Identity and Access
Management]
7. B - In a Mandatory Access Control (MAC) system, users and data are given a
security clearance such as confidential, top secret etc. The operating system
makes the final decision about fulfilling a user request to access data. The MAC
model is specifically used in the military where confidentiality and
classification of information are very important. [Identity and Access
Management]
12. C - Such a situation can arise in a discretionary model. Employee A will have
the necessary permissions to share a directory or file with Employee B.
Employee B then tries to access and copy the file(s) over the network, resulting
in excess traffic. In the other access control models, users do not have as much
freedom to permit other users to access their files. [Identity and Access
Management]
13. B - The biometric system with a crossover error rate (CER) of 3 is the most
accurate system. The CER represents the point at which the false rejection rate
(authorized individuals are rejected) equals the false acceptance rate
(unauthorized individuals are accepted). A lower value indicates a more
accurate system. CERs of 90 and 97 will not occur in practice. [Identity and
Access Management]
14. C - This is a situation called Excessive Privileges and is quite hard to control in
larger organizations. In general, an employee should only be given access to as
much data as he/she needs to access. [Identity and Access Management]
Test Description
This is a cumulative CISSP Mock Exam which can be used as a benchmark for your
CISSP aptitude. This practice test includes questions from all eight domains of the
CISSP CBK.
Test Questions
A. RC4
B. Diffie-Hellman
C. 3DES
D. DES
A. AES
C. RSA
D. DES
4. The company's database server contains multiple tables with customer orders. If
a disaster results in the server going offline the company would start to lose
significant amounts of money after about 24 hours. What category of maximum
tolerable downtime (MTD) should the server be placed in?
A. Normal
B. Urgent
C. Critical
D. Nonessential
6. Users have been complaining that they have to enter too many userids and
passwords to access systems. You are looking at a solution to help them out.
Each of the following technologies may assist in this except:
A. Password synchronization
B. Password network
C. SSO
D. Federation
A. EAL 5
B. EAL 7
C. EAL 1
D. EAL 3
A. Use of routers
C. Traffic padding
D. Rerouting of information
A. DRAM
B. ROM
C. EEPROM
D. RAM
11. When IPSec is used in transport mode, what is the only part of the message that
is encrypted?
A. Payload
B. Authentication Header
C. Routing Header
12. What is the most common security issue for faced by companies?
A. DoS attacks
B. Data diddling
C. Excessive privileges
D. IP spoofing attacks
A. Failure Modes and Effects Analysis is only useful while analyzing single
sub-systems.
C. Failure Modes and Effects Analysis is very theoretical in nature and does not
have practical application.
14. A junior network technician has approached you and asked for your opinion on
what would be the most secure cable to implement within the organization.
What should you tell her?
C. Fiber-optic
D. Coaxial
15. The ICMP protocol is intended to send status messages. However, attackers have
figured out how to insert data inside an ICMP packet to communicate with a
compromised system. This is done by setting up a backdoor on systems. Which
of the following is a well-known attack which uses this method to target
systems?
A. Ping of death
B. Router attack
C. Loki attack
D. Longdale attack
A. Authorization, Identification
B. Identification, Authentication
C. Authentication, Authorization
D. Accountability, Authentication
A. A ping works by sending an ICMP echo packet to the target host. If this is
greater than a legal packet size of 65,636 bytes, the operating system crashes
or becomes unstable.
B. A ping works by sending an IKE echo packet to the target host. If this is
greater than a legal packet size of 32,768 bytes, the operating systems crash
or become unstable.
C. A ping works by sending an ICMP echo packet to the target host. If this is
greater than a legal packet size of 32,768 bytes, the operating systems crash
or become unstable.
D. A ping works by sending an IKE echo packet to the target host. If this is
greater than a legal packet size of 65,636 bytes, the operating systems crash
or become unstable.
18. Todd evaluates an enterprise software that will be installed on the company's
network. This software will also be accessible through the web. Which of the
following features would be a bad practice, and grounds for rejecting the
software?
B. The best option would be to use a VPN connection that avoids the need for
cryptography.
C. A combination of hardware and software will be the most effective solution.
D. A hardware solution will be the best option and function at a higher speed.
A. MPEG
B. JPEG
C. TIFF
D. HTTP
21. Use of SSL over HTTP technology, also known as HTTPS, helps prevent which
of the following attacks?
A. Teardrop
B. Man-in-the-middle
C. Smurf
D. Fraggle
22. Of the protection rings used by operating system security, in which of the
following would applications such as web browsers, email, and word
processors reside?
A. Ring 0
B. Ring 2
C. Ring 1
D. Ring 3
23. The continuity planning project team (CPPT) is facing challenges in getting
various units of the organization to participate in the Disaster Recovery and
Continuity Planning process. This is very likely because of:
A. Poor communication.
24. Camille is works for an accounting firm in a remote lab, away from the main
offices. Her main job is to perform security checks against client websites. To
do this, she is provided only a web address. Which of the following accurately
describes this work?
B. External Audit
D. Internal Audit
25. Gerald works for an accounting firm as a part of a tiger team. He has received
all of the Rules of Engagement documentation for the current project. Included
in the documents is information about specific targets the client would like
tested. Which of the following accurately describes this work?
A. Internal Audit
B. External Audit
26. A token device is a handheld device that can be used to authenticate a user in a
synchronous or asynchronous manner. What mechanism does an asynchronous
token-generating method employ?
C. Accept/Reject mechanism
D. Start/Stop mechanism
27. In which security mode can users access all data once they have proper
clearances and comply with certain other requirements?
B. Mesh Topology
C. Star topology
D. Ring Topology
A. Asymmetric
D. Symmetric
31. Which of the following will be curbed by implementation of the Least Privilege
principle?
B. Network sniffing
D. Browsing
32. Which of these access control models is the best system for a company that has
high employee turnover?
A. LDAP
B. RBAC
C. MAC
D. DAC
33. In what mode should a door access system that relies on magnetic locks fail in
the event of a complete power failure?
A. Fail Secure
B. Fail Local
C. Fail Remote
D. Fail Safe
36. A publicly listed company was due to announce its quarterly results in a few
days' time. How would the company classify information pertaining to its
results, prior to the day of the results?
37. Of the protection rings used by operating system security, in which of the
following would I/O drivers and utilities reside?
A. Ring 2
B. Ring 1
C. Ring 0
D. Ring 3
38. Among the components inside the Central Processing Unit of a computer,
which of the following performs the logic and calculations?
A. Output Unit
C. Registers
D. L1 Cache
39. In an effort to create additional free space on a computer's hard disk, a user
unwittingly deletes a folder that contains critical operating system files. What
security principle is affected by this action?
A. Integrity
B. Confidentiality
C. Authentication
D. Capacity
40. A file is encrypted and placed on a secure FTP server. An MD5 hash is taken of
the file and also placed on the FTP server. The authorized user logs in to the
server and downloads both files, however, the hash fails to match the archive. In
this case, which basic goal of a cryptosystem has failed?
A. Nonrepudiation
B. Authenticity
C. Confidentiality
D. Integrity
CISSP Mock Exam (LITE) - 3
Answer Key and Explanations
2. B - DSA, based upon the Digital Signature Standards created by NIST, can not
be used for encryption. The other options can be used for encryption. [Asset
Security]
3. C - The first step in the backup process would be to run a full backup. This can
then be followed by a differential or an incremental backup. However,
differential and incremental backups should not be mixed up. [Security and Risk
Management]
11. A - When IPSec is used in transport mode, only the payload of the message is
encrypted. [Asset Security]
13. D - Fault tree analysis is useful in identifying failures that can take place in
complex environments or systems. In this process, each failure situation is
added to a tree as a series of logic expressions. This helps in determining where
exactly a failure is likely to occur. [Security and Risk Management]
14. C - Fiber-optic cable is the most secure cabling among the choices listed. Fiber-
optic cable cannot be easily tapped into since it is made of glass. It is also very
difficult to eavesdrop on since it does not radiate any signals that can be
captured. [Communications and Network Security]
16. B - Identification ensures that a subject is the entity that it claims to be. This is
achieved by use of a username, or account number. Authentication ensures that
an additional credential such as a password or PIN number matches previously
stored values for the subject. [Identity and Access Management]
19. D - Hardware encryption is costlier than software encryption, but provides high
speeds of operation in comparison to software encryption. [Asset Security]
21. B - HTTPS, because of the asymmetric key exchange, is good for preventing
man-in-the-middle attacks. Smurf, Teardrop, and Fraggle are all network based
attacks that overwhelm a victim host with network traffic. [Asset Security]
22. D - Ideally, Ring 3 applications would never be able to directly access processes
belonging to lower numbered security rings. In fact, in some cases an
additional level of security is added in to applications like web browsers to
even further abstract processes away from more critical ones. This is usually
called sandboxing. Ring 3 is often called User mode or User land software.
[Security Engineering]
23. B - Lack of management support is the most likely reason the continuity
planning project team is facing difficulties in getting the rest of the
organization to participate and contribute to the plan. BCP/DRP needs to be a
top-down initiative with support coming in from the highest level. [Security and
Risk Management]
24. A - In a blackbox test, the penetration tester is only given enough information to
ensure that the correct enterprise is tested. No specifics are given to the testers
about the systems themselves. The advantage of blackbox testing is that it may
yield unexpected results. A disadvantage is that extensive testing of particular
controls may not take place simply because they are not uncovered in the test.
[Security Operations]
27. C - In dedicated security mode, once a user has the necessary clearances, he/she
can access all data. This is in contrast to the other modes where users can only
access some of the data subject to approvals. [Security Engineering]
28. B - In mesh topology, computers are connected to each other, providing a good
amount of redundancy. This is however more expensive and cable faults can be
quite effort-intensive to detect. [Communications and Network Security]
29. B - In order for goals to be useful, it needs to contain key information such as
responsibility, priorities, authority and implementation / testing dates. [Security
and Risk Management]
30. D - In symmetric encryption, a single key is used to both encrypt and decrypt
the message. [Asset Security]
32. B - An RBAC model is well suited for a company with high employee turnover.
This is because if an employee is mapped to a specific role, when he/she leaves,
his/her replacement can easily be mapped to the same role. The administrator
need not continually change ACLs on individual objects. [Identity and Access
Management]
33. D - In this instance, failing safe means that the doors would be unlocked in case
of a power failure. This will ensure that personnel are not trapped behind the
door in case of emergencies. [Security Operations]
34. C - In this scenario, the CEO is likely to be tried under all the three types of
laws: 1. Civil law - because of the wrongs to certain individuals. 2. Criminal law
- because the CEO willfully violated government laws. 3. Administrative law -
because of the violation of regulatory standards. [Security and Risk
Management]
35. D - Incident handling should align with the company's disaster recovery plan.
Both plans are designed to quickly respond to incidents so that the company can
return to normal operations as soon as possible. However, incident handling is
a recovery plan that specifically addresses malicious technical threats. [Security
and Risk Management]
37. A - Input/output system drivers and operating system utilities reside at the Ring
2 level. This ring is at an intermediate level between User mode (Ring 3) and
Privileged Mode (Rings 0 and 1) rings. [Security Engineering]
38. B - The Arithmetic Logic Unit (ALU) handles all of the logic and mathematical
calculations. The control unit schedules the work to be done, and the local
memory registers, or L1 cache, hold working data for quick reference.
[Security Engineering]
39. A - When a user deletes files that are required, the integrity of the system is
affected. Unlike a virus attack which deliberately affects data integrity, a user
deleting files usually happens in error. [Security and Risk Management]
40. D - Integrity means that the file or message was not modified in transmission,
either by accident or on purpose. This is not a breach in confidentiality since the
intended recipient also cannot read the file. [Asset Security]
Domain Area Test:
Security Engineering
Practice Questions
Test Description
This practice test specifically targets your knowledge of the Security Engineering
domain area.
Test Questions
A. Trojan Horse
B. Spyware
C. Keystroke logging
D. Biometrics
2. Which of the following does the Common Criteria use in its evaluation
process?
A. Protection profiles
B. Application hosts
C. Application profiles
D. Protection hosts
3. A security perimeter is an imaginary boundary. Which of these statements
correctly explains the concept of a security perimeter?
B. Trusted components are outside the perimeter and untrusted components are
within it.
C. Trusted components are within the perimeter and untrusted components are
outside it.
5. A product vendor comes out with a new package called “Unified threat
management system”. The vendor claims that their product obviates the need
for all other network security devices / software. If a company decides to use
only this package, what major tenet of network security would this violate?
A. Defense in Depth
B. Network Segregation
C. Separation of Duties
D. Least Privilege
6. John works in accounting and Marsha in payroll. Both of them have always had
the same privileges to the financial data files. In particular, both use one of
Marsha's files named Payroll.xls. Marsha uses Payroll.xls to track and input
weekly timesheet data, and John uses the data as an input for a different
spreadsheet. A recent external audit firm has recommended that the company
apply the concept of Least Privilege. How would this best be implemented?
C. Set both John's and Marsha's access for the file to read-only
C. By implementing an IDS
8. Secure systems are dependent on the use of effective security models. Which of
these models protects integrity of information within a system?
9. Full hard drive encryption on laptops mitigates some of the risk of loss or theft
of the unit. Under what security realm is this classified?
A. Host Security
B. Network Security
C. Data Security
D. Application Security
A. EAL0
B. EAL6
C. EAL3
D. EAL1
11. What ITSEC rating is concerned with a high level of integrity during
communications?
A. F5
B. F6
C. F7
D. F8
B. Europe only
13. An operating system has many protection mechanisms to ensure that processes
that are running do not negatively affect each other or other components. One
such mechanism is a protection ring. The ring architecture is dictated by:
B. The processor
14. Which rule is also classified as the “no read down” rule?
15. The sensitivity of the data being processed dictates the security modes in which
systems operate. If users need to access some data subject to clearances and
formal access approvals, what security mode would this likely be?
6. A - John only needs to read-access to the payroll xls. He may never have
attempted to change any of the values in the payroll xls but the principle of least
privilege states that he should only have as much access as needed. Hence the
file needs to be read-only for John. The other answers are incorrect because
both people need access to the file and Marsha needs to be able to write her
changes since she needs to update timesheet data. [Security Engineering]
7. B - Such types of activities are difficult to catch since they are at the
programming level. A code review is the only way in which they can be caught.
[Security Engineering]
8. A - The Biba model is one in which the integrity of information within a system
is protected, along with the activities that take place. [Security Engineering]
9. C - The goal of hard drive encryption is to protect the data and this is classified
as data security. This does not protect the host itself. [Security Engineering]
10. B - The higher the assurance level, the better the protection. Hence a system
with a rating of EAL6 will have a lesser number of covert channels compared
to the other values listed. EAL0 doesn't exist. [Security Engineering]
12. B - The ITSEC is used in European countries. The United States uses the
Orange book. However, most countries have started migrating towards
Common Criteria. [Security Engineering]
13. D - The ring architecture that a system uses, is dependent on the processor and
the operating system. This is also the reason that an operating system designed
for one platform (chip) do not work with another. [Security Engineering]
14. B - The simple integrity axiom rule is also classified as the “no read down”
rule. This rule stipulates that a user at a specific integrity level cannot read
information at an integrity level that is lower than their current level. [Security
Engineering]
15. C - This would be multi-level security mode. All users need to have formal
approvals and an NDA. They access only some of the data on the system based
on clearances, a formal approval and a need-to-know. [Security Engineering]
CISSP Mock Exam (LITE) – 4
Practice Questions
Test Description
This is a cumulative CISSP Mock Exam which can be used as a benchmark for your
CISSP aptitude. This practice test includes questions from all eight domains of the
CISSP CBK.
Test Questions
A. Internet cache
B. Memory dump
C. Personal files
D. Documents
3. Joann has been given the task of maintaining the Backup Control Center box. A
list of Master passwords, install media, and other essentials are contained
inside. In the event of a disaster, she is to keep possession of the box at all times.
Which of the four elements of a business continuity plan does this exemplify?
A. Testing
B. Authority
C. Priorities
D. Responsibility
A. The X.501 standard is the best and preferred over the X.500 standard
B. The directory service shows tangible benefits only when the number of
entries in the directory exceeds 4000.
C. The directory service shows tangible benefits only when the number of
entries in the directory exceeds 400.
A. Security guards
6. Which of the following refers to the likelihood that an agent will exploit a
weakness?
A. Risk
B. Exposure
C. Threat
D. Vulnerability
B. It is a security risk if not removed before the software goes into production
D. They are backdoors into software that only the developer knows about.
9. Floyd is the chief compliance officer for a multi-million dollar concern that
deals with medical records. It was reported to him that the firewalls currently in
place are weak and have well-known exploits. However, in order to save
money, he decides to ignore this. Which of the following has he violated?
A. Due diligence
B. Privacy rights
C. Prudent person rule
D. ISO-9000
12. A biometric system weighs people entering a facility to ensure that only one
person is being granted access. Where would such a system typically be used?
A. In a dual-surveillance system
B. In a fail-safe system
C. In a fail-secure system
D. In a mantrap
13. Which of the following would the first priority of a disaster recovery plan?
B. Transportation
C. Human safety
B. Natural response
C. Territorial reinforcement
D. Natural surveillance
15. A memory leak occurs when poorly written applications use up memory but do
not free it back to the operating system. How would a hacker use such a flaw to
disrupt systems?
B. By a Teardrop attack
16. Doug is the manager of a large switched network. He notices that the network is
very slow and with the use of a network sniffer, he diagnoses a broadcast storm.
What causes a broadcast storm?
A. Repeaters
B. Pings
C. Bridges
D. Routers
18. Certain information has an MTTR of close to zero. What action should an
Information Security Professional advise for such a requirement?
A. Objects
B. Multiple Inheritances
C. Encapsulation
D. Classes
20. A company purchased anti-virus software from a leading vendor and installed
it. However, the signatures were not kept up-to-date. This is a:
A. Vulnerability
B. Risk
C. Countermeasure
D. Threat
21. Threats to data integrity can be reduced through separation of duties and
rotation of duties. What other security principle will help protect against threats
to integrity?
A. Social engineering
B. Dumpster diving
C. Need-to-know
D. Collusion
22. Public key certificates provide a high level of trust. Certificates need to be
issued, maintained, may expire, or may need to be revoked. Which authority
keeps track of expired certificates?
23. The Local Area Networking team at a company has commenced work on a
Business Continuity Plan. They have followed all recommendations and
procedures and have come up with an exhaustive plan. However, they have
forgotten a very important step in the process. What could this be?
24. Will an operating system that works with one microprocessor chip work with
another?
C. No. Even though the ring architecture used by chips is the same, the ring
architecture system used by an operating system is different.
25. A sender challenged a recipient that a message did not originate from him. If
this message was sent using cryptography and used a trusted third party, what
feature of cryptography allows this statement to be verified?
A. Authentication
B. Nonrepudiation
C. Integrity
D. Access Control.
A. IDEA
B. Blowfish
C. RSA
28. Which of these correctly depicts the structure of a business continuity plan?
D. Can be host-based
30. Which of the following types of evidence can stand on its own merit in court
and needs no corroboration?
A. A. Opinion evidence
B. Direct evidence
C. Circumstantial evidence
D. Hearsay evidence
A. Padlocks
B. CCTV
C. A password
D. Guards
B. 30 to 60 days
C. 15 to 30 days
D. 90 to 120 days
33. Visitors to a high security prison are marked with an invisible hand stamp. This
is then verified by a Corrections Officer behind a bullet proof glass enclosure,
after which the visitor is allowed through a second door. What type of
preventative control is this?
A. Technical Control
B. Administrative Control
C. Resident Control
D. Physical Control
34. What of these is the best way to prevent piggybacking from occurring at the
access points into a facility?
A. Security guards
B. Programmable locks
C. Swipe cards
D. Proximity cards
B. Last Name
36. A bank wishes to install wireless access within their main branch. Because of
FFIEC guidelines to encrypt transmitted data, however, they must find a way to
do so securely. Which of the following implementations would be most secure?
A. Connect the wireless access point to the internal network and allow DHCP to
provide addresses to client machines.
B. Connect the wireless access point to the internal network and implement
WPA.
C. Connect the wireless access point to the Internet and use WEP.
D. Place the wireless access point in a DMZ and allow only VPN connections to
the internal network.
A. Prevents crosstalk
C. Reduces attenuation
D. Reduces fire hazards
38. Which of the following technologies is not used for Virtual Private
Networking?
A. L2TP
B. IPSec
C. PPTP
D. PPP
39. Which of the following is primarily at a management level and states a high-
level overview of an entity's stance towards a certain issue?
A. Policy
B. Procedure
C. Standard
D. Guideline
A. Stateful firewall
1. B - Internet cache, personal files, and documents are all stored on the hard
drive. However, evidence in RAM will disappear forever when the machine is
turned off. Special software tools must be used to do this. [Security and Risk
Management]
7. A - Maintenance hooks are backdoors into software that were created by the
developer. Generally, developers use them to bypass access controls to easily
make changes to software code or alter development. They become a serious
security issue when they are not removed after the software is sent to
production. Many developers still use maintenance hooks even though they are
considered a security issue. [Security Engineering]
8. D - Maintenance hooks are software backdoors created by the developer.
Generally, developers use them to bypass access controls in order to easily
change software code or alter development. They become a serious security
issue when they are not removed after the software is sent to production. Many
developers still use maintenance hooks even though they are considered a
security issue. [Security Engineering]
9. C - Management must follow the prudent person rule in performing due care. In
other words, they must do what a prudent and responsible person would do in
the situation. Due diligence takes place in planning, and is done to ensure that
all possible weaknesses and threats were considered. Due care is the set of
actions to mitigate weaknesses in the current situation. [Security and Risk
Management]
10. D - Mandatorily changing the guards every week will actually add to the risk.
Security guards will need some time to be trained and be familiar with the
system requirements and understand what the security expectations are. If
guards are frequently changed, there is a loss of knowledge. This option does
not reduce the risk of outsourcing the security guard services. [Security
Operations]
12. D - Mantraps typically consist of a small room with two doors. An individual
must first authenticate through the first door to enter the room. Then, the
individual must authenticate through the second door to gain access into the
facility. Sometimes, mantraps have biometric systems that weigh individuals to
make sure that only one person enters the facility at a time. This is an effective
way to prevent unauthorized individuals from piggybacking and gaining access
to the facility. [Security Operations]
13. C - Human safety is the first priority of a disaster recovery plan. Many
regulatory bodies also require that human concerns be considered ahead of all
others in every emergency response plan. [Security and Risk Management]
14. B - Natural response is not a valid CPTED guideline. CPTED primarily outlines
how a well-designed physical environment can reduce/minimize crime by
affecting human behavior. [Security Operations]
15. C - Memory leaks can be exploited by hackers who can launch a Denial of
Service (DoS) attack. Hackers can potentially cause systems to be disrupted by
continually sending requests to the server. This results in more and more
memory being used up, because the application does not release allocated
memory. At some point, it will run out of memory. [Security Engineering]
16. C - Bridges forward all traffic and as a result they broadcast all packets as well.
This can congest the network and result in a broadcast storm. [Communications
and Network Security]
18. D - MTTR refers to Mean Time to Repair. If the MTTR is close to zero, it
means that the information needs to be continuously available. This would call
for mirroring / duplexing the information. [Security Operations]
20. A - This is a vulnerability since the company is now prone to virus attacks. The
threat is that a virus will actually show up and disrupt systems. Risk is the
likelihood of the virus showing up. [Security and Risk Management]
24. D - No. Hardware chips are designed to have a certain number of rings.
Operating systems also need to be designed to work within this ring structure.
Different microprocessors have different architectures and instruction sets thus
preventing operating systems from being portable. [Security Engineering]
25. B - Nonrepudiation. Digital signatures and public key encryption provide tools
for non-repudiation or origin. Use of a third party can allow verification of the
origin of the message. [Asset Security]
26. C - Of the choices given, RSA is an asymmetric algorithm while the other
choices Blowfish, DES and IDEA are symmetric algorithms. Asymmetric
algorithms are mathematically intensive compared to symmetric algorithms.
Hence RSA is the right choice. [Asset Security]
27. A - Of the protocols listed, remote procedure call (RPC) works at the session
layer and not at the transport layer. [Communications and Network Security]
30. B - Only direct evidence, such as an eye-witness, does not need backup
information. Conclusive evidence also needs no corroboration - it is
irrefutable. [Security and Risk Management]
31. C - Passwords are not physical controls, they are cyber or electronic controls.
[Security Operations]
35. C - PII does not include information that is readily available from a telephone
directory. However, when it is combined with a third item of information, such
as an account number, it becomes private. A social security number would
always be considered private. [Security and Risk Management]
36. D - Placing the access point in a firewall DMZ and using a strong technology
such as VPN is the safest way to implement wireless networking. Placing the
device on the LAN with no protection is dangerous. The other options do not
provide the security of VPN. [Communications and Network Security]
37. D - Plenum is more expensive than non-plenum cable. This is due to the special
cabling material that does not let off hazardous gases if it burns.
[Communications and Network Security]
Test Description
This practice test specifically targets your knowledge of the Communications and
Network Security domain area.
Test Questions
A. WEP
B. DMZ
C. WAN
D. LAN
A. Bridge
B. Switch
C. Repeater
D. Router
A. Layer 1 - Physical
C. Layer 3 - Network
D. Layer 4 - Transport
B. Layer 3 - Network
C. Layer 4 - Transport
D. Layer 1 - Physical
5. On which layer of the OSI model does a basic network switch operate?
A. Layer 4 - Transport
B. Layer 1 - Physical
D. Layer 3 - Network
6. What solution would you use if you needed to make a secure connection over
an unsecure network?
C. ADSL
D. PPP
7. At which layer of the OSI model are communications channels setup and
released using protocols such as remote procedure calls (RPC)?
B. Session Layer
C. Network Layer
D. Transport Layer
A. Session Layer
B. Application Layer
C. Transport Layer
D. Physical Layer
A. Gateway Address
B. IP Address
C. Subnet Mask
D. DNS Server
B. When attackers attack a network, they are unable to find out the internal
details about the company's network and topology.
D. Even though the acceptance of IPv6 is taking time, NATs have allowed
companies to put the problem off for a while.
11. When a firewall proxies many computer systems using private IP addressing to
the Internet over a single public IP address what is it called?
A. NAT
B. DNS
C. WAN
D. DNA
12. Which layer of the OSI model is responsible for interfacing between the
network stack and the application?
A. Network Layer
B. Physical Layer
C. Session Layer
D. Application Layer
B. MAC
C. RARP
D. ICMP
14. At which layer of the OSI model are transformations made to prepare
datagrams for use between disparate systems, such as an EBCDIC to ASCII
conversion?
A. Session Layer
B. Physical Layer
C. Application Layer
D. Presentation Layer
A. UDP
B. Telnet
C. TCP
D. SSL
Domain Area Test:
Communications and Network Security
Answer Key and Explanations
5. C - A basic network switch operates at the data-link layer (Layer 2) of the OSI
model. [Communications and Network Security]
11. A - Network Address Translation allows many hosts behind a firewall to access
the Internet from only one public address. [Communications and Network
Security]
12. D - The application layer does not refer to the end application itself but refers
to the interface between the OSI network stack and that application. It is the
topmost layer and interfaces with the system and applications. [Communications
and Network Security]
13. D - The Internet Control Message Protocol (ICMP) reports routing information
and errors and delivers status messages. It can be used as a means of sending
back error messages to sending systems that use connectionless protocols.
[Communications and Network Security]
Test Description
This is a cumulative CISSP Mock Exam which can be used as a benchmark for your
CISSP aptitude. This practice test includes questions from all eight domains of the
CISSP CBK.
Test Questions
A. Guideline
B. Procedure
C. Standard
D. Policy
B. A printer
C. A data tape
D. A keyboard
3. Which of the following is NOT an advantage of maintaining a Hot Site?
B. Highly Available
C. Less Expensive
4. There are two main types of Risk Analysis: __________ which uses the
knowledge of the workers who know the processes best, but also includes some
amount of guesswork. There is also ___________, which requires more
complex calculations, but can also be more easily automated and provides cost /
benefit information.
A. Auditory / Preemptive
B. Qualitative / Quantitative
C. Quantitative / Qualitative
D. Preemptive / Auditory
A. Electrostatic discharge
B. Radio modulation
D. Intermodulation
6. If cost is not an issue, which of the following storage systems provides the best
combination of performance and availability?
A. RAID 1
B. RAID 10
C. RAID 5
D. RAID 0
A. RC4
B. SHA
C. HAVAL
D. MD5
A. They are measures put into place to help detect when a disaster strikes.
B. They are predefined activities that will be used to prevent a disaster from
occurring.
C. They are measures put into place to help reduce the likelihood of a disaster.
D. They are predefined activities that will be used when a disaster strikes.
A. Disk duplexing
B. Disk-shadowing
C. Remote journaling
D. Electronic vaulting
10. Which of the following choices is not a basic principle used to help protect
against threats to data integrity?
A. Separation of duties
B. Repudiation
C. Rotation of duties
D. Need-to-know
D. Risks are best managed with a layered approach, sometimes called defense-
in-depth.
12. Java uses a security scheme to prevent an applet from having undue access to
the rest of the system. What is this called?
A. Ivory Tower
B. Sandboxing
C. Browser-level
D. Safe-mode
13. A software application development project had already proceeded into the
design phase when it was discovered that security aspects had not been taken
into consideration. What should be done to address this?
A. Prepare the necessary security guidelines and checklists so that they can be
used in the build/coding phase.
B. Prepare necessary test plans so that security aspects are properly taken care
during Integration testing.
C. Restart the design phase and include security as part of this phase.
15. In order for security plans to be effective, the time-period for which they must
be designed is at least:
A. Three years.
B. Ten years.
C. One year.
D. Six months.
16. The security policy of a company had the following statement: “Employees of
the company should not share their passwords with anyone.” Is this statement
worded correctly? If not, how would you reword it for it to be effective as a
policy?
17. A RAID consists of multiple drives but appears as a single drive to applications.
A technique used is to divide and write data over several drives. This results in
dramatically increased read performance since data is simultaneously read
from several drives. Such a technique is called:
A. Multiple-mirroring
B. Strobing
C. Swapping
D. Striping
18. In a HTTPS connection, the web server generates a cookie which is sent to the
browser. This may be stored on hard disk or in memory. Which of these is not a
valid 'best practice' with regard to cookies in a HTTPS connection?
19. Certain audit standards required that records be maintained for 3 years. In order
to comply with these standards, what is the recommended duration for which
data should be maintained?
A. 4 years
B. 6 years
C. 1 year
D. Exactly 3 years
20. Under what law would a person caught stealing a computer be prosecuted?
A. Civil Law
B. Copyright Law
C. Criminal Law
D. Regulatory Law
A. VPN
B. HTTPS
C. 3DES
D. SMTP
A. Black boxing
B. Dumpster diving
C. Phreaking
D. Social engineering
23. Jen would like to have more control over VPN connections made to her
corporate network. Additionally, she would like to save effort and money by
eliminating costly VPN client licenses. Which technology would be the best
solution?
A. SSL VPN
B. IPSec VPN
D. S/MIME
A. Policy
B. Guideline
C. Standard
D. Procedure
A. Subnets
B. Building location
C. External lights
D. Data backups
26. The Computer Emergency Response Team (CERT) has an advisory that
companies should use legal banners that pop up when employees log in. What
would be the purpose of such banners?
A. Using such legal banners absolves the company from any legal action in
case of security violations.
27. Kate is the director of risk management at a large financial institution. Once
each year, she is required by the board of directors to convene a table-top
exercise based upon a disaster scenario. After several milestones are discussed
in the exercise, she makes sure that the lessons learned are folded back into the
BCP for more efficiency. This exemplifies which of the four elements of a
business continuity plan?
A. Responsibility
B. Maintenance
C. Testing
D. Authority
28. What network device can you implement between end systems on a network to
reduce the possibility of sniffing and monitoring attacks by potential intruders?
A. Gateways
B. Routers
C. Switches
D. Firewalls
29. Dan has been tasked to employ an encryption methodology for his company's
data network. Management has identified performance as the number one
concern. Which of the following should Dan use for encryption?
A. MD5
B. RSA
C. DSA
D. DES
30. Greg is designing a cryptosystem to provide encryption and decryption. He
weighs the pros and cons and finally decides to use a symmetric cryptosystem
as opposed to an asymmetric cryptosystem. Which of the following could have
been a key influencing factor in his decision?
31. At John's company, there is a software policy in place that prevents the use of
unencrypted flash storage devices, such as USB thumb drives. What type of
control is such a preventative measure called?
A. Resident Control
B. Physical Control
C. Administrative Control
D. Technical Control
B. Encryption
C. Mantraps
D. Background checks
B. Separation of duties
D. Firewall
C. SSH
D. Telnet
36. Which of these security models ensures that you cannot write to an object that
resides at a security level lower than the one you possess?
A. Clark-Wilson model
B. Lattice model
C. Biba model
D. Bell-LaPadula model
C. Fraud Prevention
38. You are currently meeting with management to have them formally approve the
products, systems, and components within your organization. What is this
process referred to as?
A. Certification
B. Accreditation
C. Affirmation
D. Verification
40. A bank's rating was lowered post an audit by the Federal Deposit Insurance
Corporation (FDIC). Lack of proper administrative controls in the IS
department was cited as a key non-conformance. Which of the following would
NOT be the Board of Directors' primary response?
A. Hire an Internal IT Auditor into the Risk Management Department
10. B - Repudiation does not protect against threats to integrity. Repudiation refers
to sending a message and then denying that you sent it. Digital signatures are
used to provide a non-repudiation service, which prevents the sender from
denying that they sent the message. [Security and Risk Management]
14. B - Security requirements must be addressed right at the start of the project.
[Software Development Security]
15. A - Security plans should be designed to be useful for at least three years. If not,
it means that sufficient thought has not gone into its creation and it needs to be
revisited. [Security Engineering]
16. C - Security policies should contain statements that are direct and commanding.
They need to convey the effect and less forceful words like 'should' or 'may'
should be replaced by use of the stronger words 'shall' or 'must'. [Security and
Risk Management]
17. D - This technique is known as striping. Although a write operation might take
longer time, a read is much faster since data is read simultaneously from
multiple drives. [Security and Risk Management]
18. B - Since HTTP is a stateless protocol, cookies are very much essential for a
secure connection using SSL. In order to prevent man-in-the-middle attacks, it
is very important that the cookies contain timestamps. The web server
periodically checks these. If the connection has been idle for a while, it is
“timed out” by the web server. All the other choices are best practices. [Asset
Security]
19. D - As a general principle, audit data should not be kept any longer than
required since it can otherwise consume massive amounts of storage. Hence it
is advised to maintain records for exactly 3 years in this case. [Security
Operations]
20. C - Since this case involves a physical theft, at least the initial charges will be
criminal. If it was later discovered that the perpetrator was sent by a competitor
to steal trade secrets, then a civil case might also be brought on. [Security and
Risk Management]
21. D - SMTP is the only protocol or technology listed that uses clear text for all of
its transmissions. Hence it is particularly vulnerable to being hacked. The others
are all encrypted in some way. [Security Operations]
23. A - SSL VPNs make use of common web browsers and allow users to access
applications in the organization's network. Back-end databases can also be
accessed with the help of plug-ins. This approach is more cost-effective than the
VPN using IPSec. [Asset Security]
26. D - Such banners strengthen the legal case against an employee in case he/she is
found to have violated security policies. This is because the company can show
that the employee had acknowledged the security policy and given permission
to be monitored. The other choices are not valid. [Security and Risk
Management]
27. C - Kate is testing the plan. Testing is a key aspect of the BCP because
environments continually change. When the plan is tested (or exercised),
improvements and efficiencies can be uncovered. [Security and Risk
Management]
28. C - Switches are used on networks to connect end systems to the network.
Switches create a virtual private connection between two communicating end
systems on a network. Therefore, data packets are not flooded throughout the
network where they could be easily sniffed and monitored. They are sent
directly from end system to end system on the network. [Communications and
Network Security]
35. A - Testing can only be done after a plan is implemented; it is not a part of
designing one. The other choices listed are logical steps in contingency
planning. [Security and Risk Management]
36. D - The *-property rule of the Bell-LaPadula model ensures that you cannot
write to an object that resides at a security level lower then the one you possess.
This is classified as the “No Write Down” rule. The “No Read Up” rule states
that you cannot read information that is at a higher classification level then the
one you possess. [Security Engineering]
37. A - All of the choices listed are benefits of job rotation. Job rotation reduces the
risk of fraud by reducing the risk of collusion between two individuals.
Rotating individuals out of jobs helps build skill redundancy and cross training.
[Security and Risk Management]
38. B - The accreditation process occurs after the certification process. It involves
meeting with management and presenting the information derived from the
certification process. This is done to have management formally approve the
products, systems, or components within the organization. When management
accredits the products, systems, and components within the organization they
are stating that they know the potential threats, vulnerabilities, and weaknesses
and are accepting the associated risks. [Security Engineering]
39. D - The ACID test stands for Atomicity, Consistency, Isolation and Durability
and should be implemented by all database software in distributed
environments. [Software Development Security]
Test Description
This practice test specifically targets your knowledge of the Security Assessment and
Testing domain area.
Test Questions
1. The website of a bank was taken down for several hours by a denial of service
attack. A group of loosely organized individuals have claimed responsibility.
During the subsequent investigation, the responding law enforcement agency
classifies this crime as which of the following?
A. Organizational modification
C. Cyber graffiti
2. Several companies have deployed their servers in the data center of a managed
hosting provider. While these servers are logically segregated by VLANs, there
is a management VLAN to which all systems are connected. One of the
companies has delayed implementing a critical OS security patch for several
weeks because they have not finished testing its interoperability with the
applications running on its servers. While the company is completing its
testing, the vulnerability for which the patch is issued was exploited on one of
their servers. As a result, the unprotected servers were used to launch a denial
of service attack against the hosting provider and some of the other servers
connected to the management VLAN. During the course of the incident
investigation, it is determined that the company was negligent in delaying the
installation of the patch, and that it is responsible for service outages to the
service provider and the other companies hosted in the datacenter. Which term
best describes this condition?
A. Criminal trespass
B. Downstream liability
C. Civil liability
D. Criminal negligence
3. A government agency has installed a Class 3 vault to house top secret materials.
How long will this type of vault withstand an attack with common mechanical
tools?
A. 1 hour
B. 30 minutes
C. 2 hours
D. 15 minutes
4. Over the last 6 months, an IT group has replaced server and network
components that have mysteriously failed. These failures occurred at intervals
more frequent than the Mean Time Between Failures rating of the affected
components, so the team began to suspect an environmental issue. It was
discovered that the HVAC system had not been receiving annual maintenance
service. Which of the following could be the result of an HVAC system's faulty
performance?
B. Moisture damage
C. Directive mode
D. Trusted mode
A. Ring 0
B. Ring 2
C. Ring 1
D. Ring 3
A. Diameter
C. TACACS
D. RADIUS
8. The law firm of Ross, Huff, and Wilson is remodeling its single story office
building. The renovation work includes replacing all exterior windows and
doors. Which of the following types of glass is recommended for this
scenario?
B. Tempered glass
C. Laminated glass
D. Wired glass
A. Telephoto
10. A small company has posted links to several files on its public website. Rather
than using a sanitized version of a URL that points to a virtual directory,
however, the URLs for these files reveal the actual file and folder structure of
the server where the files are housed. Which of the following attacks exploits
this particular vulnerability?
A. Denial of service
B. Spoofing
C. Rainbow tables
D. Directory traversal
11. Nora has embedded a video and photos of her most recent vacation on her
social networking page. The video and photos are actually hosted on two other
websites. Which of the following allows Nora to share on her social
networking page?
A. XML
B. OLE
C. API
D. HTML
12. Of which of the following would a Nigerian email scam best be categorized?
C. Wire tapping
13. Which of the following is the most accurate and secure form of biometric
recognition?
A. Iris scanning
B. Retinal scanning
C. Vascular patterns
D. Fingerprints
14. The lock on a storage facility uses an electronic keypad for access code entry.
What additional security components should be implemented with this?
A. Turnstiling
B. Anti-passback
C. Location logging
D. Badging out
Domain Area Test:
Security Assessment and Testing
Answer Key and Explanations
3. C - Underwriter Laboratories has set forth ratings for vault attack resistance.
The lowest rating, Class M, will resist attack for 15 minutes. The highest rating,
Class 3, will withstand attack for two hours. [Security Assessment and Testing]
8. C - Laminated glass is recommended for use in street level windows and doors.
It is composed of two sheets of glass bonded to a middle layer of plastic. When
laminated glass is struck with enough force to break the glass, the plastic layer
prevents the glass from shattering and displacement onto surrounding surfaces.
[Security Assessment and Testing]
9. D - Short focal length lenses provide a wide angle view of an area, which is
ideal in an open area such as a lobby. Long focal length lenses provide a very
narrow view, which is more appropriate for small areas such as entry/ exit
points. [Security Assessment and Testing]
10. D - When an attacker can see the true file path as part of a URL, he or she can
execute a directory traversal attack to navigate into other folders and files. This
is accomplished by inserting a standard comandline directory navigation
command, “../”, into the URL to move upward in the directory structure, then
running other commands to view and change directories at will. This attack is
also known as the “dot slash” attack, named after the characters used to initiate
the directory traversal. [Security Assessment and Testing]
13. B - Retinal scanning offers low false positive rates, and false negative rates of
close to zero. It also has a very small base of outliers, those users who are
unable to be enrolled in the system. Further is much more difficult to defeat this
type of system than other types of biometric readers, including iris scanning.
[Security Assessment and Testing]
14. D - When using electronic cipher locks, it is highly recommended that the
keypad be shielded from view by anyone but the immediate user, to prevent
unauthorized users from shoulder surfing key codes. These types of locks
should also be connected to a battery backup to ensure continuous operation of
the lock during power outages. [Security Assessment and Testing]
Test Description
This is a cumulative CISSP Mock Exam which can be used as a benchmark for your
CISSP aptitude. This practice test includes questions from all eight domains of the
CISSP CBK.
Test Questions
1. What is the product of Single Loss Expectancy (SLE) and Annualized Rate of
occurrence (ARO) i.e. SLE x ARO known as?
A. Residual Risk
C. Exposure Factor
A. Point of Inflexion
C. Critical point
A. A user at any given security level cannot write data at a level that is higher
than their current level.
B. A user at any given security level cannot read data at a level that is lower
than their current level.
C. A user at any given security level cannot read data at a level that is higher
than their current level.
4. Dawn is designing a server room for her manufacturing company. She would
like to reduce air-borne dust contamination as much as possible. Which of the
following would best serve this requirement?
A. Positive pressurization
C. Raised floor
D. Negative pressurization
6. One of the best ways to keep a Business Continuity Plan (BCP) up to date is:
7. This early security model was constructed mainly for the purpose of preserving
data integrity. It is typified by the concepts of “cannot read down” and “cannot
write up”. Which of the following security models best fits this description?
A. Bell-LaPadula
B. Clark-Wilson Model
D. Biba Model
A. The username and the password for the database are stored in plaintext, thus
making them susceptible to inappropriate access.
B. In data exchanges over the network, the actual call is encrypted, but the
returned data is in cleartext.
C. In data exchanges over the network, the actual call is in cleartext, but the
returned data is encrypted.
D. The username is in plaintext but the password is encrypted and stored, thus
making the username susceptible to inappropriate access.
9. Which model allows changes to occur dynamically for access controls based
on previous actions that a user performed?
A. Graham-Denning Model
D. Lattice Model
11. This security model was developed with a great deal of focus on information
integrity and fraud prevention. It requires the use of an abstraction layer that
prevents subjects from directly accessing the object. The abstraction layer
enforces the integrity of the object. Which of the following models best
corresponds to this description?
A. Clark-Wilson Model
C. Biba Model
D. Bell-LaPadula Model
A. CoBit
B. COSO
C. BS7799
D. ISO 17799
13. A company performs a risk assessment and determines that they are exposed to
a very small amount of risk from a possible robbery at the convenience store
next door. They choose to do nothing. This is an example of what?
A. Terminating Risk
B. Transferring Risk
C. Tolerating Risk
D. Treating Risk
14. A company performs a risk assessment and determines that because of an older
Windows NT 4.0 server that is directly attached to the Internet, they are exposed
to risk. The system cannot be changed but an upgrade is available that places the
server behind a strong firewall. The company decides to upgrade the system.
What is this an example of?
A. Terminating Risk
B. Tolerating Risk
C. Transferring Risk
D. Mitigating Risk
15. A company lost some confidential data from a critical server due to an attack by
hackers into its network systems and decided to implement an Intrusion
Detection System (IDS). To provide the best protection, which of the following
options should the company pursue?
B. The employee should be asked for two references prior to his joining and
these references would be contacted for their feedback on the employee.
17. What is the concept of only granting a user the exact minimum access required
to complete ordinary daily job functions called?
A. Least Access
B. Least Privilege
A. Confidentiality
B. Availability
C. Integrity
D. Authorization
D. Ask the vendor organization to create its own test data since this is their
responsibility.
20. Which of the following types of encryption may allow an attacker to find out
details (such as headers, addresses and routing) about an intercepted packet
without needing to decrypt it?
A. Link encryption.
B. Inline encryption.
C. End-to-end encryption.
D. Online encryption.
21. If the requirement is that a user have flexibility in choosing what gets encrypted,
which of these encryption methods should be used?
A. Link encryption
B. End-to-end encryption
C. PPTP encryption.
D. Online encryption
23. Which of the following access control functionalities has controls that provide
for an alternative measure of control?
A. Corrective
B. Directive
C. Deterrent
D. Compensating
A. The countermeasure cost per year should always be greater than annualized
expectancy. Hence the company may proceed with the countermeasure.
B. The value of the annualized loss is required to make a decision. Hence the
data provided is insufficient to determine the course of action.
C. The countermeasure cost per year should always be less than the annual loss
expectancy. Hence the company should look at an alternative way of
handling the risk.
A. Avoid use of glass and have metal doors in garages and stair towers within
the parking lots.
B. A side door at the facility, with restricted access, should not have a sidewalk
leading up to it from the front of the building.
C. Provide for barriers and trees near secluded doors. This will prevent it from
being visible to intruders.
26. Sally creates a digital file for her company. If the company uses a discretionary
access control scheme, who owns the file according to the control
methodology?
A. Sally
C. Sally's manager
27. You connect to an external website on the internet, download, and play an
MPEG file on your computer. In the OSI model, at what layer does the
decompression of the MPEG file happen?
A. Application layer
B. Session Layer
C. Presentation layer
D. Transport Layer
28. Company security policy dictates that access to the company's networks from
the internet must be highly restricted, and through a DMZ. How is a firewall
setup to implement the DMZ?
B. Setup a firewall between the internal network and DMZ and another firewall
between the DMZ and external network.
C. Setup a firewall between the DMZ and the internal network only.
D. Setup a firewall between the internal network and DMZ and another between
the internal network and the external network.
29. Which of the following is NOT useful for secure key distribution?
A. DSA
B. RSA
C. El Gamal
D. Diffie-Hellman
30. The commonly used form of IP is IP version 4 (IPv4) which uses 32 bits for its
addresses. However, these have started to run out due to the high demand, and
there is a move towards IP version 6 (IPv6). How many bits does IPv6 use?
A. 64
B. 32
C. 96
D. 128
31. What is the first level in the Orange Book that requires labeled security?
A. B1
B. B2
C. C1
D. C2
32. What is the first level in the Orange Book that requires users to be individually
identified and accountable for their actions?
A. B1
B. C1
C. C2
D. B2
33. Disaster has struck at the facility of a company. Which of the following would
be the first priority to the company when such an incident occurs?
B. A hash function can be used to prevent the message from getting altered.
35. A company uses a 10-key pad for door entry. However, concerns have been
raised that the four-digit PIN numbers might be breached or guessed. Which of
the following strategies will be least effective in preventing unauthorized
individuals from entering through the door?
A. Glass-Steagall Act
B. SOX
C. GLBA
D. HIPAA
37. Katie is the director of Information Systems at her company. She is in the
process of identifying a suitable facility to house a new data center. Which of
the following four sites would be best suited for this purpose?
38. In the realm of one-way hashing, which of the following can be configured to
be the best choice against a birthday attack?
A. MD0
B. MD2
C. MD5
D. SHA1
A. Policy
B. Practice
C. Program
D. Procedure
2. B - The balancing point is called the recovery time objective. As part of the
business continuity planning / disaster recovery planning, the team needs to
strike a balance between the cost of disruption and cost to recover. [Security and
Risk Management]
3. C - The Bell-LaPadula simple security rule states that a user at any given
security level cannot read data at a level that is higher than their current level.
Users can only read the information at their security level or lower. This
protects the confidentiality of information at higher security levels by ensuring
that unauthorized users cannot read the information. [Security Engineering]
4. A - The best choice is a positive pressurization system that forces air out of the
server room whenever a door is opened. The other choices listed do not help in
preventing dust-contamination. [Security Operations]
8. A - The biggest concern with ODBC connectivity is that both the username and
password are stored as plaintext. Hence if an HTML document is calling an
ODBC source of data, it must be protected to ensure that the userid and
password in the source is protected. [Software Development Security]
9. C - The Brewer and Nash model, also known as the Chinese Wall model was
designed to allow access controls to dynamically change based on previous
actions that a user performed. This model's main goal is to protect an
organization's assets from a user's conflict of interests by automatically
denying access to resources that would cause a conflict of interest. [Security
Engineering]
10. A - The Brewer-Nash model is also known as a Chinese Wall and is used in
situations of conflict of interest. In the current scenario, the company should
ensure that the activities of the two departments are clearly separated to avoid
conflicts of interest. [Security Engineering]
11. A - The Clark-Wilson model was developed as an extension to the Biba model.
Concepts in the model revolve around the inability to directly access and/or
manipulate objects to prevent data corruption. [Security Engineering]
12. A - The CoBIT stands for Control Objectives for Information and related
Technology. This is published by the IT Governance Institute and is an effective
IT Governance framework. COSO is a model for corporate governance, while
ISO 17799 and ISO 27001 are enterprise security standards. [Security and Risk
Management]
13. C - The company has accepted the risk by choosing to ignore it. This is based
upon the fact that the risk of its occurrence is a remote possibility. Such a
decision should also be documented well. [Security and Risk Management]
14. D - The company has decided to mitigate the risk. They have added protection
to ensure that the risk has a smaller opportunity of occurring. Residual risk is
the term for the amount of risk left after a mitigating control is put into place.
[Security and Risk Management]
15. A - The company will need to install both a NIDS as well as a HIDS. The NIDS
monitors network traffic whereas the HIDS detects anomalous activity on the
critical server. [Identity and Access Management]
16. C - The company should have the employee sign a nondisclosure agreement.
While the other choices go towards reducing the risk of hiring the employee or
ensuring that he/she is aware of the security policies, it is the nondisclosure
agreement which will protect the company's information and can be legally
enforced. [Security and Risk Management]
17. B - The concept of least privilege is to start each account at zero privileges and
add only the access needed to perform required job functions and no more.
[Identity and Access Management]
19. A - The correct procedure would be to sanitize the production data and provide
this to the supplier. The other options do not serve the purpose. Connecting
through a secure VPN link to the organization ensures that the data is secure,
however, it does not prevent the vendor organization from getting access to raw
production data, which could then be misused. [Security and Risk Management]
21. B - The correct response is end-to-end encryption. This provides the user more
flexibility in choosing how and what is encrypted. [Asset Security]
22. D - The correct response is that the security policy around email monitoring
must first be outlined. The next step would be to prepare a document that
employees can read and sign. [Security and Risk Management]
24. C - The countermeasure cost per year should not exceed the annualized loss
expectancy. Hence in the current case where both are equal, it may not be viable
for the company to use this countermeasure. [Security and Risk Management]
25. B - A CPTED guideline is that a side door at the facility, with restricted access,
should not have a sidewalk leading up to it from the front of the building. This
will ensure that unwanted people are not aware of its existence and do not use it.
The other choices are contrary to CPTED guidelines. [Security Operations]
26. A - The creator of a file is the owner in a discretionary access control model
(DAC). An administrator may possess privileges to override this and take
ownership, but that is only in case of emergencies. [Identity and Access
Management]
27. C - The data decompression of the MPEG file would happen at the presentation
layer. There are only services and no protocols that work at this layer.
[Communications and Network Security]
28. B - The DMZ is the demilitarized zone and is a network segmented between a
protected and unprotected network. To implement this, setup a firewall between
the internal network and DMZ and another between the DMZ and external
network. [Communications and Network Security]
29. A - DSA was primarily created for the purpose of digital signatures. It cannot
encrypt data and cannot be used for key exchange. [Asset Security]
30. D - IPv6 is the next generation of IP addressing and uses 128 bits. It also
provides many other capabilities that IPv4 does not. [Communications and
Network Security]
31. A - The first level in the Orange Book that requires labels is B1 (Labeled
Security). At the B1 level each subject and object will have its own security
label. To be granted access, the subject and object labels will have to be
compared and match accordingly. This level has the ability to support classified
data. [Security Engineering]
32. C - The first level in the Orange Book that requires users to be individually
identified and accountable for their actions is C2. C2 users are required to
authenticate to the system which proves the individual's identity within the
system. The system is then able to track the user's activities and associate this
information with the user's account credentials in the system log files. [Security
Engineering]
33. D - The first priority in the aftermath of a disaster would be to ensure that the
employees are safe and there is no loss to life. [Security and Risk Management]
35. D - The goal is prevention, rather than detection. Use of video surveillance is
the least effective of the options listed since an individual who has cracked the
PIN code can still access the door. [Security Operations]
37. C - The ground floor is more accessible to emergency crew in case of fires.
The center of a building is better than the edges for protection against bombs,
weather events, and intruders. Site generation for intermediate-term backup
power is important for a data center. Finally, a carpet is to be avoided when
dealing with equipment sensitive to static electricity. [Security Operations]
38. D - The SHA1 algorithm uses 160 bits. This makes it more resistant to the
birthday attack which is a type of brute-force attack. [Asset Security]
39. A - Policies are overall general statements produced by senior management (or
a policy board / committee). For example, system-specific policies could detail
out management's view on how databases are to be used and protected. [Security
and Risk Management]
40. C - The highest level of maturity in the Capability Maturity Model is a process
that is optimized, or one that essentially cannot be made more efficient.
[Software Development Security]
Domain Area Test: Asset Security
Practice Questions
Test Description
This practice test specifically targets your knowledge of the Asset Security domain
area.
Test Questions
A. Sniffing attack
B. Ciphertext-only attack
C. Replay attack
D. Chosen-plaintext attack
A. Encrypting a message
C. Hashing a message
3. Which term best describes the method used to transform plaintext information
into ciphertext?
A. Incipher
B. Decryption
C. Encryption
D. Decipher
A. Application
B. Network
C. Physical
D. Session
A. El Gamal
B. 3DES
C. MD4
D. DES
A. Nonrepudiation
B. Integrity
C. Authenticity
D. Confidentiality
A. El Gamal
B. Diffie-Hellman
D. IDEA
A. A web of trust
9. Which protocol relies on a “web of trust” for its key management approach
instead of a hierarchy of certificate authorities?
A. RSA
B. SSL
C. PGP
D. Deffie-Hellman
A. RC4
B. Blowfish
C. RSA
D. DES
12. Which method involves the hiding of data within another form of media so that
the existence of the original data is concealed?
A. Steganography
B. Stenography
C. Tasseography
D. Cryptography
13. Which type of cipher replaces bits, characters, or blocks with different bits,
characters, or blocks?
A. Permutation cipher
B. Substitution cipher
C. Transposition cipher
D. Replacement cipher
14. What type of cipher moves bits, characters, and blocks around to hide the
original plaintext message?
A. Scramble cipher
B. Replacement cipher
C. Substitution cipher
D. Transposition cipher
15. Which of the standards listed identifies the format for public key certificates?
A. X.21
B. X.400
C. X.500
D. X.509
Domain Area Test: Asset Security
Answer Key and Explanations
4. B - IPSec runs at the Network layer of the OSI model. No encryption is possible
at the physical layer. [Asset Security]
6. A - Nonrepudiation means that the sender cannot deny, or repudiate, that the
message was sent. The clearinghouse was simply doing what they were
contracted to do. [Asset Security]
7. D - Of the choices, only IDEA is a symmetric algorithm. The rest of the choices
are asymmetric algorithms. [Asset Security]
10. B - Private keys are never shared. Alan needs Bob's public key to encrypt a
message that only Bob can decrypt using his (Bob's) private key. If Alan
encrypts a message with his own public key, then only Alan's private key can
decrypt it - which does not serve the purpose. [Asset Security]
11. C - RSA is the only asymmetric algorithm listed among the choices. The others
are all symmetric algorithms. [Asset Security]
12. A - Steganography is a method that involves the hiding of data within another
form of media so that the existence of the data is concealed. An excellent
example of this is hiding a text message within a picture. You can accomplish
this by changing some of the pixels to letters so that they can be read under a
microscope but to the naked eye it appears as just a pixel that completes the
entire picture. [Asset Security]
13. B - The substitution cipher replaces bits, characters, or blocks with different
bits, characters, or blocks to create the ciphertext. For example, if you wanted to
encrypt the plaintext term “James” and you were using the English alphabet and
moving three positions to the right, the new ciphertext would be “Mdphv”.
[Asset Security]
14. D - The transposition cipher rearranges and scrambles bits, characters, and
blocks to hide the original plaintext message. A key is used to keep track of
where the original bits, characters, and blocks would normally be. A
transposition cipher can be very simple or very complex. It can use
mathematical calculations to create a very strong cipher that is difficult to
break. [Asset Security]
Test Description
This is a cumulative CISSP Mock Exam which can be used as a benchmark for your
CISSP aptitude. This practice test includes questions from all eight domains of the
CISSP CBK.
Test Questions
2. Which layer of the TCP/IP model maps to the Network layer of the OSI model?
A. Host-to-Host
B. Application
C. Internet
D. Network Access
3. If you are looking for a less expensive but secure encryption method, you
would prefer to use:
A. Ring 2
B. Ring 3
C. Ring 1
D. Ring 0
A. Employees may not reveal their network login IDs and passwords, except if
asked by their supervisors.
B. Employees need to disclose all removable media that they are carrying with
them, except in the case of music CDs or DVDs.
A. Execution
B. Accountability
C. Cooperation
D. Prosecution
A. Birthday
B. Man-in-the-middle
C. Smurf
D. Teardrop
11. Which security model has the ability to address the inference attack?
A. Lattice model
B. Noninterference model
C. Biba model
D. Graham-Denning model
A. Protect Systems
C. Evacuate
13. Which of the following would be true if you were using Kerberos security
technology?
C. Kerberos protects the network traffic even when encryption is not enabled
14. Of the protection rings used by operating system security, in which of the
following would the operating system kernel reside?
A. Ring 4
B. Ring 6
C. Ring 2
D. Ring 0
15. What is the correct order of sensitivity levels for data classification in
commercial business (from lowest to highest)?
16. A company needs to selectively encrypt e-mail messages. What choice would
you recommend?
C. Kerberos
D. Link encryption
17. Radio frequency interference (RFI) frequently occurs in buildings. Which of the
following is the primary cause of RFI?
A. Backup generators
B. UPS equipment
C. Telephone lines
D. Fluorescent lighting
A. By a column key
B. By a primary key
C. By a tuple key
D. By a row key
20. Which of these books mainly addresses government and military expectations
for their computer systems?
A. Aqua Book
B. Red Book
C. Orange Book
D. Blue Book
21. Which term best describes an abstract machine that ensures all subjects have the
access rights necessary before accessing objects.
A. Security perimeter
B. Security kernel
C. Reference monitor
D. Secure state
22. What technique utilizes anonymous opinions by members of the risk analysis
team?
A. Classification
B. Quantitative
C. Delphi
D. Safeguard
A. Risk Assessment
B. Vulnerability Assessment
C. Threat Assessment
D. Agent Assessment
24. Ben works for an auditing firm on a team that specializes in social engineering.
At a client site, he carries an armload of boxes to a secure entrance and waits
for a helpful employee to open the door for him. Once inside, he poses as a
printer repair person and accesses data from the stations of several
administrative assistants. Which of the following would be options would be
successful in preventing such breaches in the future?
25. Which of these accurately depicts the relationship between total risk,
countermeasures and residual risk?
26. What does the Asset Value multiplied by the Exposure Factor yield?
B. Exposure Factor
C. Residual Risk
27. From a security perspective, if you wish to ensure that internal and external
resolution requests to the DNS server are handled separately, how can this be
achieved?
28. Which of the following passwords is the strongest of the choices listed?
A. PasswordBob123
B. P999000
C. kathy!
D. KaJM22!4
29. A company is concerned that the system administrator might abuse his elevated
privileges. They implement a plan that removes all of the administrator's
privileges to the server logs and charge a security auditor with the task of
viewing them. What would this be known as?
A. Separation of duties
B. Change Management
C. Least Privilege
D. Regulatory Compliance
30. Which of the following refers to the level of trust a system provides rather than
the level of security it provides.
A. ISO-9000
31. Which of these is the correct order in which the Zachman framework for
enterprise architecture should be approached?
A. Scope context boundary, Business model concepts, System model logic,
Technology model physics.
32. When working with United States military classifications, which answer best
ranks the level of classification in order from low to high?
33. Fire code regulations dictate that data centers and server areas should have two
doors. What is the usual best practice followed to minimize security issues?
A. Have separate doors for entry and exit purposes respectively. Ensure that a
security guard is posted at each of the doors.
B. Have one door for daily entry and exit into the secure area. The other door
should be used only in emergencies and should have a panic bar.
C. Have only one door for entry and exit into a data center. In the interests of
security, the fire code regulations can be overruled in case of data centers.
D. Have two doors into the facility, but only one door should be conspicuous.
The other door should be known to only a handful of people and should not
be publicized.
B. Implement an NIS
36. Several measures can be taken to help protect against electric power issues.
Which of these is NOT a recommended method of protecting devices?
C. Plug power bars into other power bars to help provide additional protection
37. Which is NOT an integrity goal that is addressed by the Clark-Wilson model?
C. Auditing is required
D. It will run much faster but cannot provide redundancy in case the connection
to the internet is dropped
A. Trojan horse
B. DNS poisoning
C. A worm
D. DNS reconfiguring
40. A biometrics system rejects access to an authorized subject. What is this called?
A. Type II Error
C. Type IV Error
D. Type I Error
CISSP Mock Exam (LITE) - 7
Answer Key and Explanations
1. A - Such a reporting structure reduces any message filtering that may happen
due to any hierarchy structure that exists and improves communication. This is
ideally suited for firms that have high security needs. [Security and Risk
Management]
2. C - The Internet layer of the TCP/IP model maps to the Network layer of the
OSI model. [Communications and Network Security]
4. D - The kernel is the most protected area of the operating system. The
Protection Ring security mechanism prevents higher ring levels from directly
accessing lower rings. For example, Ring 0 can directly access Ring 1,
however, the reverse is not true. Rings 0 and 1 are considered System,
Supervisor, or Privileged Modes [Security Engineering]
5. A - The Key Distribution Center is a single point of failure and is the most
important component of a Kerberos system. TAS and AGS are not valid choices
while PAC is used by SESAME. [Identity and Access Management]
6. C - The likely input given by Bert is that employees should confront any
individuals inside the organization premises who do not have a clear
identification badge prominently displayed, and politely ask them who they are.
Employees should also ask them why they are not displaying an ID and escort
them to the nearest security officer. This will go a long way in preventing any
adverse incidents. [Security Operations]
11. B - The Noninterference model has the ability to address the inference attack.
An inference attack occurs when someone has just enough information to infer
(guess) about other information that they are not allowed to access or view. The
Noninterference model addresses this attack by ensuring that any actions that
occur at a particular security level do not affect or hinder the actions that occur
at a lower security level. This prevents information from leaking from higher
security levels down to lower security levels. [Security Engineering]
12. D - The first priority of an individual is to render immediate medical care and
aid. This should also be clearly stated in the Business Continuity and Disaster
Recover Plan. [Security and Risk Management]
13. A - Redundancy is necessary for the KDC in a Kerberos system. The KDC can
turn out to be a single point of failure and if it goes down, no one will have
access to the required resources. [Identity and Access Management]
14. D - The operating system kernel is in ring 0. Subjects in other rings cannot
access this ring directly but need to make requests to access this ring. [Security
Engineering]
16. A - The preferred choice is Pretty Good Privacy (PGP). This is a public key
encryption program and is a complete cryptosystem to protect email and files.
The other choices are not valid responses. Link encryption may be used if all
data on the company's network needs to be encrypted. Kerberos may be
implemented when single sign-on is required. Private Signed Mail does not
exist. [Asset Security]
18. B - A primary key uniquely identifies a row within a relational database. The
other choices are not valid. [Software Development Security]
20. C - The Orange Book mainly addresses government and military expectations
for their systems. However, there are a number of deficiencies in the Orange
book and the focus is now to move towards Common Criteria. [Security
Engineering]
22. C - A risk analysis team may use the Delphi technique when conducting
qualitative risk analysis. Each member of the team anonymously submits their
opinions with regard to asset values, security threats, and their probabilities of
occurring in the organization. The comments are collected and shared among
the team, after which another series of anonymous contributions are made to
gather feedback. This process continues within the group until a consensus is
reached. [Security and Risk Management]
23. A - Threats and vulnerabilities are determined in the risk assessment phase. At
this time the total risk is obtained by multiplying the value of the assets being
assessed and the possibility of a vulnerability being exploited. [Security
Engineering]
24. A - Social engineering involves playing on the emotions of employee such that
they unwittingly help in a crime. This can be addressed by better and more
regular security awareness training. In the current scenario, a helpful employee
allowed an unknown person to enter the facility. More cameras, better alarms
etc will not stop social engineering. [Security Operations]
25. B - Residual risk is the risk that remains after a company implements
countermeasures to handle risks. Hence at a conceptual level, Total risk -
Countermeasures = Residual risk.
Note that this is not a mathematical formula, but depicts the relationship
between the three entities. [Security and Risk Management]
26. A - The single loss expectancy is the dollar amount an organization might
assign to a single event representing the potential loss if a specific threat took
place. It is determined by multiplying the asset value and the exposure factor
(exposure factor is the percentage of loss a realized threat could have on an
asset). [Security and Risk Management]
27. A - The solution is to implement a split DNS. In this, a DNS server is installed
in the DMZ to handle external resolution requests. This ensures that the internal
DNS is not directly accessible through the internet and has additional layers of
protection since both external and internal requests are handled separately.
[Communications and Network Security]
28. D - The strongest passwords are those with a mix of upper and lower case
letters, numerical digits, and special characters. The best passwords are
constructed via a phrase that can be easily remembered rather than made up of
dictionary words. The other passwords are not as strong since they are
susceptible to being guessed. [Security Operations]
29. A - The system administrator in this example is prevented from covering his
tracks by editing the log files. The auditor views the logs to make sure nothing
is inappropriately used. This separates the administration and the auditing
duties. [Security Operations]
30. D - The Trusted Computing Base, or TCB, was developed after the Orange
Book, but is more concerned with trust levels rather that system security.
Communications between trusted components and untrusted components must
be regulated. [Security Engineering]
31. A - The correct order in which the layers of the Zachman framework are
approached are: Scope context boundary, Business model concepts, System
model logic, Technology model physics, Component configuration and
Functioning enterprise instances. [Security Engineering]
32. B - The US Military classifies information in the following way from highest to
lowest: Top secret, Secret, Confidential, Sensitive but unclassified, Unclassified.
Note that the question asked for the reverse order. [Identity and Access
Management]
33. B - The usual best practice is to have two doors to the facility. However, only of
these should be used for daily entry and exit from the facility. The other should
be equipped with a panic bar so that the door can open only from the inside. The
other option of using multiple doors and posting security guards may also
work but is not a preferred solution since it will increase costs. [Security
Operations]
34. C - Installation of DNSSEC on all DNS servers will prevent this type of attack
because two DNS servers communicating with each other will authenticate each
other. However, in practice if DNSSEC has to work properly, all DNS servers
on the internet would need to participate in a PKI to validate digital signatures
and this is quite impractical. [Communications and Network Security]
35. B - The Zachman framework serves as a model that can be used to create robust
security architectures that deal with multiple components across the
organization. [Security Engineering]
36. C - There are a number of things that can be done to help protect against
electric power issues. Power bars and extension cords should always be
plugged into their own wall sockets to prevent possible fire hazards. Plugging
power bars into other power bars, or extension cords results in safety issues.
[Security Operations]
37. D - One of the ways in which the Clark-Wilson model addresses a goal of
integrity is that subjects can access objects only through authorized programs
and not just any program. [Security Engineering]
39. B - This can be done using a DNS poisoning attack. In this attack the
cybercriminal will listen for requests from a particular DNS server when it is
trying to resolve a particular hostname. When this happens, he quickly sends a
request to the server with the incorrect mapping and causes a false redirection.
[Communications and Network Security]
40. D - This is a called a Type I error, or a False Negative (Reject). In this case an
authorized subject is prevented access and this is usually more of an
inconvenience rather than a breach. [Identity and Access Management]
Domain Area Test:
Software Development Security
Practice Questions
Test Description
This practice test specifically targets your knowledge of the Software Development
Security domain area.
Test Questions
B. Smurf attack
C. Fraggle attack
2. What type of mobile code control serves as a protected area for a program to
execute?
A. Sandbox
B. Access matrix
C. Kernel
D. Covert channel
3. Which form of malware has the ability to reproduce itself and is classified as
self-contained?
A. Trojan horse
B. Logic bomb
C. Virus
D. Worm
A. A user has the permissions to access information, and does not have the
required permissions to access subsets of the same information.
B. A user lacks the permissions to access information, but has the required
permissions to access subsets of the same information.
C. A user has the permissions to access information, and also has the required
permissions to access subsets of the same information
D. A user lacks the permissions to access information, and does not have the
required permissions to access subsets of the same information.
A. High-Level
B. Assembly
C. Machine
D. Interpreter
6. Pre-compiled code runs faster than interpreted code but can be considered less
secure. Is this statement correct?
A. Yes. Pre-compiled code runs so quickly that it can tie up CPU resources and
cause availability issues.
C. Yes. Interpreted code relies on the integrity of the host system for security.
Therefore it has no security holes. This is not the case with Pre-compiled
code.
B. Confidentiality Only
C. Integrity Only
A. Security Bifurcation
B. Monolithic Security
C. Defense-in-depth
A. ADO
B. OLE DB
C. ODBC
D. XML
10. Every foreign key in a relational database refers to an existing primary key.
This type of integrity is known as:
A. Database Integrity
B. Referential Integrity
C. Entity Integrity
D. Key Integrity
11. Which of the following provides a simple and effective mechanism to protect
against buffer overflow vulnerabilities?
A. Input Validation
B. Policies
C. Firewalls
D. High Availability
A. Availability Only
B. Integrity and Availability
C. Integrity Only
D. Confidentiality
A. Software Escrow
B. Expert System
D. Database Cluster
14. What type of attack occurs when an attacker sends packets that are too small?
A. Fraggle
B. Teardrop
C. SYN flood
D. Smurf
15. A set of procedures that are used to carry out changes that affect software,
individual systems or the network is called:
A. Application management
B. Configuration management
C. Baseline management
D. Migration management
Domain Area Test:
Software Development Security
Answer Key and Explanations
7. D - Confidentiality was breached because a copy of the private data was made.
Integrity was breached because bad data was merged into the files. Availability
is not an issue in this scenario. [Software Development Security]
11. A - Input validation prevents unexpected data from being entered into database
fields and provides a simple form of protection against buffer overflow errors.
[Software Development Security]
12. C - Integrity was breached due to the fact that bad data was written to the
database. Because of the role of a node in the Active/Passive configuration, the
bad data was propagated to the other sites. Availability is not an issue, as the bad
data was available. Confidentiality too is not an issue. [Software Development
Security]
14. B - Teardrop attacks occur when an attacker sends packets that are too small and
result in a system locking up or rebooting. This type of attack takes advantage
of the fact that systems do not check to see if a received packet is too small. The
attacker creates these small packets in such a way that when the receiving
system attempts to recombine the fragments, they can not be reassembled
properly. [Software Development Security]
15. B - Configuration management is the set of procedures that are used to carry
out changes that affect software, individual systems or the network. [Software
Development Security]
CISSP Mock Exam (LITE) – 8
Practice Questions
Test Description
This is a cumulative CISSP Mock Exam which can be used as a benchmark for your
CISSP aptitude. This practice test includes questions from all eight domains of the
CISSP CBK.
Test Questions
C. Database controls which can be configured to let some users see only
certain information.
D. Database views which restrict a set of users from seeing certain information.
A. Buffer overflow
B. Covert channel
C. Memory reuse
D. Trapdoor attack
B. Cell suppression
4. A film distribution company creates a website that advertises “Click Here for
Free Movies.” They record all individuals who download these files and attempt
to prosecute for copyright infringement. What would such an activity be termed
as?
A. Entrapment
B. Scandal
C. Enticement
D. Libel
A. A programmer inadvertently inserted the code into the program during the
development stage.
B. This is normal programming practice. The code is known only to the group
of people who programmed it, so it is unlikely to be exploited by a hacker.
C. A hacker gained access to the production system and inserted code which
could be used to exploit the system later.
D. A programmer inserted the code into the program during development to
access the system if the access control mechanism failed during
development.
A. Spyware
C. A prank
D. Logic bomb
7. An algorithm has been chosen such that a minor change in the key results in a
completely different ciphertext being produced. This is referred to as:
A. Weak Hashing
B. Avalanche effect
C. Diffusion
D. Confusion
8. Andy receives a mail which informs him that if he forwards the email to ten
other people he will have 'good luck' for the rest of the day. Andy promptly
complies with this request. This would be termed as a:
A. Meme virus
B. Multi-part virus
C. Human virus
B. Curtis filtering
C. Polynesian filtering
D. Bayesian filtering
10. Servers are placed on one network segment and all of the workstations on a
second segment. The router in between these two networks is configured to
only pass traffic a handful of required ports. What is this termed as?
B. Domain Services
D. Network Segregation
11. Rick performs certain critical operations at work. Due to a serious illness, Rick
is unable to report to work. The company is ill-prepared for this and work
suffers for many days before normalcy is restored. This could have been
avoided by implementing:
A. Job Rotation
B. Mandatory Reporting
C. Separation of Duties
13. A policy that outlines what is acceptable behavior within an organization and
also outlines the repercussions of not complying with such a policy would be
considered as what category of policy?
A. An advisory policy
B. A regulatory policy
C. An Informative policy
D. A standard policy
14. A protester hacked a government website and put up protest banner images on
it. This type of cyber-crime would be classified as:
A. A computer-targeted crime.
B. A computer-assisted crime
C. A computer-violation
15. The entity that takes advantage of a vulnerability to endanger systems is called:
A. Threat
B. Threat-agent
C. Risk
D. Exposure
16. An audit board found that a bank was poorly prepared to handle disasters and
that the bank's current choice of backup site would not be operational in a
timely manner following a disaster. If cost is not an issue and the bank needs to
be fully operational within TWO hours of a disaster, what kind of site should
the bank use?
A. Cold Site
B. Warm Site
C. Dead Site
D. Hot Site
17. While preparing a BCP/DRP, goals are established so that everyone involved is
aware of the ultimate objective. Which of these is not key information that is
part of a goal?
A. Responsibility
B. Strategies
C. Authority
D. Priorities
19. Which of these is a very important consideration for accurate event correlation
and forensics?
A. Chain of Custody
B. Separation of Duties
C. Chain of responsibility
A. OSP
B. CP
C. TCP
D. UDP
A. The continuity planning project team (CPPT) will need to find cheaper
alternatives to cope with a disaster.
B. The savings in the cost of the backup equipment will make up for the
potential revenue loss when a disaster strikes.
C. The continuity planning project team (CPPT) will be held responsible for
drop in customer service levels when a disaster strikes.
D. The customer service level will likely drop when a disaster strikes and the
company may be unable to service customers properly.
23. Jim is caught spending a great amount of time and resources sending non-work
related emails on subjects the leadership of the company would not approve. He
is summarily fired. Jim sues for wrongful termination on the basis that he never
gave permission for his email to be monitored. If his case succeeds, which of
the following options is most likely to be the reason?
A. Chain of custody
B. Freedom of speech
C. Legal council
24. A junior network technician has approached you and wishes to know what type
of cable is the least resistant to electromagnetic interference (EMI). Which of
these would you select?
B. Coaxial
C. Fiber-optic
25. You wish to implement a control mechanism for mobile code. A good option is:
26. A certain organization has multiple teams that take turns with off-hours support
duty. Their work requires that they have elevated privileges on the firewalls,
servers, and infrastructure devices. What type of access control scheme would
best be used in this situation?
A. MAC
B. RBAC
C. LDAP
D. DAC
27. What is the most common method used to locate unsecured wireless networks?
A. War dialing
B. War driving
C. Piggybacking
D. Salami
29. As part of the business impact analysis, individual threats are identified and loss
criteria are applied. Which of the following is an incorrect criterion while
considering business impact due to a potential disaster?
A. Decrease in operational expenses.
B. Loss in revenue
D. Loss of reputation
A. All deviations from the written standard, serial number, date, and technician
name
B. Deviations that lower security level from that of the standard, serial number,
date, and technician name
31. In which of the following situations could you say that the integrity of data has
not been lost?
A. A New Year's greeting sent by the CEO of a company to all its employees is
intercepted and altered.
D. The credit card number of a cardholder finds its way into public domain.
32. When a data center facility has been flooded, what is the best way to handle the
situation?
33. Your company is implementing wireless technologies to provide users with the
mobility they require to perform their day to day activities. Management has
approached you and is questioning the security of the wireless technologies in
relation to war driving. You need to assure them that the network will be
secured against war driving. Which of the following measures will not provide
protection against war driving?
B. Physically place the access points within the middle of the buildings.
34. Which of the following is not a type of response to operating system failure?
A. System jumpstart
C. System reboot
35. A large bank and a hospital decide that in the event of a disaster at either of their
facilities, the other will provide facilities for short term business continuity.
Under this agreement, the Information Technology staff of the affected entity
will be provided with workstations, necessary connectivity, electricity, and
office space. What is this known as?
A. Joint BCP
B. Reciprocal Agreement
C. Warm Site
D. Active/Active Agreement
A. STP
B. Fiber-optic
C. XTP
D. UTP
37. A hard drive containing evidence of a possible breach is given to several local
computer stores for general advice before finally handing it over to a
professional data forensics expert. What principle has been violated by not
maintaining a signed history document?
A. Chain of custody
B. GLBA
C. SOX
D. Protocol
38. Which of these roles is responsible for data protection and will be held liable in
case of any negligence that resulted in the breach of the data?
B. Security Officer
C. Systems Administrator
D. Network Administrator
39. The main difference between compartmented security mode and the other
security modes is:
B. All users must have proper clearance for the highest level of data
classification in the system.
C. All users need to sign an NDA for the information they will access.
D. All users must have proper clearance for the lowest level of data
classification in the system.
40. If employees find a USB drive labeled “Beach Vacation Pics” plugged into a
computer system at work, what should they be trained to do?
D. Throw it away
CISSP Mock Exam (LITE) – 8
Answer Key and Explanations
8. A - This is termed as a meme virus and is not actually a virus. Such email
messages, hoax virus alerts, religious messages that are continually forwarded
on the Internet by people waste valuable resources. [Software Development
Security]
9. D - Bayesian filtering is used to detect spam. This is a mathematical method and
it reviews prior events to predict future events and quantifies uncertainty to
detect spam. [Software Development Security]
10. D - This is network segregation and helps segregate networks and subnets from
each other. [Communications and Network Security]
11. A - This type of situation is best handled by job rotation. Job rotation would
have allowed an individual other than Rick to do the job and the company
would not have struggled to handle this situation. The other choices listed
would not help in this matter. [Security and Risk Management]
12. D - This was most likely due to poor incident-handling procedures in the
company. Employees need to be aware how such incidents are handled and
should not feel threatened by reporting such incidents. [Security and Risk
Management]
14. B - This would be termed as a computer-assisted crime since the protester uses
the computer as a tool to carry out an attack such as a protest against the
government. In contrast a 'computer-targeted' crime targets a computer to gain
some information while a 'computer is incidental' crime is a situation where the
computer is just incidental to the attack and not the primary purpose of the
attack. [Security and Risk Management]
18. C - Trade secrets are usually proprietary to the company. They are used to
create products, but they are not the products themselves. Copyrights protect the
products (such as software) from being sold as original works by some other
company. [Security and Risk Management]
19. D - Two events from two different systems can be very meaningful when
correlated together. This requires an accurate and precise time stamp on each of
them. [Security Operations]
20. A - Two parties communicating with each other can use digital signatures for
authentication purposes before accepting each other's public key. This will
allow them to securely authenticate each other and communicate safely. [Asset
Security]
21. D - For the given application, even if there is a node on the network which does
not receive the status information due to a dropped packet, it is acceptable since
it will receive it on the next update. Hence UDP is preferred in such cases. Using
TCP for this requirement may not be efficient since TCP requires a higher
overhead. [Communications and Network Security]
22. D - Understating the loss of revenue results in poor and inadequate readiness to
cope with disaster. The most obvious impact will be that the company will be
unable to restore customer service levels adequately in a manner required by
the business. [Security and Risk Management]
23. D - Unless employees sign or in some other way acknowledge that they have no
expectation of privacy, in most states they do have a legitimate (and legal)
expectation of privacy. To mitigate this risk, all employees should be required
to sign an acceptable use agreement as a condition of employment. [Security
and Risk Management]
24. A - Unshielded Twisted Pair (UTP) cable provides very little protection against
EMI. It contains insulated copper wires that are surrounded by an outer jacket.
The wires are twisted into pairs to provide protection against EMI. However,
UTP is more susceptible to EMI as compared to the other choices.
[Communications and Network Security]
25. B - Use of a sandbox is a good control mechanism for mobile code. The
sandbox places a limit on the memory and resources available to a program. If
this is exceeded, an error is logged and the program is terminated. [Software
Development Security]
26. B - Using RBAC, roles are created for various job functions. Permissions to
perform certain operations are then assigned to specific roles. Anyone in the
role has the ability to access the resources needed. DAC and MAC do not
provide this flexibility. LDAP is a directory system, not an access methodology.
[Identity and Access Management]
28. D - When a biometric system accepts an individual who should have been
rejected, it is referred to as a Type II error or false acceptance rate. Type II
errors are dangerous, as an unauthorized individual obtains access to resources
that they should not have access to. [Identity and Access Management]
29. A - When a disaster strikes, the operational expenses will most likely increase
rather than decrease. All the other choices are correct and need to be included
as part of loss criteria. [Security and Risk Management]
31. D - When the credit card number of a cardholder is released into public
domain, the confidentiality of data or information is lost since the information
is now available to unauthorized people. In the other three instances, the
integrity of data is lost since the original value or content has been altered.
[Identity and Access Management]
33. A - War driving is a common attack on wireless networks and involves people
who try to identify Access Points (APs) and break into them. Best practices for
wireless LANs include disabling and not enabling 'broadcast SSID” on the
network. [Communications and Network Security]
34. A - System jumpstart is not a valid response. The other choices are valid
responses. System reboot happens when the system shuts itself down in a
controlled manner. Emergency restart happens after a system failure in an
uncontrolled manner. System cold start takes place if an unexpected kernel or
media failure takes place. [Security Operations]
37. A - Evidence that has been handled without proper controls would not be
admissible in court. [Security and Risk Management]
38. B - A security officer is responsible for data protection and is held liable in
case of any breach of data. [Security and Risk Management]
39. B - The main difference between compartmented security mode and the other
modes is that all users must have proper clearance for the highest level of data
classification in the system. In the other modes proper clearance is required for
all information in the system. [Security Engineering]
40. A - This incident may be part of an organized attack and hence appropriate
security procedures need to be followed to handle this. This method of attack is
often used to run background scripts to steal passwords, copy the entire email
history, etc. and email it to the hacker's address. [Security Operations]
Domain Area Test:
Security Operations
Practice Questions
Test Description
This practice test specifically targets your knowledge of the Security Operations
domain area.
Test Questions
1. Some personnel are trained in CPR and other procedures and stationed
throughout an organization to aid their colleagues when the need arises. What is
this group normally called?
B. Server Passwords
3. Susan is driving by her office late one night and sees intruders attempting to
gain entrance through a darkened front window. She follows a procedure and
calls the control room, which is staffed on a 24 x 7 basis to report what she has
seen. What type of procedure would this be?
D. Governance Procedures
5. Which of the following physical security controls are detective rather than
preventative?
A. Moat
B. Fence
C. CCTV
B. Guard Dogs
C. Perimeter Fencing
D. CCTV
7. For what class of fires would you use carbon dioxide (CO2)?
A. Class C and D
B. Class B and C
C. Class A and B
D. Class A and D
A. Spike
B. Brownout
C. Sag
D. Fault
9. While away on business you are forced to leave a company laptop unattended in
your hotel room for several hours. What would be the best method of securing
the sensitive data stored on this laptop from theft?
A. Combination lock
B. Smart lock
C. Cipher lock
11. A company has two feeder supplies for electrical power. In addition, it has a
provision for backup generators. Which of the following choices would offer
the best benefits while planning for backup in case of a power failure?
A. The generator room should be located close to the data center so that there
is minimum loss of power during transmission.
B. The two feeders should be connected to the same electrical station, but via
different paths.
D. The capacity of each generator should be equal to one quarter the maximum
load of the data center.
12. Locks act as delaying devices and hold up intruders if they are properly
installed. Which of these locks provides the highest level of security?
A. A tumbler lock
B. A warded lock
D. A cipher lock
B. Lighting should be directed away from the gates and inwards to deter
intruders.
14. Procedural security involves procedural controls within the company. Which of
the following procedural controls may require special consents from
employees?
B. Have a policy of job-rotation so that the same employees do not handle the
same responsibility all the time.
6. B - Among the options listed, guard dogs are the most expensive to maintain.
[Security Operations]
7. B - Carbon dioxide (CO2) is used to put out class B and class C fires. It is bad
for most types of life forms since it works by removing oxygen from the air.
Hence a delay mechanism is often used so that CO2 is applied after people have
had time to evacuate. [Security Operations]
9. D - In most cases it is best to never leave your laptop unattended. If you must
leave your laptop unattended for any extended period of time, the best way to
secure the sensitive data on the laptop hard drive would be to encrypt it. This
would ensure that the data is not accessible even if it is stolen. [Security
Operations]
10. B - A smart lock is a type of cipher lock that can allow for individual
accountability by assigning specific codes to each individual. Smart locks can
also be configured to allow certain codes access to the facility only at certain
times. [Security Operations]
11. C - The two electrical feeders should ideally be connected to different electrical
power stations else the whole purpose of having two feeders is lost. The other
choices don't help as much. Having two separate paths to the same station for
the feeders will not help in case of an outage at the power station. The generator
room should not be located near the data center and the total generator capacity
should be planned such that it can handle the load of the data center. [Security
Operations]
12. D - Cipher locks provide the best level of security. They are expensive
compared to traditional locks but they have a number of additional features
which makes them very desirable for office environments. [Security
Operations]
13. B - Lights should be directed towards an area from which an intruder is likely
to come, rather than away from it. Hence it should be directed at gates. The
other choices mentioned are correct uses of lighting. [Security Operations]
14. B - Use of CCTV to monitor personnel has the potential to violate the privacy
of individuals. Hence it needs specific consents from employees. [Security
Operations]
15. D - The first step would be to institute a security awareness program which
trains employees and increases their awareness of security policies. A key point
to note here is that some of the security policies will be on a need-to-know basis
so ALL security procedures cannot be publicized. Penalizing employees is too
drastic a step and may come in at a later stage. [Security Operations]
CISSP Mock Exam (LITE) – 9
Practice Questions
Test Description
This is a cumulative CISSP Mock Exam which can be used as a benchmark for your
CISSP aptitude. This practice test includes questions from all eight domains of the
CISSP CBK.
Test Questions
1. Joe wants to exchange data with 100 other users using symmetric key
encryption. How many separate keys does Joe need to have?
A. 101 keys
B. 100 keys
C. 1 key
D. 99 keys
2. A computer data center hosts 10 servers. At any given time, it is expected that
only 1 server may fail. The cost of each of the servers is $ 10,000. The
frequency at which a server may fail in a year is 0.1. What would be the
annualized loss expectancy (ALE) for the data center due to a file server
failure?
A. $10,000
B. $1,000
C. $100
D. $100,000
3. A company has a trade secret that is proprietary to the company. The company's
business depends on this trade secret. What is the typical expiry period for trade
secrets?
A. 75 years
C. 10 years
D. 100 years
A. Ethernet
B. 100VG-AnyLAN
C. FDDI
D. Token Ring
5. Which of the following correctly brings out the difference between a copyright
and a patent?
B. A financial emergency
A. A warm site
B. A hot site
C. A cold site
D. A mobile site
8. A trigger event that most incident response and handling models consider as the
first step that starts off the process is called:
A. A flash
B. A rubric
C. A precursor
D. A triage
9. The operations team would like to use a backup method that allows quick
restores. They also have an additional criterion that the method should be cost-
effective. Which of these will fit the requirement?
10. A company has facilities in the mid-west region in the US. This region is prone
to tornadoes. Since the processing done in the facilities is very critical, the
company decides to shift its facilities to a different region where tornadoes are
not active. This would be called:
A. A preventive measure.
B. A recovery objective
C. A crisis-management strategy
D. A recovery strategy.
11. An employee of a bank made changes to the software such that small sums of
money were diverted to his account from inactive accounts. Such an attack
would be labeled as:
A. Data diddling
B. Data manipulation
C. A rosalin attack
D. A salami attack
A. Finger service
B. StopID service
C. NTP
D. HAND service
13. Which of the following events is least likely to be the cause of a fire inside a
computer room?
C. The plastic surrounding an overheated component catches fire and this starts
a fire.
D. The wire insulation in an electrical line gets heated up and starts a fire.
14. An attack occurred on a computer network system and some data was
compromised. If the company proceeds to court and initiates action against the
attacker, which of the following people can testify and present their opinion of
the case?
B. An expert witness
15. Company Z's systems are infected due to a virus attack through the network
systems of company Q. If company Z sues company Q, this would be termed as:
A. Downstream liability
B. System liability
C. A virus chain
D. Upstream liability
16. An auditor observed that the data center of a company was poorly secured and
lacked necessary security controls to prevent unauthorized access. What activity
should be performed to correct this situation?
17. Your company wishes to purchase some safes to store backup tapes and
valuable documents such as contracts. You would like to have added protection
against possible tampering of the safes. Which of these features should you
include?
18. You are currently meeting with management to have them formally approve the
products, systems, and components within your organization. What is this
process usually called?
A. Affirmation
B. Certification
C. Verification
D. Accreditation
C. New accounts should be set up such that they do not require any password.
Once an employee is intimated about the account creation, she can change
the password on first logon.
D. After a new account is set up, the ID and the password should be emailed to
the supervisor or reporting manager of the employee. The manager can than
reveal the password to the employee.
B. All service and individual accounts should not be allowed multiple log-on
session capabilities.
21. Which of the following best expresses the objective of having an access control
policy?
D. An access control policy should specify the tools used for authenticating
resources and the level of access users must be granted to access resources.
22. During an external audit of a company's information security, you find that
employees do not need to periodically change their passwords, and have access
to all servers in the company. This is very likely due to:
23. A company laid out a policy on how financial transactions and other
confidential information should be handled. This type of policy would be
classified as:
A. An advisory policy.
B. A mandatory policy.
C. An informative policy.
D. A regulatory policy.
24. You would like to ensure that in the event of a fire, the smoke is pushed
outwards rather inwards, if a door in your workplace is opened. Which of these
air-ventilation combinations would you select?
25. If two systems need to transfer large amounts of data, which form of
communication is preferred?
A. Analog communication
B. Mixed-mode communication
C. Asynchronous communication
D. Synchronous communication
26. Two applications need to communicate with each other using full-duplex mode.
Which layer of the Open Systems Interconnection (OSI) network model is
responsible for establishing the connection and controlling the release of the
connection?
A. Session layer.
B. Network layer.
C. Interface layer.
D. Transport layer.
27. A company has just completed a series of security training programs and has
covered about 95% of its employees. A good measure of the effectiveness of
this program would be to:
C. Compare the number of security incidents reported before and after the
training.
D. Artificially create some test situations and monitor the response of the
employees.
28. Which of the following types of languages provides better security and
enforces coding standards?
A. Low-level languages
B. Binary-level languages
C. High-level languages
D. Assembly-level languages
29. A risk analysis technique that obtains opinions from a group of experts,
requires no calculations and does not provide a cost/benefit analysis is:
A. Delphi technique
30. Power failures could have disastrous consequences if not properly planned for.
Which of these backup options provides the best protection from power
failures?
A. Inverters
B. Battery packs
31. A certain system required frequent granting and revoking of permissions. Why
is a biometric means of authentication a poor choice for this system?
D. The danger that a hacker may misuse the system is very high.
33. While classifying the data in your company, how would you select a data
custodian and a data owner?
A. The data custodian is an IT role whereas the data owner is a business role
B. Both, the data custodian and the data owners are IT roles.
C. Both, the data custodian and the data owners are business roles.
D. The data custodian is an business role whereas the data owner is an IT role
34. You are responsible for a project which has just gone through the software
development life cycle (SDLC). For which of the following activities would
you need to get management sign-off?
A. Testing
B. Accreditation
C. Certification
D. Build
35. As the security officer of a company, you are preparing a security program for
physical safety. Which of these will not be a major metric as part of your
security performance measurements?
36. A company deals with very sensitive and confidential information that needs to
be available with zero downtime. Which of these steps can it take to ensure that
it is completely able to provide this service even during a disaster?
37. Piggybacking is a common issue faced while using mantraps. Which of the
following is the best option to counter this?
C. Avoiding the use of patches unless they are obtained in CD/DVD format
directly from the vendor
D. Installing only the essential patches and omitting the non-essential ones.
40. An employee used a bootable USB flash drive to boot a workstation and copy
confidential information. How could this situation have been prevented?
1. B - In symmetric cryptography, the sender and receiver will use two instances
of the same key to encrypt and decrypt. So if Joe needs to exchange data with
100 other people, he would need to have as many separate keys, so the correct
answer is 100. [Asset Security]
2. B - Since each server has a cost of 10,000, the total asset value of the servers in
the data center is 10 x 10,000 = $ 100,000. It is expected that only 1 out of 10
servers may fail at a time. Hence the exposure factor is 1/10 = 0.1 Hence, the
single loss expectancy (SLE) is given by asset value x exposure factor =
100,000 x 0.1 = $ 10,000. The frequency at which a server may fail in a year is
given as 0.1, hence the annualized rate of occurrence (ARO) is 0.1. The
annualized loss expectancy (ALE) is given by SLE x ARO = 10,000 x 0.1 = $
1,000 [Security and Risk Management]
3. B - Trade secrets are proprietary to companies and vital for their survival. In
most cases, trade secrets do not expire. [Security and Risk Management]
6. B - A disaster would include anything that causes physical damage to the assets
of an organization. A financial emergency may not be classified as a disaster
for business continuity / disaster recover purposes. [Security and Risk
Management]
7. C - Cold sites cannot be used when the RTOs are less than a week. Cold sites
only consist of a shell location that does not have any supporting equipment.
While they are cost-effective, they do not serve the purpose for RTOs of less
than a week. [Security and Risk Management]
8. D - The trigger event that kicks off the incident handling process is called a
triage. This would be the first in the entire incident handling process with other
activities following it. [Security and Risk Management]
9. A - A differential backup process backs up files that have been modified since
the last time a full backup was done. The back up process takes longer than an
incremental backup, but is faster during a restore. [Security and Risk
Management]
11. D - An attack in which the attacker commits a large crime, but does it in smaller
phases is called a salami attack. In such an attack, the attacker hopes to avoid
being discovered because insignificant amounts are involved in the individual
smaller crimes. [Security and Risk Management]
14. B - In a court of law, the opinion rule applies. As a result, witnesses may only
state facts pertaining to an issue and not their opinion. Only expert witnesses,
who are considered subject matter experts, may testify and present an opinion
of the issue. [Security and Risk Management]
17. B - A passive relocking function can detect if someone attempts to tamper with
the lock. When this happens, the mechanism causes extra bolts to fall in place. A
thermal relocking function can detect when a certain temperature is met. For
example if the lock is being drilled, its temperature will potentially rise. In such
a case, the lock automatically causes extra bolts to fall into place. [Security
Operations]
18. D - The accreditation process occurs after the certification process. It involves
meeting with management and presenting the information derived from the
certification process. This is done to have management formally approve the
products, systems, or components within the organization. When management
accredits the products, systems, and components within the organization they
are stating that they know the potential threats, vulnerabilities, and weaknesses
and are accepting the associated risks. [Security Engineering]
20. D - Some service accounts may be allowed multiple log-on session capabilities,
but individual accounts should not be allowed multiple-logon session facilities.
Preventing this facility will allow unauthorized sharing of accounts to be
detected. Further, if an account has been stolen, this will prevent access by the
attacker. [Security Operations]
21. A - An access control policy should specify how users of resources are
identified, authentication processes, and the level of access they must be granted
to access resources. It does not need to specify what tools are to be used for
authentication, and only provides a guideline on standards and best practices.
[Identity and Access Management]
22. B - This is most likely due to poor access control policies. Administering
access to users and controlling what they can access are key aspects of access
control. [Identity and Access Management]
23. A - Policies which strongly advise employees on what behaviors and activities
are acceptable and what are not, along with the repercussions of violations,
would be classified as advisory policies. Handling of financial data and
confidential information comes under this umbrella of policies. [Security and
Risk Management]
24. A - A closed-loop recirculating system ensures that the air inside the building is
reused after proper filtration, instead of bringing in outside air. Positive
pressurization means that if a door opens, the air goes out and outside does not
come in. This is important in case of a fire when smoke should go out rather
than be pushed back in. [Security Operations]
25. D - When large amounts of data are involved, systems are usually setup to
transmit data synchronously. This involves the use of a clocking mechanism. In
contrast, asynchronous communication is preferred for small amounts of data.
[Communications and Network Security]
28. C - High-level languages provide better security and enforce coding standards.
They are also easier to use and can be used to produce code very fast. [Software
Development Security]
29. A - A risk analysis technique that obtains opinions from a group of experts,
requires no calculations and does not provide a cost/benefit analysis is the
Delphi technique. This is a type of qualitative risk analysis. [Security and Risk
Management]
30. C - Online UPS systems provide the best protection in case of power failures. In
these systems, primary power passes through the UPS even for normal
operation. Hence they are ideally suited to detect power failures and supply
backup power from the battery pack when required. [Security Operations]
31. A - The key challenge in using biometrics is that the credential is tied down to a
user attribute as a result of which the process of granting / revoking accesses is
very cumbersome. Hence this is a poor choice for systems that require frequent
granting and revoking of accesses. [Identity and Access Management]
32. C - In full knowledge penetration testing, all information about the environment
is typically provided to the tester. Here the intent is to explore what can be done
rather than what can be discovered. Hence, this is appropriate in testing for
internal penetration and a greater level of information can be shared with the
testers. [Identity and Access Management]
33. A - The data custodian is an IT or security role and the personnel are
responsible for maintaining and protecting the data. In contrast, the data owner
is a business role and is typically the in-charge of a business unit. [Security and
Risk Management]
35. D - Key metrics for a security program include the number of successful and
unsuccessful crimes and the business impact of disruptions. The attrition in the
company may not be a major metric in the company's security program.
[Security Operations]
37. B - A weight based system will be the most effective in countering piggy-
backing. The other options may not be as effective. A closed circuit camera may
also offer some protection, but it will require constant monitoring. [Security
Operations]
38. C - Such a situation is usually handled by using a third party escrow service
called software escrow. Agreements are drawn up such that a third party holds
the source code and the company gets access to the code only if the vendor goes
out of business. [Security and Risk Management]
40. A - Among the options listed, the option that will work best is the use of a BIOS
password. A “soft” policy may not deter a malicious employee from getting a
flash drive into the facility. Use of CCTV to monitor all workstations or
removing USB ports from all workstations is impractical. [Security
Engineering]
CISSP Mock Exam (LITE) - 10
Practice Questions
Test Description
This is a cumulative CISSP Mock Exam which can be used as a benchmark for your
CISSP aptitude. This practice test includes questions from all eight domains of the
CISSP CBK.
Test Questions
A. By using cleartext
4. If you are looking for a software development model that is simple, offers a
fairly structured approach, works best for small teams, and allows for small,
fully integrated releases, the best choice is:
A. Waterfall model
B. Spiral Method
C. Cleanroom
D. Extreme programming
A. Criminal law
B. Civil law.
C. Cyber-law
D. Regulatory law.
A. Database duplication
B. Database partitioning
C. Database redundancy
D. Database mirroring
B. Remote journaling
C. Electronic vaulting
D. Database mirroring
A. Physical testing
B. Personnel testing
C. System testing
D. Management testing
12. The owner of certain data required specific users to access certain data and
granted them read permissions. However, the system determined that these users
should not have access to the data. This will happen in:
13. Which of the following is a best practice to follow in designing the door to a
computer room, to prevent it from being broken down easily?
A. Doors should open inwards and there should be at least seven hinges per
door.
B. Doors should open outwards and there should be at least three hinges per
door.
C. Doors should open inwards and there should be at least three hinges per
door.
D. Doors should open outwards and there should be at least seven hinges per
door.
15. Which of the following algorithms can only detect unintentional modifications
to messages?
A. Hash function
B. CBC-MAC function
C. JMAC function
D. HMAC function
16. Devices such as wireless equipment, cellular telephones may have limited
processing capacity, power supply and bandwidth. If efficiency of use of
resources is a key factor, what type of encryption functionality may be used?
A. Knapsack
C. El Gamal
D. RSA
17. An application requires a PIN to be encrypted in the fastest and easiest mode
using Digital Encryption Standard (DES) or another block cipher. The best
choice would be to use:
18. An optical disk was not properly purged, with the result that some of the
company data was leaked out to a competitor. What is the best way to purge an
optical disk?
19. Collisions occur when too many computers on the network transmit data at the
same time. This slows down the network performance. Which of the following
technologies does not suffer from this problem?
A. Fast Ethernet
B. Token ring
20. What are the two major disadvantages that processes using multi-threading run
into?
21. Fences act as an effective first line of defense and deter intruders. Which of the
following may be a poor practice while designing a fence?
A. The posts to which the fencing is connected should be deeply buried in the
ground.
B. Fences should be at least 8 feet high with razor wire at the top.
22. Which of the following security models does not address the issue of integrity?
A. Biba model
B. Clark-Wilson model
C. Bell-LaPadula model
D. Graham-Denning model
23. A hacker created an email attachment with a name that was greater than 64K in
length. The longer name overwrote program instruction code and caused issues
because the email application was only designed to handle 64K long filenames.
This could be avoided by:
A. Security control
B. Granular control
C. Cryptography
24. An employee was hired for a specific role and a regular background check was
performed. A year later, the employee is now being considered for a more
sensitive role. What would be the course of action required?
C. Consider alternatives for the role. Ideally look for an employee who has at
least 5 years of service in the company.
D. Have the employee sign a confidentiality agreement prior to starting his new
role.
25. If a system of a higher trust level needs to work with a very high level of
protection, what would be the best memory implementation to use?
D. Cache memory
26. A security professional would like to ensure that the anti-virus system
implemented is proactive and detects new malware. Which of these techniques
should the anti-virus system incorporate?
A. Non-heuristic techniques
D. Immunizer techniques
A. 11 keys
B. 45 keys
C. 9 keys
D. 20 keys
30. Which of the following choices correctly represents an action dictated by the
chain of custody evidence?
B. In a computer crime, the hard disks and media are the most important pieces
of evidence.
31. The Golay code is a 24-bit error-correcting and detecting code. Where might
this be used to ensure that data processed is accurate?
A. In a secondary control
B. In an input control
C. In an auxiliary control
D. In an output control
B. Bell-LaPadula model
C. Biba model
D. Clark-Wilson model
33. Certain information that was once sensitive and confidential is no longer
confidential. What should be the next course of action?
34. Network Address Translation (NAT) was developed because IP addresses were
running out and the address space needed to be extended. Which of the
following implementations will help resolve the address issue?
A. IPv6
B. IPv8
C. IPv5
D. IPv4
35. Two users have exchanged communication using a symmetric algorithm. If the
sender challenges the communication and says that he/she did not send the
message, how can this be proved or verified?
B. It can be easily verified that a message was sent by a particular sender, since
the sender's key and the receiver's keys are different
C. This can be verified by a third party who has access to the keys held by both
users.
D. The keys are known only to the sender and the recipient. So, neither the
sender nor the recipient can repudiate the fact that he/she sent the message.
36. A network administrator needed to connect two machines that were located at a
distance of 250 meters. She used an unshielded twisted pair (UTP) in a single
cable segment to make the connection, however she found that the machines
were unable to communicate. What is the likely issue?
A. It is likely that the cable was frayed and lost continuity. The administrator
should look at replacing the cable.
B. When UTP cable is used in segments greater than 100 meters, the signal gets
attenuated and the communication breaks down.
C. This is most likely a network settings issue and the administrator needs to
check the settings.
D. When UTP cable is used in segments greater than 200 meters, the signal gets
attenuated and the communication breaks down.
37. Virtual memory uses hard drive space and 'extends' memory through a process
of page swapping. It also has its own set of security issues. Which of the
following is not an issue associated with virtual memory?
A. It is possible that even when a process is terminated, pointers to the data are
present in the hard disk space. These could potentially be retrieved and
misused.
B. It is possible that in the process of using virtual memory space on the hard
disk, critical data on the non-virtual memory areas of the hard-disk could
get overwritten.
C. It is possible that an attacker may gain access to the hard disk space and copy
the data even as the process is executing.
38. Which of the following is not correct about Secure European System for
Applications in a Multi-Vendor Environment (SESAME)?
A. It offers access control based on roles.
39. A publicly listed company was due to announce its quarterly results in a few
days' time. How would the company classify information pertaining to its
results, prior to the day of the results?
3. B - A general rule of cryptography is that the more often a key is used, the
more likely it is that it can be captured and misused. In the case of a credit-card
company, the company may need to go in for a change of all keys once a week.
The other frequencies mentioned won't work. Changing them thrice a day is an
overkill and once a month or a quarter is too infrequent. [Asset Security]
4. D - Extreme programming meets the criteria listed. Typically, this model works
best for small-size teams of less than 12 people. It relies on sub-projects of
limited and clearly-defined scope. [Software Development Security]
7. A - Such acts would normally be tried under criminal law since information
was stolen and misused. The other types of law would not apply in this case
since a crime has been committed. [Security and Risk Management]
11. C - Developers should only have access to the development environment and
should not be able to access the quality assurance and production environments.
This will ensure that these two environments are protected from accidental
changes as well as malicious attacks. [Software Development Security]
12. A - This would happen in a Mandatory Access Control System. In spite of the
owner of the data clearing users, the system still determines whether they
should or not have access. [Identity and Access Management]
13. B - As a best practice, doors should be designed to open outwards. This will
prevent them from damaging equipment that may be inside. Doors should also
have at least three hinges per door and be fixed to adjoining walls securely.
[Security Operations]
14. D - Using identity values or userids that represent a user's role or task is a poor
practice. Userids such as 'operator', 'purchasemanager', 'administrator' etc
should be avoided. This is to ensure that the purpose of an account is not
revealed in the identity value. A standard nomenclature such as
lastname.firstname is often used for userids. [Identity and Access Management]
15. A - In a Hash based algorithm, the receiver can compare a hash of the message
digest with the value that was transmitted with the message. If these are
different, he/she will know that the message was modified. [Asset Security]
17. B - Electronic Code Book mode (ECB) is the fastest and easiest mode to use. It
is typically used only for encrypting small amounts of data like PIN numbers or
keys because it produces the same block of ciphertext given a block of plaintext
and for a given key. [Asset Security]
18. B - Grinding the data side of the optical disk such that the media is rendered
unreadable is a very effective way of destroying it. At a minimum, the grinding
can be used to scratch the surface to such an extent that the media is rendered
unreadable. [Security Operations]
19. B - Token ring technologies do not have the issue of collisions since in a token
ring, only the computer which has the 24-bit token can transmit data. However,
this is achieved at the cost of speed and token rings are slower compared to
Ethernet. [Communications and Network Security]
20. A - Two common problems which occur with processes using multi-threading
are deadlocks and blocking. Deadlocks occur when two processes vie for the
same resource. Blocking occurs when a process attempts to perform a read or a
write on an input-output device and is not able to successfully exit. [Security
Engineering]
21. D - Planting of bushes in front of fences may not be good practice. Over a
period of time they could damage the fencing. It is also possible that the
integrity of the fencing could be impacted. [Security Operations]
24. A - When an employee is being considered for a more sensitive role, it may be
required to perform a more detailed background check since the earlier one
was a regular one, probably at a lower-level. Longevity in the company may be
a parameter as well, however 1 year is not sufficient to do away with the more
detailed background check. [Security and Risk Management]
26. C - Behavior blocking techniques analyze sequences of code in advance and can
potentially identify malicious viruses. It is considered a proactive technique.
Heuristic detection is another proactive technique. [Software Development
Security]
28. B - In symmetric cryptography, each set of users would need to use a separate
set of keys. Therefore, the total number of keys required would be 45. This is
given by the formula Total number of keys = n x (n-1) /2 where n is the total no.
of people communicating. For ex: If 2 people communicate, you require 2 x (2-
1)/2 = 2 keys and if 10 people communicate, you require 10 x (10-1)/2 = 45
keys [Asset Security]
31. B - Contamination of data can occur in multiple ways - while going into or out
of a system. Error detection and correction is an input control and the Golay
code can be used for this. The Golay code is a highly reliable one and is used
for applications involving satellite / digital communications. [Software
Development Security]
33. A - In order to ensure that there is no undue effort and security around
protecting non-essential information, the information should be de-classified in
an orderly manner. [Security Operations]
34. A - IPv6 is the next generation of IP addressing and has a very large address
space, addressing the limitations of IPv4 addressing. However, its
implementation has been very slow because of interoperability issues.
[Communications and Network Security]
36. B - If UTP cable is used, the maximum cable segment it can be used for is 100
meters. After this attenuation occurs. So, the network administrator will need to
use a repeater or an amplifying device for lengths beyond 100 meters. This is
likely to be the issue. [Communications and Network Security]
37. B - It is highly unlikely that virtual memory on hard disk overwrites any good
data on the hard disk. The virtual memory and page swapping process is tightly
controlled. The other three scenarios listed are security issues associated with
the use of virtual memory. [Security Engineering]
Test Description
This is a cumulative CISSP Mock Exam which can be used as a benchmark for your
CISSP aptitude. This practice test includes questions from all eight domains of the
CISSP CBK.
Test Questions
1. All users in a system have security clearance to access the information in the
system but do not necessarily have a need to know all the information
processed in the system. This is typical of:
3. An operating system is designed such that it can handle requests from several
different processes loaded into memory concurrently. This type of operation is
called:
A. Multitasking
B. Multiprocessing
C. Multithreading
D. Multiprogramming
4. If data hiding is a key feature that you are looking for in an operating system,
what type of operating system should you look for?
5. Sally is heading a risk assessment team for her company. She is looking at the
various methodologies that she can choose from. Which of the following will
not be part of her list of choices?
A. PRISM
B. NIST SP 800-30
C. CRAMM
D. OCTAVE
6. A disaster struck a company but the company was effectively prepared and put
its disaster recovery plan into place and moved to a backup site. The original
facility was destroyed and had to be rebuilt over a period of 3 months. Which of
the following functions should be moved first to new facility?
D. None. Operate out of the backup location for at least 1 year before moving.
C. Once a user is fixed at a certain trust level, it can never be changed. This
causes a hierarchy of trust and becomes unmanageable.
D. It has a central leader and all changes need to pass through this central
leader. This makes it cumbersome to handle changes.
B. Control of environment
D. Separation of duties
9. Which of the following is a type of urban camouflage that makes it difficult for
attackers to target a company?
A. Use of padlocks
10. As a vendor, you need to provide periodic patches or updates to a product. Your
customers would like to be sure that they are downloading the patches from the
legitimate site. Further, they would like to ensure that the integrity of the
download has not been compromised. An effective way to do this is through the
use of:
A. Symmetric cryptography
B. Digital signatures.
C. Asymmetric cryptography
D. PGP
11. An administrator found that there were numerous telnet calls to computers on
the network and wanted to ensure that this was turned off. Which port needs to
be disabled to prevent telnet connections?
A. Port 23
B. Port 21
C. Port 25
D. Port 80
12. You are assigned the responsibility of performing a risk analysis to ensure that
security is properly addressed in your organization. The first step would be to:
13. A programmer wrote poor code that resulted in multiple tuples (rows) in a
database having the same primary key value. What kind of integrity does this
violate?
A. Semantic integrity
B. Program integrity
C. Referential integrity
D. Entity integrity
15. Which of the following Wide Area Network (WAN) technologies avoids the
problem of using a CAT-3 cable?
A. ADSL
B. Cable modem
C. RADSL
D. PSTN
16. Redundancy planned for a system required data storage in excess of five
hundred terabytes and mostly needed to carry out a write operation. An
effective option in this case would be to use:
A. SAN
B. MAID
C. RAIT
D. RAID
17. Virtual memory usually refers to the hard-disk being used as swap space. This
is typically the slowest of the types of memories used. Which one is the fastest?
A. Secondary memory
B. Cache memory
C. RAM
D. Main memory
18. A redundancy option using only hard disks proves very expensive, while use of
tapes makes it a very slow option. Which of the following provides an effective
solution combining the two technologies?
A. Execute privileges
B. Write privileges
C. Read, write and execute privileges
D. Read privileges
20. In order to achieve a Recover Time Objective (RTO) of zero or near-zero, what
sort of a backup site should be planned?
A. Cold site
B. Reciprocal arrangement
C. Hot site
D. Warm site
21. Which of the following will be a very important consideration for the
management team of a company that is currently doing business continuity and
disaster recovery planning for its operations?
A. Cost/Benefit analysis
B. Regulatory issues
C. Minimizing cost
D. Legal issues
22. You receive an emergency call that a server has been compromised. What is the
first step that you would advise to be done?
D. Re-install the data on the server from the most recent backup.
23. A security professional has shortlisted various options for access control.
Which of these has a high degree of security, is tamper-resistant, and can store
personal information?
A. Smart cards
B. Retinal scanners
C. Iris scanners
D. RSA cards
24. The risk analysis team has come up with a set of findings and identified certain
threats. The information security team puts up a contingency plan in place so
that the company can continue to function if that threat takes place. This would
be termed as:
A. Risk acceptance
B. Risk reduction
C. Risk mitigation
D. Risk transfer
25. When IPSec is used in transport mode, what is the only part of the message that
is encrypted?
A. Authentication Header
B. Routing Header
D. Payload
A. Non-secret
27. For the highest level of protection using IPSec, which mode would you use?
A. Secure mode
B. Tunnel mode
C. Transport mode
D. Network mode
28. While setting up security measures and controls, what should be the level of
transparency of these measures to users?
A. Security controls and measures should not be transparent. The users should
be completely aware of their existence.
29. Network systems personnel in a company notice that the system performance
has degraded considerably. They attribute this to cross-talk. Which of the
following cabling would be the first suspect?
A. Shielded cables
B. B. UTP cables
C. Co-axial cables
B. B. Load balancing
C. C. Redundant network
D. D. Installation of a DMZ
A. Walk-through testing
B. Full-Interruption testing
C. Simulation testing
D. Parallel testing
32. Which protocol relies on a “web of trust” for its key management approach
instead of a hierarchy of certificate authorities?
A. SSL
B. PGP
C. RSA
D. Deffie-Hellman
D. Authentication
D. It is mandated by city laws that all companies need to provide for such
furnishings.
35. Collusion is a threat in which two people within an organization work together
to defraud the company. Which of the following controls will be ineffective
against such a threat?
B. Rotation of duties
C. Supervision
A. Kernel mode
B. User mode
C. Supervisor mode
D. Privileged mode
37. Which of the following techniques would you not consider while performing
qualitative risk analysis?
A. A. Checklists
B. B. Surveys
D. D. Delphi technique
38. An IDS software was not properly configured. As a result, the IDS continually
identified many activities as suspicious and the workload became unmanageable
for the administrator. What can be done to manage this situation better?
A. The administrator should set a clipping level. The IDS should raise alerts
only if the clipping level is crossed.
B. The administrator should set a beeping level. The IDS should raise alerts
only if the beeping level is crossed.
C. The administrator should set a lower level. The IDS should raise alerts only
if the lower level is crossed.
D. The administrator should set a tripping level. The IDS should raise alerts
only if the tripping level is crossed.
39. Which of the following determines whether a strong encryption method should
be used?
B. The algorithm
C. The length of the key
40. A risk assessment team has just performed quantitative risk analysis on the
assets of a company. The team found that the annualized rate of occurrence
(ARO) values were 0.01, 0.1, 0.99 and 1.01 respectively for four of the assets.
To which of these assets should the company give the highest priority?
1. A - This is typical of System High-Security Mode. This mode requires all users
to have a very high level of clearance since they can access all data on the
system. [Security Engineering]
2. A - From a disaster recovery angle, the best option is to have multiple offices in
different parts of the US. This addresses the issue of business availability, and it
is easier to service customers. Having multiple floors in the same building, or
using a different building on the same campus, or another office in the same
city has the risk that they may also be struck by the same disaster. [Security and
Risk Management]
5. A - All the choices listed are valid risk assessment methodologies except
PRISM. [Security and Risk Management]
6. B - It is preferred that the least critical function be moved into the rebuilt
facility first. Any problems in configurations, setup, network connectivity can
be thoroughly investigated first, before moving in the critical functions.
[Security and Risk Management]
10. B - Digital signatures are used for this purpose and can be used to ensure both
integrity of a download and legitimacy of the site from which it was
downloaded. [Asset Security]
11. A - The Telnet port is 23 and can be disabled to prevent telnet sessions from
being established. The other ports given represent the following protocols:
SMTP - 25, HTTP - 80, and FTP -21. [Communications and Network Security]
12. C - The first step in carrying out a risk analysis would be to carry out a project
sizing. This is a very essential step and can mean the difference between project
success and failure. It helps understand what assets and threats should be looked
at and evaluated. If this step is not done properly, the project could end being
budgeted wrongly. It may appear that the first step is to prepare a cost/benefit
comparison, but that is a later step. [Security and Risk Management]
13. D - This violates entity integrity which necessitates that no two rows or tuples in
a database table can have the same primary key values. [Software Development
Security]
14. B - This is an instance of project risk analysis. This is different from security
risk analysis which is more concerned with risks and consequences that a
customer may face when using a particular product being developed. [Software
Development Security]
15. B - A CAT-3 cable is a copper cable that connects phones to a central office
(CO). PSTN, RADSL and ADSL technologies ride on the copper cable to
connect to a network. The cable modem based network uses a different
technology. [Communications and Network Security]
16. B - A Massive array of inactive disks (MAID) suits this requirement. A MAID is
especially suited for a requirement that involves write operations for the most
part and has storage requirement in excess of hundreds of terabytes. [Security
Operations]
17. B - Among the choices listed, cache memory is the fastest in operation. Cache
memory is very fast and is the place where information needed by a processor
can quickly be retrieved. The memory manager component of an operating
system manages the memory and ensures proper access control so that
processes are able to only access memory that they have access privileges to.
[Security Engineering]
19. D - Jon should be given Read privileges to the files. This will ensure that Jon
cannot alter the files in any way or obtain a copy of it. If Jon is given write /
update access, then he could maliciously or inadvertently alter/delete the files.
This is in line with the least-privilege principle of access control. [Identity and
Access Management]
20. C - An RTO of near zero means that the company should be able to shift
operations very quickly and start at the new site. This can be achieved by using
a hot site. [Security and Risk Management]
22. B - The first step is to take the server offline and isolate it from the network.
The next steps should be to preserve the evidence. [Security and Risk
Management]
23. A - The correct response is smart cards. They have a high degree of security,
are tamper-resistant, and can store personal information very effectively
because of a microprocessor and integrated chip embedded in the card. [Identity
and Access Management]
24. B - This would be termed as risk reduction. A contingency plan will reduce
damages if a threat actually takes place. [Security and Risk Management]
25. D - When IPSec is used in transport mode, only the payload portion of the
message is encrypted. [Asset Security]
26. A - The initialization vector is usually non-secret and increases security by
introducing additional cryptographic variances. [Asset Security]
27. B - IPSec works in either tunnel mode or transport mode. Tunnel mode is very
secure since the payload along with routing/header information are all
protected by encryption. An attacker will be unable to view any of the
information. [Asset Security]
29. B - UTP cabling is very vulnerable to cross-talk. This is because it lacks the
extra layers of shielding that the other cables have. Hence any electrical
impulses being transmitted through UTP can interfere with those being
transmitted in adjacent cables. This will result in degraded performance.
[Communications and Network Security]
30. D - A DMZ will prevent inbound connections if the firewall is properly setup.
However, it cannot counter against denial-of-service attacks which strikes at
network availability by generating excessive traffic. [Communications and
Network Security]
31. D - A parallel test should be carried out to verify that the alternate facility
actually works, without impacting current operations. This can be followed by
appropriate tweaking or adjustments to the alternate site and processes.
[Security and Risk Management]
32. B - PGP is used as an e-mail security program and relies on a “web of trust” for
its key management approach instead of certificate authorities. Users will
generate and distribute their own public keys and they will sign each other's
public keys to determine who will trust each other. With a certificate authority
hierarchy, no one trusts each other. They only trust the CA. [Asset Security]
35. A - Use of confidentiality agreements may not deter employees from colluding.
All the other controls mentioned will help prevent collusion. [Security
Operations]
36. B - User mode typically would have the least privileges and operate in the
lowest execution mode. Operating systems are designed such that they execute
user programs in a lower privileged mode, ensuring that some of the CPU's
instructions are not available to the application. [Security Engineering]
38. A - The baseline level which an administrator sets up is called the clipping
level. The administrator can set this up on the IDS such that the IDS will notify
the administrator of any detections beyond the threshold of the clipping level.
[Security Operations]
40. A - The annualized rate of occurrence (ARO) is a number that represents the
frequency with which a particular threat will occur in a given year's time-frame.
Knowing the ARO values for a set of assets is not sufficient to determine which
asset is to be given priority. The single loss expectancy (SLE) is required to
arrive at the annualized loss expectancy (ALE). This can then drive the
company's priorities. [Security and Risk Management]
CISSP Mock Exam (LITE) - 12
Practice Questions
Test Description
This is a cumulative CISSP Mock Exam which can be used as a benchmark for your
CISSP aptitude. This practice test includes questions from all eight domains of the
CISSP CBK.
Test Questions
A. Use of a software escrow service so that the bank can get access to the
source code in case of any issues with the product vendor.
B. The bank should purchase the source code from the product vendor with a
right to only make changes within their systems.
C. The bank should identify an alternative vendor and come out with a backup
implementation plan in case of such a situation.
D. This is an unnecessary concern for the bank. The bank should sign an
agreement with the product vendor and include a clause which states that
they can have access to the source code if required in an emergency.
B. The company has a strong case and can prosecute under anti-piracy laws.
C. The company will not have a case. Clicking on the link does not prove a
crime was committed.
A. The company has a strong case. Copyright laws would prevent other
companies from using the business processes in their companies.
B. The company has a strong case. The business processes can be considered
as trademarks and the company can go to court to prevent other companies
from using the business processes in their companies.
C. The company does not have a valid stance. Trade secrets are protected as
long as the owner of the information (ex: business processes) takes steps to
keep it secret. If it is leaked out into public domain, other companies cannot
be prevented from using the information.
D. The company's case is quite weak. This type of information comes under the
category of patents which grants ownership and exclusive rights to the
owner to use the processes.
4. A company placed certain sensitive data on a server that was accessible to all
employees. The company clearly informed its employees that the files were
confidential. If an employee copies the files onto a USB flash drive and uses it
outside the company, what would the company's position be?
C. The company will not be properly covered by criminal laws since it did not
practice due care.
D. The company is covered properly under criminal laws since it informed its
employees that the files were confidential.
A. The company was worried that it would lose control over the investigation
if the authorities were brought in.
B. The company was worried that it would take three years to go to court with
the case.
C. The company was worried that knowledge of the breach would become
public and tarnish its reputation.
A. The employee should check with other people in the vicinity if they are
aware of who the person is and whether his ID is valid.
B. Nothing needs to be done in this case. As long the other individual has a
valid ID card, it is sufficient. It is possible that the individual's appearance
has changed since the time the photograph was taken.
C. The employee should make a note of details such as the location of the
individual, and inform security immediately.
9. A software vendor discovered that a company was using illegal copies of its
software. An employee had copied the installation disks and installed the
software on the company's server. Who would be held primarily responsible
for this?
10. A Trusted Computing Base (TCB) addresses the level of trust that a system
provides. What components does it address?
A. The firmware
B. The hardware
C. The software
12. As part of a cost-saving initiative, the security and network team decided to
handle all security awareness and specialized security training in-house.
Management questioned the team on whether paid outside training was required
but the security officer indicated that she was comfortable with doing the
training in-house itself. A month later, a breach occurred and some important
information was stolen. Who is likely to be held responsible for this?
B. Management
13. Multiple vendors have developed their own networking frameworks. How do
they ensure that layers within their frameworks are interoperable with those
developed by other vendors?
14. Data backup is a crucial activity in organizations. Which of the following teams
should define what data gets backed up and how often?
15. Lin would like to use a hybrid encryption method using both symmetric and
asymmetric encryption methods. How would he go about this?
A. The message sent would be encrypted using a public key and the key used
would be encrypted using a symmetric algorithm.
B. The message sent and the key would be encrypted using a symmetric
algorithm and the receiver would decrypt this using his private key.
C. The message sent would be encrypted using a symmetric algorithm and the
key used would be sent using an asymmetric encryption.
17. An administrator discovered that there were certain default system accounts in
an application. It was not clear what they were used for. What is the best way to
handle this?
A. The security administrator should send out an email with the list of the
accounts to all senior managers to find out who uses them.
B. The best way is to leave the accounts since they will be required by users.
D. The best way is to disable these accounts first and then determine who uses
them, if at all.
18. Robert is a systems engineer and was called in to preserve certain evidence in a
cyber-attack on the company. Robert isolated the hard disk but inadvertently
made some changes to the hard disk. This seriously compromised the
company's case. Who is responsible for actions taken with digital evidence?
B. The company
B. The company will need to perform periodic offline manual backup of the
data.
21. A team that is doing risk analysis pegs the exposure factor (EF) of a large
storage warehouse at 10%. How would this be interpreted?
A. This means that 10% of the warehouse would be specially protected with fire
controls and other means to protect the goods in that area.
B. This means that if a fire or untoward incident were to occur, only 10% of the
warehouse is expected to be lost.
C. This means that items which are the highest in value would be stored in a
space that occupies no more than 10% of the warehouse.
D. This means that if a fire or untoward incident were to occur, only 10% of the
warehouse is expected to be saved.
22. An attacker took advantage of a vulnerability in an application system. Once a
process validated the authorization of a user for a noncritical file, the attacker
substituted the noncritical file with a critical one and managed to obtain access
to it because the file access was carried out by a second process. What type of
attack is this?
23. A company plans to step-up its monitoring activities and decides to implement a
CCTV monitoring system. The best way to install the CCTV cameras is:
24. When dealing with physical safety, to what should a company give the highest
priority?
A. To have a proper procedure in place to deal with crimes if and when they
occur.
D. To prevent crimes and disruptions to the company's operations, but also plan
to deal with them if and when they occur.
25. A very poorly written application makes periodic calls to the operating system
to allocate memory, and does not release the memory. The result is that the
operating system often gets starved for memory and even crashes. What is a
solution to this?
26. A hacker uses a new signature pattern to launch an attack. Which of these
intrusion detection systems will be unable to detect this attack?
A. Tree topology
B. Ring topology
C. Star topology
28. You are implementing an Intrusion Detection System (IDS). Which of these
problems would you expect to run into often?
A. False-negatives
B. False-positives
C. True-positives
D. True-negatives
29. A number of changes were made to an application system. What kind of testing
now needs to be done to ensure that the functionality and existing security has
not been compromised?
A. Acceptance testing
B. Unit testing
C. Regression testing
D. Integration testing
C. Europe Only
31. You are involved in the selection of material for windows in a facility. You are
aware that there have been a number of burglaries in the area and would like to
prevent would-be thieves from breaking windows and getting into the facility. If
cost is not an issue, what material should you choose?
A. Standard glass
B. Laminated glass
C. Untempered glass
D. White glass
32. Stateful firewalls provide an additional level of protection. However, they are
also vulnerable to some attacks. Which of these is a possible attack on a stateful
firewall?
B. Phishing attack
D. Phreaker attack
33. In a symmetric key cryptographic system for a fax software, one of the users
also sent the cryptographic key via a fax message. What would you comment on
this?
B. Use of the fax will ensure that the cryptographic key is not available to
anyone else but the recipient.
36. A security officer receives complaints that hardware in the company such as
disk drives, I/O devices and memory are periodically being stolen. What
preventive measures can he take?
37. A systems analyst is designing a new application which should have restricted
access. Which of the following would be best suited for the application?
A. Multi-factor authentication
B. Anonymous authentication
38. As part of its final report, a team assigned monetary values to assets. This is
likely to have been the output of:
A. Vulnerability analysis
B. Threat analysis
C. Risk analysis
D. Asset analysis
39. An eavesdropper finds out the algorithm being used between two people for
their encrypted communication. What will be the result if he now manages to
capture a message between the two encrypted using that algorithm?
C. The eavesdropper knows the algorithm used and can now decipher the
message even though it is encrypted.
40. Samantha works for an accounting firm with the responsibility of traveling to
client sites to assist in SOX compliance checking. Which of the following
accurately describes this work?
A. External Audit
C. Internal Audit
1. A - In such an instance where the operations of the bank are very critical, the
bank can look at using the services of third party software escrow services.
Various clauses are clearly defined and can come into effect if the product
company is unable to service the bank for any reason. [Security and Risk
Management]
2. C - The company does not have a strong case. Merely clicking on the link that
promised illegal software does not prove that a crime was committed. [Security
and Risk Management]
3. C - The company does not have a strong position. This type of information is
considered as a trade secret since it gives the company a competitive edge over
others. Trade secrets are protected as long as the owner of the information (ex:
business processes) takes steps to keep it secret. If it is leaked out into public
domain, other companies cannot be prevented from using the information.
[Security and Risk Management]
4. C - Although the company informed its employees that the information was
confidential, it did not practice due care in ensuring that the server was
accessible only to those who required access. Hence, it may not be properly
covered under criminal law. [Security and Risk Management]
6. A - The countermeasure should be such that it can be easily reset and restored to
original settings without affecting the asset it is protecting. [Security and Risk
Management]
10. D - The TCB addresses all three components of hardware, firmware and
software because each has the ability to impact a computer's environment
positively or negatively. [Security Engineering]
11. B - Asset management typically does not include details of how many users are
there in the company. It focuses on hardware, software, firmware, application
software and software libraries. [Security Operations]
14. D - It is the responsibility of the operations team to define what data gets backed
up and the periodicity of the backup. [Security and Risk Management]
15. C - Symmetric algorithms are very fast but the keys are difficult to manage. On
the other hand, asymmetric algorithms are slow but key management is easier.
A hybrid approach is one in which the message is encrypted using a symmetric
algorithm. The symmetric key is then encrypted using an asymmetric algorithm
and sent to the recipient. [Asset Security]
16. B - This type of conflict of interest is handled well by the Brewer and Nash
model. The software company could implement a product that tracks its
employees' activities and ensures that certain types of accesses would be
disallowed due to conflicts of interest. [Security Engineering]
17. D - Typically, systems will contain a number of default system accounts and
these could turn out to be security loop-holes. If it is not possible to determine
who or what system accounts are used for, they should be disabled first. Re-
enabling them can be a decision based on subsequent information obtained.
[Security Operations]
20. A - Currently, the biggest hurdle in bringing cyber-criminals to book is the lack
of technology to seize and control evidence of such crimes. The courts of law
require conclusive evidence and it is still a difficult to task to obtain evidence
that can hold up to a court of law. [Security and Risk Management]
21. B - The exposure factor (EF) is the percentage of loss that a threat (which
actually occurs) could have on a certain asset. Hence an EF of 10% means that it
is expected that not more than 10% of the warehouse is expected to be lost due
to a fire or other incident. [Security and Risk Management]
22. A - This is called a time of check / time of use (TOC/TOU) attack. This can
happen due to poor coding of an application which permits process 2 to access
a critical file even though process 1 authenticated the user for a non-critical file
at a different time. [Security Engineering]
23. D - The recommended way to mount CCTV cameras is to mount them in full
view. This will act as a deterrent to criminals by announcing that the
environment is being monitored. In addition, there should be prominent
displays indicating that the system / facility is under surveillance. [Security
Operations]
24. D - When dealing with physical safety, a company should give the highest
priority not only to the prevention of crimes and disruptions to business, but
also to procedures to properly deal with them when they occur. [Security
Operations]
25. B - A garbage collector can be used to help alleviate the problem. This is a
special software which runs an algorithm to identify unused memory allocated
to application programs. The program then informs the operating system that
the memory is now available for reuse. [Security Engineering]
26. A - A pattern matching IDS is a signature based IDS and has thousands of
signatures that are compared to traffic streams. If an attacker uses a new
signature, the pattern matching based IDS will not be able to detect the attack.
[Identity and Access Management]
27. C - Both ring and bus topologies (tree/linear bus) suffer from the disadvantage
that there are single points of failure which can cause the entire network to fail.
The Star topology is more resilient. [Communications and Network Security]
28. B - A very common problem that IDS suffers from is false-positives. This
happens when normal or expected behavior gets classified as a potential
problem. An administrator needs to be aware of this and be able to handle this
appropriately. [Security Operations]
30. C - The ITSEC is only used in Europe. The United States uses the Orange book.
However most regions are now moving to Common Criteria. [Security
Engineering]
31. B - Among the choices listed, laminated glass provides the best security from
break-ins. They are made with two sheets of glass and a plastic film in between.
This makes them extremely difficult to break. They come in different depths
and the greater the depth, the greater the security. [Security Operations]
34. A - As a security practice, group IDs are best avoided since they cannot provide
accountability. A good practice though is to assign individual users to groups
or roles. This makes it efficient to administer the groups or roles. [Security
Operations]
35. A - Slot lock are used to secure laptops. The consist of steel or tough metal
cables. These are used to fasten laptops to desks or other immovable objects.
[Security Operations]
37. A - An application which should have restricted access should use multi-level
authentication. This will ensure better access control because of the extra level
of authentication. [Identity and Access Management]
38. C - One of the key outputs of a Risk Analysis is that monetary values are
assigned to assets. This allows the team to calculate the necessary costs to
mitigate risks to these assets. [Security and Risk Management]
40. A - An external auditor is hired to assist an organization. This can take the form
of an on-going contractor engagement, or a brief spot-check. [Security
Operations]
Domain Area Test: Multi Domain
Practice Questions
Test Description
This domain area test focuses on many of the more difficult domains; including
Cryptography, Legal, and Security Architecture.
Test Questions
B. Triple DES
A. Confidential messages are encrypted with the public key whereas open
messages are encrypted with the private key.
B. Confidential messages are encrypted with the private key whereas open
messages are encrypted with the public key.
C. Both open and confidential messages are encrypted with the public key.
D. Both open and confidential messages are encrypted with the private key.
A. Encrypt the message using a symmetric algorithm and then encrypt the hash
of the result with the sender's private key.
B. B. Encrypt the message using a symmetric algorithm and then encrypt the
hash of the result with the sender's public key.
C. Encrypt a hash of the message with the sender's private key and append it to
the message.
D. Encrypt a hash of the message with the public key of the sender and append
it to the message.
A. In case the private key is lost, multiple parties are contacted and a new key is
generated using the public information.
B. The private key is broken up into multiple parts and these are handed out to
various trusted people within an organization. In case of loss of the key,
these people are grouped together and the key is reconstructed.
C. The private key is given to multiple trusted people. In case of loss of the key,
any one of these people can be approached to obtain the key.
D. The private key is locked in a safe whose combination is known only to one
individual. In case of loss of the key, this person may be contacted to open
the safe.
5. There are 20 people in an organization. How many keys does this organization
need to manage if they use symmetric algorithms?
A. 190
B. 400
C. 20
D. 40
A. User
B. Contractor
C. Employee
D. Janitor
7. A company would like to use a process to determine chronic failure and where
exactly it is likely to happen. Which of the following will allow such an analysis
to be performed?
A. Ishikawa analysis
D. Analysis Tree
8. An approval system was designed such that all purchase orders of value greater
than $ 100 needed to be approved by an immediate supervisor and orders of
value greater than $ 1000 needed to be approved by the higher up manager. This
is an example of:
B. Separation of duties
C. Least privilege
D. Job rotation
9. A company has a very effective background check program in place. How often
should background checks be done on employees in a company?
10. The annualized loss expectancy (ALE) for an asset is $ 10,000. A security
officer decides to apply a countermeasure for the risk. If the countermeasure
can be used for a period of 5 years, what is the maximum countermeasure cost
that the company can spend?
A. $2,000
B. $20,000
C. $10,000
D. $50,000
11. You would like to ensure that the operating system you are running is capable
of loading more than one program in memory at the same time and can handle
requests from different processes at the same time. What capabilities does this
operating system need to have?
A. Multiprogramming, multitasking
B. Multiprogramming, multithreading
C. Multiprocessing, multitasking
D. Multiprogramming, multiprocessing
12. Integrity models primarily need to prevent unauthorized users from making
changes, authorized users from making improper changes and maintain both
internal as well as external consistency. Which of the models satisfies all three
goals?
A. Clark-Wilson model
C. Biba model
D. Clark-Frost model
13. In a security model that you are analyzing, the commands and activities
performed at a particular security level are not seen by objects at another
security level. What model is this?
14. Systems operate in different security modes of operation. In which mode can all
users access all the data?
15. In which of the following models is an evaluation carried out on a product and
an Evaluation Assurance Level (EAL assigned)?
A. ITSEC model
D. TCSEC model
B. The hacker
C. The employee
17. In which of the following legal systems are court decisions governed by
previous court rulings and generally use an adversarial approach to litigation?
A. Civil law
B. Common law
C. Tort law
D. Criminal law
A. The end-user
D. The company
19. A hacker hacked into a system to access confidential data in an unauthorized
manner. In order to prevent being tracked, he manually changed the IP address
on the packets to show a different IP address than the actual one. This is called:
A. Phishing
B. IP masking
C. IP spoofing
D. IP hacking
20. The chief executive officer (CEO) of a publicly traded company was prosecuted
due to major inaccuracies in the financial information presented by the
company. Under what act would this likely have been done?
1. C - With computing power becoming more easily available, the need was felt to
have a more efficient and secure system than DES. Advanced Encryption
Standard (AES) was developed for this purpose. Triple DES is an intermediate
solution. [Asset Security]
2. A - Confidential messages are encrypted with the public key. This allows only
the holder of the private key to decrypt them. Open messages are encrypted with
the private key of a sender. They can be decrypted by anyone having the
corresponding public key. [Asset Security]
4. B - In multiparty key recovery, the private key is broken up into parts and given
to various trusted people across the organization. One single individual will not
be able to construct the key. In case of loss of the key, all of these people would
report to a common party and the key would then be reconstructed. [Asset
Security]
5. A - The general formula to compute the number of keys required for 'n' users is
n x (n-1) / 2. For 20 users, this works out to 20 x (20-1)/2 = 10 x 19 = 190.
[Asset Security]
7. C - Failure modes and effect analysis is a method that helps identify failures,
assesses the failures and looks at the effects of the failure in a structured
manner. It is extremely useful in determining where a vulnerability exists and
the scope of the vulnerability. [Security and Risk Management]
8. B - This is an example of separation of duties and ensures that for larger value
orders, an individual will himself be unable to approve a purchase order.
Hence, the possibility of malpractice is reduced. [Security and Risk
Management]
10. D - The general rule is that no countermeasure should be greater in cost than
the risk it mitigates. To make a comparison with the cost of the risk (ALE), the
countermeasure cost per year is calculated. This is the cost of the
countermeasure divided by the years of its use within the organization. Hence,
maximum countermeasure cost per year = cost of risk = $ 10,000. Total cost of
the countermeasure = 10000 x 5 = $ 50,000 (given that the countermeasure can
be used for 5 years). [Security and Risk Management]
11. A - Multiprogramming refers to the capability to load more than one program
in memory at the same time while multitasking means the operating system can
handle requests from several different processes loaded in memory at the same
time. [Security Engineering]
12. A - The Clark-Wilson model addresses all the three objectives listed whereas
the other models (Biba and Bell-LaPadula) address only one of the objectives
listed. Clark-Frost is not a valid model. [Security Engineering]
13. D - The noninterference model ensures that any actions taking place at a lower
or higher level do not interfere with those taking place at a different level. The
focus here is not the data itself, but what a subject knows about the state of the
system. [Security Engineering]
14. B - In dedicated security mode, all users have clearance to access data within a
system. A single classification level of information is handled by the system. An
example of this is military systems. [Security Engineering]
17. B - This is the case in common law. Common law is based on the notion of
legal precedence, past decisions and societal traditions. This framework can be
found in many parts of the world which were once colonies or territories of the
British empire. [Security and Risk Management]
18. D - It is the company's responsibility to ensure that all copies of software being
used for its operations are legal copies. It is also the responsibility of the
company to keep track of all copies of software, and the licenses involved.
Ignorance cannot be used as an excuse as far as compliance is concerned.
[Security and Risk Management]
20. B - The Sarbanes-Oxley Act (SOX) applies to any company that is publicly
traded on the US stock markets. This law governs accounting practices and
directs how the company needs to report on their financial status. It provides
requirements on how they must track, manage and report financial information.
Non-compliance of this can lead to prosecution and stiff penalties for the CEO,
CFO and others. [Security and Risk Management]
CISSP Mock Exam (LITE) - 13
Practice Questions
Test Description
This is a cumulative CISSP Mock Exam which can be used as a benchmark for your
CISSP aptitude. This practice test includes questions from all eight domains of the
CISSP CBK.
Test Questions
A. Monitoring
B. Background check
D. Separation of duties
A. Halogen
B. Nitron
C. Halon
D. Argon
3. Network Information System (NIS) and NIS+ enable users and applications to
locate network resources. Which of the following describes NIS+ rather than
NIS?
B. No security
4. You are analyzing an application that was developed 20 years ago. To access
certain data, you need to start at a particular branch and go through different
layers before reaching the data you need. What database model will this likely
be?
A. Hierarchical
B. Quasi-relational
C. Object-oriented
D. Relational
5. You are part of a business continuity planning team. The team comes up with an
elaborate continuity plan that requires a large budget. During an interim
meeting, team members are asked to present their views on the budget: Your
view would be that:
A. Obtaining funds for BCP activities is usually quite tough. The activities are
mostly unnecessary, so management doesn't support this.
C. Obtaining funds for BCP activities is usually quite tough. The team needs to
cut down the cost as much as possible even thought continuity planning is
very important.
D. Large budgets are fine. Management usually has a special fund for this
purpose with visibility right up to the CEO of the company.
6. Fire drills, evacuation drills etc need to be periodically conducted to ensure that
the procedures in place work, and to identify issues. The recommended
frequency is to carry these drills out at least:
A. Once a year
B. Once in 2 years
C. Once a month
D. Once in 3 months
A. Functionality assurance
B. Parametric assurance
C. Life-cycle assurance
D. Operational assurance
A. Aggregation of data
B. Performance
A. PIN number
B. Passphrase
C. Passcode
D. Password
10. A major project has just been approved. This project will require access to a
number of internal company systems. What kind of controls are used to provide
such access?
A. Directive controls
B. Compensatory controls
C. Preventive controls
D. Technical controls
11. What type of control is review of violation reports, log files, Intrusion
Detection systems (IDS), or use of CCTV?
A. Preventive controls
B. Recovery
C. Deterrent
D. Detective
12. A company is classifying data within the company. How it would classify trade
secrets?
A. Confidential
B. Public
C. Blocked
D. Sensitive
13. In a wormhole attack, two attackers are involved, one at each end of the tunnel
(called wormhole). This typically takes place on wireless networks (but can be
done on wired networks too). What is the countermeasure to this?
A. A leash
B. A collar
C. A restraint
D. A tie
14. While auditing a set of business continuity and disaster recovery programs, you
review a list of preventive measures that the company has undertaken. Which of
the following would incorrectly be classified as a preventive measure?
B. Purchase of a UPS.
C. Purchase of insurance.
A. Data in the acceptable range, outside the acceptable range, random data and
data on the boundary.
C. Random data
D. Data in the acceptable range.
16. At a software development facility, the security personnel found that there were
a lot of incidents involving stolen laptops. Users found that when they left desks
for extended periods of time, their laptops were missing on their return. What
can be done to prevent this?
17. A large retailer has been told that there are numerous risks associated with
doing business on the internet. As a result, the retailer decides to stay away
from doing business on the internet. This is an example of:
A. Risk avoidance
B. Risk Transfer
C. Risk mitigation
D. Risk acceptance
18. An administrator wants to separate out some of the departments into logical
groups such as HR, payroll, production and research. Which of the following
will allow this to be done?
A. SLANs
B. RLANs
C. VLANs
D. XLANs
19. Which of the following can speed up the performance of the CPU by reducing
memory access time?
A. RAM
B. ROM
C. Cache memory
D. SDRAM
A. DES
C. RSA
21. Financial fraud committed by one of the company's junior officers came to
light during a review of certain data. The officer in question had obtained
access in excess of his requirements and managed to commit the crime. Which
of the following could have helped prevent or avoid this situation?
A. User authentication
B. Single sign-on
C. Digital identity
D. User provisioning
22. There is no specific standard but almost every computer has the same port
mapped to the same protocol. If a network programmer is referring to port 25,
he is likely referring to which protocol?
A. Telnet
B. FTP
C. SMTP
D. HTTP
23. An auditor finds that the business continuity plan in an organization was last
tested 6 months ago. He notes this down as an issue. However, the continuity
planning team does not agree. What is your view on this?
24. Which of the following is not true about keypad or pushbutton locks?
25. A connection between two machines dropped. However, before this link failure
was detected, an attacker managed to attach to one of the ports and pretended to
be the trusted machine, thus gaining unauthorized access. What is the counter
against this?
26. The management of a company decided to cut down on training budgets due to
a crunch of funds. A few months later, a hacker broke into one of the servers of
the company and stole some valuable information. This could have been
prevented if the employee monitoring the intrusion detection system had been
trained to monitor and interpret the logs. Who is held responsible in this case?
A. The employee
C. Management
A. The organization is correct. This is a matter between the employee and the
software manufacturer. However, the organization may ask the employee to
delete the software.
C. The organization is correct. This is a matter between the employee and the
software manufacturer.
28. In the OSI model, which of the following layers will contain a data packet that
also has information added by each of the 7 layers?
29. Outermost perimeter in the context of physical security usually refers to the
farthest extent that an organization can patrol. How is physical security
managed for the outermost perimeter?
A. Encapsulation of objects
B. Naming distinctions
C. Underloading of objects
31. The physical security team of a company did a risk analysis and came up with a
set of criteria outlining the level of protection required for its security
program. What should be the objective of the first level of control of a security
program?
A. To detect intruders
B. To deter intruders
C. To capture intruders
D. To delay intruders
B. Trademark laws
C. Copyright laws
D. Patent laws
33. A company uses a number of legacy computers and hardware. During business
impact analysis, this is flagged as one of the potential areas of concern. As part
of continuity and disaster recovery planning what can the company do to
minimize the impact if a disaster strikes?
A. Identify legacy devices and plan for commercial off the shelf products, if
possible.
B. Train additional personnel in the use and maintenance of the legacy systems
C. Duplicate the legacy systems and place orders for new equipment while they
are available.
34. Which of the following represents the correct order in of activities in response
to an incident?
35. A security officer is auditing the operations of a computer center. She finds that
downtime is high for a particular server. She looks up the operations log and
finds a comment that the server often reboots on its own and works fine after
that. What would the security officer recommend?
B. Monitoring of the server for another 3 months after which a new one needs
to be installed.
36. Which of the following methods are most commonly used to ensure that an
end-user has read and accepts a licensing agreement (EULA)?
A. Use of a click through or radio button which the user must click on to
signify acceptance of the terms, before being able to click on the Install
button.
C. Use of a hardcopy which the end-user must sign and mail back to the
software manufacturer.
D. Use of an email which will get sent over the internet once an end user has
accepted the terms and conditions of the license.
A. Use of a PROM
B. Use of an EEPROM
C. Use of ROM
39. A continuity planning team came up with a detailed analysis of the current state
of readiness, the gaps and the action areas for a company. The team is
concerned that there could be areas that they have not considered. What would
be a good way to innovate practices in this area?
A. Through standardization
C. Through benchmarking
40. Routers and firewalls are implemented with failover equipment as secondary
devices. These secondary devices take over when the primary fails. This type of
hardware backup is known as:
A. Tepid spare
B. Warm spare
C. Hot spare
D. Cold spare
CISSP Mock Exam (LITE) - 13
Answer Key and Explanations
1. D - The company can use separation of duties to ensure that the individuals who
have access to data are not the ones who have access to review the logs. This
will ensure that a situation where an employee accesses logs to delete
information about his unauthorized activities is avoided. [Identity and Access
Management]
2. C - Halon has been banned since it damages the ozone layer. Companies with
older fire extinguishers that use halon need to use a replacement FM-200 which
is similar to halon but does not damage the ozone layer. [Security Operations]
3. A - NIS+ improved upon the performance and security issues that existed with
NIS. The naming structure is hierarchical in case of NIS+. [Communications
and Network Security]
4. A - This will likely be a hierarchical database. They are found on older systems
and follow a hierarchical structure. To reach a data entity, you need to traverse
down layers on a particular branch. [Software Development Security]
5. C - Although BCP activities are very important, obtaining funds for this
purpose is often quite difficult. Hence it is important to keep costs as low as
possible. [Security and Risk Management]
6. A - Fire drills, evacuation drills etc should be carried out at least once a year.
Doing them less frequently than a year will entail additional costs, while 2 years
is too far apart to be of significant value. [Security Operations]
8. D - When multiple users are trying to access the same data, it is possible to run
into concurrency issues that violate the integrity of the data. For example, if
multiple users are trying to make reservations for the same flight on a given
day, the system should be able to resolve the situation. [Software Development
Security]
9. B - Passphrases are longer to enter and that makes them harder to attack. They
are relatively easy for users to remember but given their length, an attacker will
be unable to crack them easily. [Identity and Access Management]
11. D - Review of violation reports, log files, use of an intrusion detection system
(IDS), CCTV are considered as detective type of controls since these provide
information after the event. [Identity and Access Management]
12. A - Trade secrets would be classified as confidential. This type of data is for use
within the company only. Unauthorized disclosure of confidential data could
seriously affect a company. [Security and Risk Management]
15. A - While performing acceptance testing, all kinds of input data conditions
should be tested. This includes data in the acceptable range, outside the
acceptable range, random data and data on the boundary. [Software
Development Security]
16. B - Slot locks are commonly used to secure laptops to a stationary component
in the vicinity of the desk. This will help prevent them from being stolen.
[Security Operations]
17. A - This is an example of risk avoidance. Such a decision will also likely have
an impact on the company's revenues, and the company needs to have taken that
into consideration while making the decision to stay away from the internet
business. [Security and Risk Management]
18. C - VLANs stand for virtual LANs and enables administrators to group
computers logically based on certain business needs. [Communications and
Network Security]
19. C - Cache memory is used to improve CPU performance. This is because cache
memory is high-speed RAM. Data moves from the lower speed RAM to the
faster cache and then to the CPU. An optimally designed cache can ensure
higher processing speeds. [Security Engineering]
21. D - User provisioning could have helped prevent this. It controls how user
privileges are created, maintained and deleted. Such a system would have placed
checks on the level of access the officer had. One of the audits or reviews
would also have revealed that the officer had excessive access and this could
have potentially avoided the fraud. [Identity and Access Management]
22. C - Although there is no specific standard created for this purpose, all
computers are usually mapped to the same ports. Port 25 is the port for SMTP
(simple mail transfer protocol). [Communications and Network Security]
23. D - Generally, a business continuity plan should be tested at least once a year.
Such tests and drills prepare the team and management for the kinds of issues
they may run into, and provide a controlled environment where they can learn
the tasks to be done when a disaster actually strikes. [Security and Risk
Management]
24. D - The keypad needs to be changed more frequently. Due to repeated use, the
keypad wears out and an astute criminal will be able to determine which keys
are used to open the lock. [Security Operations]
25. D - The counter to an attack where the attacker attaches to one of the ports used
in communication between two computers before the link failed is to have a
form of authentication performed constantly on the line. The attacker will be
unable to respond to this and appropriate action can be taken by the server or
other computer to drop the connection. [Software Development Security]
27. B - Organizations are responsible for all software installed on their premises.
In case an employee has installed an illegal copy of a software, the organization
is still responsible for it. [Security Operations]
28. C - In the OSI model, the physical layer is the lowest layer (layer 7) while the
application layer is the highest (layer 1). Each of the layers in between add their
own information to a data packet, so the physical layer contains information
from all the layers since it is at the bottom. [Communications and Network
Security]
29. C - Environment boundaries and open spaces at the outermost perimeter are
usually managed through the use of procedural controls. These include guard
posts, checking and escorting visitors on site, and managing deliveries to the
site. [Security Operations]
30. C - Underloading of objects is not a valid method. The other three methods
(encapsulation of objects, time multiplexing of shared resources and naming
distinctions) are used to carry out process isolation. Older operating systems
did not enforce this as well as today's operating systems. [Security Engineering]
31. B - The objective of the first level of control of a physical security program
should be to deter intruders. The general psyche of an intruder is to go for easy
pickings. Hence a well implemented security program should make intruders
feel it is not worth their while to break-in, and deter them. [Security Operations]
33. A - During a disaster it is possible that replacements for legacy equipment can
no longer be found. Hence, as part of continuity planning, the company should
look at moving away from the legacy systems. The other choices are
unrealistic. Training additional personnel or improving backup procedures will
not help during a disaster since the issue is availability of replacement
hardware. Duplicating the hardware may also not be practical. [Security and
Risk Management]
34. C - The sequence in which an incident needs to be responded to is Triage,
Reaction and Follow-up. Triage refers to the actual incident itself. Reaction is
the action taken to contain and track the incident. Follow-up is the action done to
avoid recurrence of the incident. [Security and Risk Management]
35. D - Incidents where a server or a computer reboots on its own without any
apparent cause need to be investigated carefully. They could indicate a deeper
problem such as a virus infection or a compromise in the security of the system
by a hacker. [Security Operations]
36. A - The EULA is typically a click through or radio button that a user clicks on.
This signifies that the user has gone through the terms and conditions of
licensing. Only after this step has been done, the is the install button enabled.
[Security and Risk Management]
39. C - Benchmarking involves comparison with industry standards and covers the
performance of the industry. Such peer or benchmarking techniques will allow
the team to look beyond their company. A number of best practices can be
learned from this activity and will allow the team to innovate practices.
[Security and Risk Management]
40. C - Redundant hardware components that are already operating are called hot
spares. Other examples of hot spares are when multiple power supplies are
running in parallel. [Security Operations]
CISSP Mock Exam (LITE) - 14
Practice Questions
Test Description
This is a cumulative CISSP Mock Exam which can be used as a benchmark for your
CISSP aptitude. This practice test includes questions from all eight domains of the
CISSP CBK.
Test Questions
1. As a security officer, you are reviewing the thickness of wire to use for the
fences around your company. If you wish to have greater security, which of the
following should you choose?
2. One of the team members of a security team was performing a random audit of
a computer system and found signs that it had been tampered. This is usually
indicative of:
A. Forensic activity
B. A hacker attack
C. An insider attack
D. An external attack
A. Backup lighting
B. Standby lighting
C. Active lighting
5. Which of the following norms governs how banks can protect themselves and
prevent themselves from overextending / becoming insolvent?
A. Base II
B. Basel II
C. Base I
A. Screened host
B. Screened subnet
C. Unscreened host
D. Unscreened subnet
7. Which of the following power fluctuations is the most dangerous for hardware
equipment?
A. Surges
B. Noise
C. Blackouts
D. Brownouts
8. Stream and block methods are used to encrypt data. Which of these statements
about stream and block ciphers is not true?
9. Buffer overflows, which used to be a key threat earlier have now been replaced
by another type of threat. Which of the following is now considered the biggest
threat to current web systems?
A. Boot viruses
B. Cross-site scripting (XSS)
D. Macro viruses
10. A programmer did not have access to a secure resource. However, he has been
granted access to a program that has access to the secure resource. The
programmer is able to bypass the security and obtain information from the
secure resource. How can this be prevented?
11. Many companies define the scope of their business continuity plans to only
cover larger threats. How are smaller threats handled in such cases?
C. By mini-BCP plans
12. Which of the following processes provides integrity of data but not data origin
authentication?
A. HMAC
B. MIC
C. CBC-MAC
D. Hash
13. One of the major disadvantages of using threads is a deadlock. What other
disadvantage do threads have?
A. Thrashing
B. Blocking
C. Loading
D. Clocking
14. Networks need to be periodically scanned. Which of these is not a valid type of
network scanning?
A. Compliance scanning
B. Integrated scanning
C. Vulnerability scanning
D. Discovery scanning
A. Copyright law protects the source code, object code as well as the user
interface.
C. Copyright law protects the source code and the user interface but not the
object code.
D. Copyright law protects the source code and object code, but not the user
interface.
16. A credit card company has revamped its internal team structure. Earlier, an
informal structure existed, but the new structure now houses an information
security department. Ideally, to whom should this department report?
A. The CEO
B. Corporate Security
C. Administrative Services
D. The CIO
17. Hackers are looking to dial into a Remote Access Server (RAS) and
clandestinely access the internal networks of a company. What method will
likely be used by them to determine the phone number that provides access to
the RAS dial-up modem?
A. Inwarddialing
B. Wardialing
C. Crashdialling
D. Breakdialing
18. If asked to select the fastest Ethernet type between 10Base-2, 10Base-T and
10Base-5, you would choose:
A. 10Base-5
B. 10Base-T
D. 10Base-2
19. As a security officer, you are reviewing the security controls on some systems.
Which of the following situations may warrant use of fewer security controls?
A. A media library
B. A data server
C. A master server
D. A data library
21. One of the users of an application dealing with confidential data often leaves
printouts of such confidential reports on his desk. The user is aware that the
information is confidential. What is the procedure to detect such lapses?
B. User training
22. Which of these is not a responsibility of the business continuity planning (BCP)
team?
D. Determine the best back-up process so that data can be made available
depending on its classification.
23. An administrator would like to ensure that there is absolutely no security breach
in accessing very confidential data and decides to implement a system that will
capture electrical signals when a person signs a signature. The information
from this system will then be used to authenticate users. Such a system would be
called:
A. Signature topography
B. Signature control
C. Digital signature
D. Signature dynamics
B. LDAP
C. Dynamic mapping
D. Static mapping
A. Fault generation
C. Electromagnetic analysis
D. Timing analysis
C. Use of hashes
B. Employee turnover
C. Extra expense
D. Revenue loss
28. Business continuity and disaster recovery plans need to be tested to identify
their weaknesses. In which of the following tests are specifically identified
systems run at the alternate facility and compared with the regular processing
that happens at the primary site?
A. Full-interruption testing
B. Parallel testing
D. Simulation testing
29. Static electricity does not usually cause damage to human beings. However, it
can ruin equipment which is sensitive. Which of the following humidity
conditions is most conducive for static to develop?
A. Humidity of 35%
B. Humidity of 90%
C. Humidity of 15%
D. Humidity of 60%
30. A company considers that its data is very critical and loss of the data would be
disastrous. What is the recommended backup procedure for such critical data?
31. A company has some non-critical work that takes place on its premises. The
company does not expect any major threat from domestic terrorists. Normally
what kind of material would the company use for its buildings?
C. Incombustible material
A. Partial disclosure
B. Full disclosure
C. Interim disclosure
D. Covert disclosure
33. Which of the following situations least warrants the use of an identity
management solution?
A. It takes two days to revoke and disable accesses when an employee leaves
the company.
B. It takes three days to setup new employees with required accesses to systems.
C. Users have to use five separate IDs and passwords to obtain information
from various systems within the company.
D. Login screens are very slow to load and take a long time to authenticate
users.
D. It would lack any security controls and not provide an assurance to security.
35. Which of the following statements is not true about asymmetric algorithms?
36. A computer user was under the impression that he could do little harm with his
computer. He sent out a flame email which resulted in his being sued for libel.
This type of ethics fallacy is typically labeled as:
A. Shatterproof fallacy
C. Candy-from-a-baby fallacy
B. Model of hardware
C. Location of hardware
D. Name of user
38. An attacker tried to launch a replay attack by capturing some data from a
session and resubmitting it to the server. Which of these techniques will counter
a replay attack?
A. Machine numbers
B. Threshold numbers
C. Packet control
D. Sequence numbers
A. Noninterference model
B. Array model
C. Matrix model
D. Lattice model
40. For computer systems, the mean time to repair (MTTR) is likely to be
measured in:
A. Seconds
B. Hours
D. Minutes
CISSP Mock Exam (LITE) - 14
Answer Key and Explanations
1. C - The gauge of fencing wiring refers to the thickness of the wire used in a
fence mesh. The higher the gauge number, the thinner the wire. The mesh size is
the distance between the wires. Hence, a 1 inch mesh is more secure than 2 inch
mesh and within that, a 9 gauge is stronger than a 11 gauge. [Security
Operations]
7. A - Surges refer to a prolonged rise in the voltage from a power source. These
cause a lot of damage and need to be controlled through surge protectors.
Although computer power supplies have a basic surge protection, they need to
be plugged into larger surge protectors for prolonged protection. [Security
Operations]
A - Block ciphers operate on blocks of text. Block ciphers usually use a
8. combination of substitution/transposition. As a result, block ciphers are
relatively stronger than stream-based ciphers. [Asset Security]
11. A - At the company level, most companies outline their business company plans
to only cover the major threats. Smaller threats are expected to be handled by
individual departments through departmental contingency plans. [Security and
Risk Management]
12. D - A hash only offers integrity. If a message has been unintentionally modified,
it can be detected. However, it does not offer data origin authentication. HMAC
and CBC-MAC offer data origin authentication. [Asset Security]
13. B - When a thread makes a specific system call (example: an I/O request), the
call will not return back until it has completed or the call is interrupted by a
signal. If any fault occurs during the call, the call may not even come back, or
may take an extended period to return. During this period, the thread cannot
execute any other instruction. This is known as blocking. [Security
Engineering]
14. B - Integrated scanning is not a valid scanning method used to scan networks.
Discovery, compliance and vulnerability scanning are valid methods used to
scan networks for specific purposes. [Communications and Network Security]
15. A - Computer programs may be protected by copyright law under the category
of literary works. The source code, object code as well as the user interface are
covered by this law. [Security and Risk Management]
16. A - A credit card company has high security needs. Ideally, in such an
organization the information security department should report to the CEO
directly. This minimizes message filtering and enhances communication. This
also sends out a strong signal that the company values information security.
[Security and Risk Management]
18. C - All three offer the same speeds of response, namely 10Mbps. The difference
is that 10Base-2 and 10Base-5 use coaxial type of cable whereas 10Base-T uses
UTP. [Communications and Network Security]
20. A - Media libraries are very useful when large amounts of data need to be
stored in a protected environment. They allow data to be stored in an orderly
manner so that data can be easily retrieved when required. However, a flip side
is that they are quite expensive. [Security Operations]
22. C - The BCP team is not responsible for setting up / maintaining the company's
data classification procedures. However, during their assessment process, they
may determine that certain areas are weak or vulnerable and they may make
recommendations to management to protect such data. [Security and Risk
Management]
23. D - This is known as signature dynamics. It is based on the fact that when
individuals sign, they sign in the same manner each time. This in turn produces
a uniform pattern of electrical signatures which can then be fed to a biometric
system to distinguish between users. [Identity and Access Management]
24. B - LDAP is not a valid NAT implementation. The other three choices Static
mapping, Dynamic mapping and Port Address Translation (PAT) are valid NAT
implementations. [Communications and Network Security]
26. A - This achieved by the use of Data Source Names (DSNs). These are logical
names used to refer to data stores instead of the actual physical location (ex: the
drive letter or directory location). This helps the security of the system because
the connection strings are variables stored in the registry. Use of DSNs is also a
best practice. [Software Development Security]
28. B - Parallel testing is done to make sure that specific, identified systems
perform to the required levels at the alternate sites. Their performance is
compared to the regular processing and any gaps that exist can then be plugged.
[Security and Risk Management]
29. C - Low humidity conditions (< 20 %) are conducive for static charge to be
built up. Hence, it is best to keep the humidity in computer / server rooms
between 35 and 60% at all times. Higher humidity causes condensation on the
equipment. [Security Operations]
32. A - Such a model where the individual contacts the vendor of the software and
asks for the vulnerability and fix to be published to the public is known as
partial disclosure. It could also include release of information about the
vulnerability and any possible workarounds. In contrast, full disclosure means
that an individual who finds the security vulnerability will disseminate the
information to the public at large. [Software Development Security]
33. D - Login screens taking a lot of time to load is not an issue related to access. It
may be an issue related to network capacity or the server. An identity
management solution will not solve this problem. The other choices are valid
reasons why a company would go in for an identity management solution.
[Identity and Access Management]
35. C - Each user requires a pair of keys (a public key and a private key). So, the
number of keys required for 10 people to communicate is 10 x 2 = 20. All the
other statements about asymmetric algorithms are true. [Asset Security]
37. D - The name of the user is the least useful in this list. A hardware tag will not
usually include the name of the user. The user details will normally be included
in software form. [Security Operations]
38. D - In a replay attack, the attacker hopes to be authenticated again as someone
else, by replaying captured data. This type of attack can be countered by
timestamps and sequence numbers. Packets contain sequence numbers, so each
machine expects a specific number on a packet. If a sequence number repeats
itself, it is an indication of a replay attack. [Asset Security]
39. D - The lattice model is a mathematical model that provides a certain basic level
of protection if all its rules are followed properly. [Security Engineering]
40. C - The mean time to repair (MTTR) is the time it will take to get a device fixed
or repaired and back into action. The lower the MTTR the better. However, it
will vary for different types of operations. For example, a disk failure in a
server will have a different service level than a disk failure in an end user's
workstation. So, the MTTR depends on the equipment. [Security Operations]
CISSP Extended Quiz
Practice Questions
Test Description
This is an extended CISSP quiz which includes questions from all eight domains of
the CISSP CBK.
Test Questions
A. Password dictionary
B. Password cracker
C. Password Verifier
D. Password maker
2. A secure system maintains a list of a user's last ten passwords and prevents the
user from reusing these passwords. This ensures good security and is known
as:
A. Password database
B. Password match
C. Password list
D. Password history
3. A user typed in his username and password into a login screen. The system
immediately came back with another screen to enter his username and password
again. The user assumed that he had wrongly entered his username / password
and re-entered them. He was then logged into the system. What type of attack is
this likely to be?
A. Farming
B. Brute force
C. Pharming
D. Spoofing
C. Classification levels should be developed only for data and not software.
A. PBX
B. SIP
C. SS7
D. PSTN
6. A company developed a software product by following a standard software
development life cycle (SDLC) and released it into the market. The developers
on the project were moved into another development project to develop yet
another product. Subsequently, it was found that both products had a lot of bugs.
Which of the following processes was likely missed out, resulting in this
situation?
A. Unit testing
B. Postmortem review
C. Quality assurance
D. Regression testing
A. Risk transference
B. Risk avoidance
C. Risk acceptance
D. Risk mitigation
A. Non-sensitive data can be updated by the user while sensitive data should
only be updated by an administrator.
B. The user should be able to access and update all data on his/her profile.
D. Sensitive data can be updated by the user while non-sensitive data should
only be updated by an administrator.
10. An online photograph company was concerned that photographs from its
website were being downloaded and copyright laws were being violated. It
decided to insert a digital watermark on the photographs so that illegal users of
the photographs could be caught. What is this form of concealing identification
data known as?
A. Steganography
B. Steganytics
C. Digital copyright
D. Watermark cryptology
11. Once BCP/DRP plans have been created, they need to be tested. Which of the
following will require comparatively more planning and involve a lot of
people?
A. Straight-through test
B. Simulation test
D. Checklist test
12. Pretty Good Privacy (PGP) is a well known email security product. Which of
the following is another method used for secure email?
A. S / MIME
B. HTTPS
C. MIME / S
D. TCP / IP
13. The difference between a dictionary attack and a rainbow table attack is:
A. A rainbow table attack uses thousands of words and tries to match them to a
user's password whereas a dictionary attack uses a table with thousands of
possible passwords already in hash format.
14. A network administrator found that an internal network was overburdened and
decided to divide it into smaller segments for better traffic control and use of
bandwidth. What device would she use for this purpose?
A. A switch
B. A bridge
C. A divider
D. A router
C. A heading and trailing banner should indicate who the intended receiver is.
16. Audit trails are used to provide alerts about potentially suspicious activities.
They can be used to perform investigations at a later time and to determine how
far an attack has gone. Which of these is an incorrect guideline for audit trails?
C. Audit logs must be protected from unauthorized changes so that the data is
safeguarded.
17. An operating system needs to be developed such that it works using a ring
structure. What can be said about the actual ring structure?
A. The actual ring structure is dependent both on the processor and the
operating system.
C. The actual ring structure does not depend either on the processor or on the
operating system.
18. An intruder was detected in a car parking lot and CCTV footage of the intruder
loitering around trying to break into cars was obtained. The intruder was
captured by security guards. If the CCTV records are to be presented in court,
which of the following needs to be done?
A. The CCTV footage must be displayed in court such that the car number
plates and faces of individuals other than the accused need to be blurred out
or pixelated.
B. The CCTV footage must be certified by the CEO before it can be viewed in
court.
C. The CCTV footage must be played to the intruder to ask him to confirm that
it was his actions that were captured.
D. The CCTV footage must be immediately seized and presented in court for
public viewing without any changes.
A. The onus is on the company to prove the steps taken to secure the algorithm,
the importance indicated to employees, and the potential damage for misuse.
B. The company needs to prove what steps it had taken to secure the algorithm
C. The company needs to prove why the algorithm was important to the
company.
D. The company needs to show what type of damage has been done or could be
done due to the algorithm being leaked out.
A. The security module interacts with very few other modules to perform its
tasks.
B. The security module carries out multiple tasks and that makes it difficult to
maintain.
C. The security module interacts with a lot of other modules to perform its
tasks.
D. The security module carries out a single task and that makes it simple to
maintain.
21. A company considers that the security of emails is very important and decides
to implement e-mail protection. Which of the following is true in such a case?
A. The sender and recipient can use different types of encryption schemes.
B. The sender and the recipient can use different encryption schemes but they
will need a converter software to convert from one scheme to another.
C. The sender and the recipient must both use the same type of encryption
scheme.
D. The sender and the recipient can use different encryption schemes except in
case of PGP and PKI, which are compatible with each other.
22. An organization is heavily dependent on Voice over IP (VoIP) for its day-to-day
activities. What implication does this have for the team that is performing a
business impact analysis assessment?
A. The team does not have to do anything specifically to handle this scenario.
C. The team should address the need for redundant voice systems.
D. The team should make a recommendation to avoid use of VoIP systems. This
will minimize the risk involved.
23. Companies need to comply with local and national standards in dealing with
fire prevention, detection and suppression. How far from electrical equipment
should portable extinguishers be placed?
C. This is fine as long as the retailer ensures that the static IP address has been
uniquely assigned by the Internet service provider.
D. The IP address does not matter as long as the website name has been
properly registered.
25. An inexperienced developer on a project wrote code for a security module with
high coupling. How would you interpret this statement?
A. This means that the module interacts with many other modules. It is
preferable to have low coupling.
B. This means that the module carries out a single task. This makes it easy to
maintain.
C. This means that the module carries out multiple tasks. This makes it more
difficult to maintain.
D. This means that the module interacts with very few other modules and is the
ideal situation to be in.
26. Individual networks on the Internet are connected with other networks using
routing protocols. Which of the following protocols builds an accurate routing
table by building a topology database of the network?
A. Distance-vector routing protocol
27. Integrity models map abstract goals of a security policy to information system
terms and enforce the security policy. Which of the following is not a goal of
an integrity model?
28. The European Union takes individual privacy very seriously and has strict laws
on what data is considered private. Which of these is not one of the European
Union privacy principles?
A. Only the necessary individuals who are required to accomplish the stated
task should have access to the data.
C. The reason for the gathering of data must be clearly specified at the time of
data collection.
D. Data should only be kept for a maximum of 3 years from the time it was
first collected.
B. Informed consent
A. Photoelectric systems
C. A proximity detector
D. Standby lighting
CISSP Extended Quiz
Answer Key and Explanations
5. B - Voice over IP (VoIP) technology uses session initiation protocol (SIP) to set
up and break down call sessions. This is an application layer protocol that can
work over TCP or UDP. [Communications and Network Security]
9. A - A typical rule to be followed is that a user can access and update non-
sensitive data while sensitive data can only be updated by an administrator. For
example, a user may be allowed to update an email address or address
information while sensitive data such as the expiry date of the login ID cannot
be accessed by the user. [Identity and Access Management]
11. B - A simulation test requires a lot of planning, and involves more people than
other types of tests. In this test, all employees who participate in operational /
support functions are brought together to practice executing the disaster
recovery plan. It raises the awareness of the people involved. [Security and Risk
Management]
12. A - S/MIME is the security enhancement for the MIME Internet email standard.
It provides several features and includes signed and encrypted email messages.
[Asset Security]
13. D - A dictionary attack uses thousands of words and tries to match them to a
user's password whereas a rainbow table attack uses a table with thousands of
possible passwords already in hash format. The other options listed are
incorrect. [Identity and Access Management]
14. B - The network administrator would use a bridge for this purpose. Bridges are
used to divide overburdened networks into smaller segments. A bridge also
amplifies signals similar to a repeater, however it has more intelligence built in
and is used to extend a LAN. [Communications and Network Security]
16. B - Although administrators may have the necessary access rights to view logs
and delete logs, their activities should also be logged. This will ensure that a
trail is available in case of security breaches by administrators or other high-
profile accounts. [Identity and Access Management]
17. A - The actual ring structure used by a system depends on the processor as well
as the operating system. Hardware chips are constructed to provide a certain
number of rings, and operating systems work within this structure. [Security
Engineering]
18. A - Privacy regulations require that the images of individuals other than the
accused, and car number plate information should be blurred. The other choices
are not valid. [Security Operations]
19. A - The onus is on the company to prove that the employee was guilty of
violating its intellectual property rights by emailing the software algorithm. It
must be able to show that it had taken steps to protect the file, had explained to
its employees that the file should not be shared or copied, and the type of
damage that would be caused as a result of loss of the algorithm. [Security and
Risk Management]
20. B - A module with low cohesion means that it carries out multiple tasks,
increasing the complexity of the module. This also makes it difficult to reuse /
maintain. If a module interacts with few other modules, it is said to have low
coupling. In general, high cohesion and low coupling are preferred. [Software
Development Security]
21. C - When users need to use a security scheme to protect messages from being
eavesdropped or modified, both parties (sender and recipient) must use the
same encryption scheme. Additionally, if the security administrator or
professional wants to ensure that all messages between two points are encrypted
and does not want to rely on individual users doing so, he/she can implement a
VPN. [Security Operations]
22. C - As more and more organizations move to VoIP, it becomes important for
them to plan for redundant voice systems. This is because in case of a disaster,
if the network goes down, both network and voice capability are unavailable.
The other choices listed are impractical. [Security and Risk Management]
25. A - If a module interacts with few other modules, it is said to have low coupling.
In contrast, a module with low cohesion means that it carries out multiple tasks,
increasing the complexity of the module. This also makes it difficult to reuse /
maintain. In general, high cohesion and low coupling are preferred. [Software
Development Security]
28. D - The European Union privacy principle does not specify a period for
retention of data. It states that data should only be kept for as long as it is needed
to accomplish the stated task. [Security and Risk Management]
29. D - The 'change of scale test' applies in this case. The professor thinks it is okay
to let his colleague use the software for evaluation purposes even though
specific permission may not have been obtained from the vendor. The other
choices do not adequately cover this scenario. [Security and Risk Management]
30. D - Standby lighting is the least effective in this case. The other three types of
intrusion detection systems listed will detect the presence of an intruder in the
vicinity of the safe. Standby lighting does not specifically help once an intruder
has broken in. [Security Operations]
CISSP Mock Exam (LITE)15
Practice Questions
Test Description
This is a cumulative CISSP Mock Exam which can be used as a benchmark for your
CISSP aptitude. This practice test includes questions from all eight domains of the
CISSP CBK.
Test Questions
1. A new work area is being setup in the conference room of a small commercial
office building. The data cabling is being pulled through the space above the
floating tile ceiling from the wiring closet on the same floor. What rating
should this cabling have?
A. Cat6E
B. UTP
C. Plenum
D. 10BaseT
A. A 7-foot solid wall fence with 3-4 strands of barbed wire at the top, tilted
outward.
B. A 7-foot chain link fence with 3-4 strands of barbed wire at the top, tilted
inward
C. A 7-foot chain link fence with 3-4 strands of barbed wire at the top, tilted
outward.
D. A 7-foot solid wall fence with 3-4 strands of barbed wire at the top, tilted
inward.
D. Countermeasures
4. A document mandating a) that all corporate email will comply with HIPAA
regulations, and a document mandating b) that a specific email client is to be
used are examples of what types of security measures?
5. An application module checks the values entered by a user to validate they are
within the expected range for the information requested. Once the data is
determined to be appropriate, it is passed to another application module for
further processing. What is this validation process called?
A. Virtual machine
B. Parsing
C. ActiveX controls
D. Parameter validation
D. Administrative consoles
7. There are many types of cybercriminals. Which of the following would be most
likely to deface a corporate website?
A. Script kiddies
B. Disgruntled employees
C. Hactivists
8. Bob wants to implement an authentication system that uses both symmetric and
asymmetric key cryptography. Which of the following meet his requirement?
A. AES
B. SESAME
C. Realm
D. Kerberos
C. A storage shed
D. A gymnasium
10. Matthew is developing a data backup plan for his company. It specifies what
data is to be backed up, the frequency, the backup type, and where the backup
media is to be stored. What other critical component should this plan cover?
A. Antivirus management
D. Network saturation
11. FM-200 is the most effective replacement for which of the following fire
suppression chemicals?
A. Inergen
B. FE-200
C. FE-13
D. Argon
13. The security team at Jones Shipping is configuring the company's IDS to send
an alert to the team when suspicious activity occurs. The team specifies the
activities to be monitored, and the number of times those events can occur
before an alert is sent. What is this alarm threshold called?
A. Policing threshold
B. Audit level
C. Clipping level
15. The public library in a small Midwestern city would like to implement a system
that will keep a tally of how many users visit the library on a daily basis. Which
of the following would be the best choice for this scenario?
A. Turnstile
B. RFID tokens
C. Badge readers
D. Smart cards
16. Mary is a computer forensics consultant who has been called in to testify as an
expert witness in a trial. What type of evidence does she provide?
A. Opinion evidence
B. Secondary evidence
C. Corroborative evidence
D. Best evidence
17. Which of the following statements regarding stream and block ciphers is
correct?
B. Stream ciphers typically execute at a higher speed than block ciphers and
have lower hardware complexity
D. Block ciphers typically execute at a higher speed than stream ciphers and
have lower hardware complexity
18. Global Manufacturing has establish a policy prohibiting POTS lines in its
datacenters in an attempt to prevent what type of attack?
A. Ma Bell
B. Operator
C. Brute force
D. Wardialing
19. A major storm has damaged the headquarters of Brighton Industries. Which of
the following processes should be executed first?
A. Damage assessment
D. Site relocation
20. SMC Semiconductor has just completed a thorough review of its facilities and
operations by a third party to assess its compliance with a particular industry
standard. SMC has been declared to be in complete compliance with this
standard, and is recognized by the third party as such. What is this recognition
called?
A. Qualified
B. Certification
C. Registered
D. Accreditation
A. CEO
B. CIO
C. CFO
D. COO
22. Western Geology Associates has installed several types of physical security
measures at their Dallas, Texas facility. These measures include a perimeter
fence with gated access, badge entry system to all buildings, and biometric
controls at the entrance to their data center. This is an example of what security
model?
A. Layered defense
B. Security zone
C. Restricted access
D. Chinese wall
23. In public key cryptography, public keys are exchanged between two parties that
wish to communicate. Which of the following is a key agreement protocol used
to share that key over an insecure network?
C. Serpent
D. Twofish
B. B. Circumstantial evidence
C. Chain of custody
D. Criminal intent
25. The triad of information systems security are confidentiality, integrity, and
availability. Which access control model provides the best protection for
confidentiality?
A. Clark Wilson
B. Biba
C. Bell- LaPadula
D. Non-interference
26. An electrical fire has broken out in a storage room of an accounting firm. What
classification of fire is this?
A. Class D
B. Class C
C. Class B
D. Class A
A. Sarbanes- Oxley
B. ISACA
C. COSO
D. COBIT
28. The website of a bank was taken down for several hours by a denial of service
attack. A group of loosely organized individuals have claimed responsibility.
During the subsequent investigation, the responding law enforcement agency
classifies this crime as which of the following?
A. Organizational modification
B. Computer assisted crime
C. Cyber graffiti
29. Of which of the following would a Nigerian email scam best be categorized?
C. Wire tapping
30. A software company sends to a customer a quote for several hundred licenses
of one of its products. The customer places an order, claiming that the price
quoted was $1 per license. The vendor however, says that the quote they sent
priced the product at $5 per license, and believes the customer changed the
quote. What function of public key cryptography could prove that recipient
altered the message after it was received?
A. Nonrepudiation
B. Authentication
C. Confidentiality
D. Availability
A. Integrity
C. Availability
D. Confidentiality
32. A large software company discovers one of its applications has a buffer
overflow vulnerability, and released a patch as a countermeasure. Which of the
following data characteristics is affected by a buffer overflow?
A. Availability
B. Confidentiality
C. Integrity
D. State
34. A new badge access system is being piloted at Western Manufacturing. The
badges used in this system have an onboard antenna that, when activated by the
card reader, powers the chip onboard the card. What type of smart card is this?
A. Contact
B. Contactless
C. RFID
D. Proximity activated
36. A government agency has implemented an access control system that regulates
access based on the agency's security clearance system: Need to Know, Secret,
and Top Secret. What is this type of access control system called?
37. Barnes Manufacturing would like put a fence around their production facility,
but they do not own the property and the landlord will not permit the installation
of a fence. As an alternative to a physical barrier, the company has installed
exterior digital video cameras. This scenario is an example of which of the
following?
A. Compensating control
B. Control gap
C. External controls
D. Delay mechanism
38. Mills Manufacturing has used the slogan “You design it, we manufacture it!” on
their marketing materials and corporate stationery for the last 15 years. Which
of the following would be used to provide protection and redress against
another organization using this slogan?
A. Trademark
B. Copyright
C. An intellectual property attorney
D. Patent
39. A semiconductor company has invented a new type of integrated circuit. Which
of the following would offer the best protection against another company
reverse engineering one of these circuits in order to manufacture and sell a
copy of it?
A. Trademark
B. Copyright
D. Patent
40. Several companies have deployed their servers in the data center of a managed
hosting provider. While these servers are logically segregated by VLANs, there
is a management VLAN to which all systems are connected. One of the
companies has delayed implementing a critical OS security patch for several
weeks because they have not finished testing its interoperability with the
applications running on its servers. While the company is completing its
testing, the vulnerability for which the patch is issued was exploited on one of
their servers. As a result, the unprotected servers were used to launch a denial
of service attack against the hosting provider and some of the other servers
connected to the management VLAN. During the course of the incident
investigation, it is determined that the company was negligent in delaying the
installation of the patch, and that it is responsible for service outages to the
service provider and the other companies hosted in the datacenter. Which term
best describes this condition?
A. Criminal trespass
B. Downstream liability
C. Civil liability
D. Criminal negligence
CISSP Mock Exam (LITE)15
Answer Key and Explanations
1. C - The space above a dropped ceiling and beneath a raised floor is called the
plenum. In many facilities the building ventilation systems are placed in these
spaces. All wiring, including data cabling, that is placed in these types of spaces
must be plenum rated, to ensure they do not release toxic gasses in case of a
fire. [Communications and Network Security]
2. C - Chain link fences provide visibility for security systems and patrols inside
the perimeter to identify possible intruders outside of the fence. The barbed
wire tilted outward makes it more difficult for an intruder to enter over the top
of the fence. [Security Assessment and Testing]
6. B - All of the above items have the potential to conflict with the company's
security policies. Many applications offer features that allow administrators to
manage or control devices remotely; the manner in which these tools are
implemented either by the application vendor or the purchaser can lower the
security stance of an organization. It is best practice to always examine new
applications for obvious or hidden administrative interfaces and disable or
harden them as appropriate for organizational policy. [Software Development
Security]
C - Hactivists are groups or individuals that pursue and promote their social or
7. political agenda by means of disabling or defacing the websites of
organizations that support policies or business practices that conflict with the
hactivists' agenda. [Security Assessment and Testing]
10. B - A backup plan should specify how long backups should be retained.
Defining this parameter is best accomplished by consulting each business
department in the organization to discern if there are legal or regulatory
requirements that dictate how long company records must be retained. The
organization's retention duration should then be set to match the longest
requirement identified. [Security Operations]
11. B - Halon, a chlorofluorocarbon harmful to both humans and the ozone, was
banned in 1987. It has not been manufactured since 1992, as per the terms of the
Montreal Protocol. The most effective replacement for this fire suppression
agent is FE-200. [Security Assessment and Testing]
12. D - Qualitative risk analysis does not use numerical or monetary values. Rather,
it develops rankings of threats and countermeasures, based on opinions,
intuition, best practices, experience, and judgment. [Security and Risk
Management]
13. C - The clipping level is the maximum number of times or threshold a specific
activity or event can occur. Activities or events beyond this level are considered
suspicious, and alerts are sent to staff so they can respond with the appropriate
security posture. [Security Operations]
15. A - A turnstile is a cost effective and easy to implement solution for keeping a
running tally of visitors. Turnstiles could also be used to limit access to patrons
presenting library cards, or to prevent visitors from exiting through portals that
are intended for entry only. [Security Assessment and Testing]
16. A - Expert witnesses provide opinion evidence. Rather than testifying about the
facts of the case, expert witnesses educate the jury, judge, and both sides of the
case about particular subject matter related to the case. [Security Assessment
and Testing]
17. B - Block ciphers encrypt blocks of data, while stream ciphers encrypt plaintext
data one character at a time. As a result, stream ciphers can execute more
quickly than block ciphers, and do not require the complex hardware needed to
encrypt entire blocks of data. [Asset Security]
18. D - Wardialing is a form of dictionary attack, in which an attacker uses long list
of phone numbers with automated dialing program. The goal is to find one
answered by a modem to use as a possible access point to a network or
computer. [Identity and Access Management]
19. A - Following a major event such as fire, storm, or earthquake, the first process
to be executed is the damage assessment. The assessment team will evaluate the
extent of the damage, what processes have been impacted, and if they can be
restored within the maximum tolerable downtime. Once these things have been
determined, the team will decide if the BCP should be activated. [Security and
Risk Management]
22. A - The layered defense model uses multiple types of tiered physical controls to
secure a facility or resource. Each layer in this type of architecture serves as a
backup for the layer that precedes it. In this example, the biometric lock serves
as backup against badge entry system failure, and the badge entry system
protects serves as a backup for any breach of the gated fence. [Security
Assessment and Testing]
23. A - In public-private key cryptography, both sender and receiver must exchange
a shared secret, also known as a key. Elliptic curve Diffie Hellman (ECDH) is a
key agreement protocol commonly used to secure keys shared over an insecure
link. ECDH is the basis for key exchange in the SSH transport protocol. [Asset
Security]
24. A - Criminal investigators and attorneys must prove that a suspect has motive,
opportunity, and means in order to have committed a crime. These three
elements describe why a person would have committed a crime, whether the
person has a chance to commit the crime, and his or her ability to have
committed the crime. [Security Assessment and Testing]
25. C - The Bell- LaPadula model is based on the classification of data and users,
with users being permitted to access data only at or below their own level of
classification. [Security Engineering]
26. B - Fires involving electrical equipment and/ or wiring are Class C fires. Fire
suppression systems for these types of fires use carbon dioxide (CO2) or dry
power to extinguish the flames. [Security Assessment and Testing]
27. C - COSO identifies five areas of internal control that are needed for financial
disclosure and reporting. These objectives are: control environment, risk
assessment, control activities, information and communication, and monitoring.
[Security and Risk Management]
28. D - Computer targeted crimes are those actions that impact a computer or
related device. These crimes include installation of malware, denial of service
attacks, and buffer overflow attacks. [Security Assessment and Testing]
30. A - Nonrepudiation provides assurance that message integrity and origin cannot
be contested by sender or recipient. A simple hash of the data sent can be
compared to a hash of the data that was received. Hashes that are not identical
show that the message was altered. [Asset Security]
32. C - Buffers are temporary storage areas used by applications to store data. If an
application is written in such a way that the application attempts to store more
data than the buffer can hold, data will overflow into an adjacent buffer. This
overflow can potentially corrupt or overwrite data in the buffer where the
application is attempting to store the extra data. Anytime data is lost or changed
in an unauthorized manner, the integrity of that data is lost. [Security
Engineering]
34. B - Smart cards have micro processing capabilities onboard the card, which are
powered when used in conjunction with a reader. The contactless card type has a
multipurpose antenna as well. When waved near a reader, the reader's
electromagnetic field activates the antenna, generating sufficient power to
operate the card's processor. The antenna, once powered, can also broadcast
authentication credentials to the reader. [Identity and Access Management]
35. B - Availability, integrity, and confidentiality of data are the key objectives of
information security. Availability means data is accessible to authorized
individuals in a timely manner. Integrity is the assurance that data has not been
altered in an unauthorized manner. Confidentiality means that data has not been
accessed by an unauthorized party. [Security and Risk Management]
38. A - Trademarks are service marks such as slogans, logos, symbols, words,
colors or sounds that are used to represent an organization's brand. Registered
trademarks cannot be copied or used by a unauthorized organization. [Security
Assessment and Testing]
40. B - The failure of a company to ensure that its actions or inactions do not
impact another company is called downstream liability. In this scenario, the
company that failed to implement the patch in a timely manner has caused
service disruptions for a number of other companies, and could be held liable
for their negligence, if one of the impacted companies chose to sue for the
damage caused. [Security Assessment and Testing]
CISSP Mock Exam (LITE)16
Practice Questions
Test Description
This is a cumulative CISSP Mock Exam which can be used as a benchmark for your
CISSP aptitude. This practice test includes questions from all eight domains of the
CISSP CBK.
Test Questions
A. Transport encryption
B. Digital certificate
C. Digital signature
D. Link encryption
A. Disable port 80
B. Disable the exec function
3. Beth is the administrator of a small network. Several users are reporting that
they were unable to log into the finance application just before lunch, but were
able to log on when they returned to the office about an hour later. After some
investigation, she discovers an attacker is running a brute force attack on the
finance application with known user IDs. Beth had previously implemented a
countermeasure against this type of attack. Which of the following might Beth
have implemented??
4. World Wide Paint and Pigment estimates the likelihood of a flood damaging its
server room is approximately once in 100 years, and the resulting damage
would total $150,000. What is the annualized loss expectancy of this scenario?
A. $150,000
B. $75,000
C. C. $15,000
D. D. $1,500
5. A critical database server has failed, and the backup server did not come online
automatically, causing a three hour outage while the backup server was
manually activated. Without the database, the company is unable to look up
customer files. Which of the following best describes this scenario?
A. Catastrophe
B. Nondisaster
C. Disaster
D. Failure
6. The promotions manager of Midwest Motors has been made the owner of his
department's printers and other resources. The manager is now able to
designate who in his department has permission to use a large format printer.
This method of access control is known as which of the following?
A. Mandatory
B. Role-based
C. Distributed
D. Discretionary
7. MAC addresses are used to identify systems at the data link layer, while IP
addresses identify systems at the network layer. Which of the following
protocols provide a mapping between MAC addresses and IP addresses, to
enable communication between the network and data link layers?
A. ARP
B. WINS
C. LMHOSTS
D. DNS
8. The network team of a small but rapidly growing company is considering how
to rearchitect the network to alleviate some congestion it is seeing. They
determine that dividing the network into logical groups by department, thereby
keeping interdepartmental traffic grouped together, will improve the overall
network performance. What are these logical divisions called?
A. Subnets
B. Domains
C. Port maps
D. Realms
A. Dual control
B. Separation of duties
C. Collusion
D. Split knowledge
10. Acme Tools is implementing a number of security measures to protect its assets
and staff. These measures include badge readers and new remote access
policies and technologies. Acme is performing what type of action?
A. Incident Response
B. Information Protection
C. Due Diligence
D. Due Care
11. In the event the President of the United State is incapacitated, the Vice President
will perform the duties of the President. If the Vice President is also
incapacitated, the Speaker of the House of Representatives will step in. Many
organizations also have some sort of plan that addresses the transfer of
leadership and responsibilities to other personnel in the event the head of the
organization is incapacitated. What is this business continuity concept called?
A. Organizational modification
B. Delegation of authority
C. Emergency recruitment
12. Which of the following encryption types offers better protection from
inference attacks as data traverses a network?
B. Payload encryption
C. Transport encryption
D. Link encryption
13. Gary is an undercover agent investigating a cybercrime ring. During the course
of his investigation, he poses as a student looking to make some quick cash to
pay next semester's tuition. Gary is approached by a member of the ring and is
recruited to be a mule, handling money laundering tasks. Gary documents
everything he learns about the gang's operations during his job orientation.
This information, along with the evidence collected by other investigators is
used to convict several members of the gang. What is this investigative
approach called?
A. Exigent circumstances
B. Enticement
C. Entrapment
D. Collusion
B. E-recycling
C. Garbage collectors
15. The security and IT teams at Harvey West Inc. are selecting new electronic door
lock mechanisms for a small closet where the company's IT assets are located.
Because the closet is so small, the rack with the servers and other gear is
positioned so it can be accessed simply by opening the door. There is no room
to close the door with a person inside. Which type of electronic lock will
provide the best level of protection for this closet in the event of a power
outage?
A. Badge reader
B. Fail safe
C. Pin pad
D. Fail secure
16. A new R & D facility has been recently built; the facility buildout included
redundant UPS systems. The UPS systems are inactive until the power fails, at
which time the battery packs are activated. What type of UPS is this?
A. Standby UPS
B. Failover
C. Inline
D. Passive
17. Administrative and technical controls often go hand in hand. Which of the
following could involve interaction between administrative and technical
controls?
A. Information classification
B. Password changes
D. Employee terminations
18. Richard is the leader of his company's business continuity planning committee.
They are conducting a business impact analysis of the threats to the company
and mapping them to critical areas of disruption to the business. Which of the
following is an area of potential impact to a business?
B. Financial considerations
C. Regulatory responsibilities
D. Reputation
19. A large real estate firm has recently implemented a configuration management
system to track and manage changes to its IT environment. Which of the
following items would be a candidate for configuration management?
C. Firewall changes
20. Windows, Linux, and Unix operating systems have the capability to use
Kerberos authentication. Which of the following best describes this method of
access control?
B. RBAC
C. Gated cryptography
D. Single sign on
21. All electronically accessible assets of the mergers and acquisitions department
at Wilson Clark Electronics are completely isolated from the rest of the
company. This was done to prevent unauthorized access to confidential
information about business opportunities the company is working on. What is
this this type of separation called?
A. Chinese Wall
B. DMZ
D. Great Divide
22. Many applications use components called modules to perform specific tasks.
This approach, called modular programming, has many benefits, including
using a single module to perform the same function in multiple applications.
Modules can be measured according to how dependent they are on other
modules to perform its tasks. Which of the following indicates a module has
very little need to communicate with other modules?
A. High cohesion
B. Low cohesion
C. High coupling
D. Low coupling
23. A fire has destroyed the headquarters of Western Data Inc. The company has
previously set up a disaster recovery site that can have the company's critical
operations back up and running in just a few hours; this facility is owned and
managed by Western Data. What is this type facility called?
A. Warm site
B. Redundant site
C. Hot site
D. Cold site
24. Connection Networks and Provance Semiconductor have each agreed to allow
the other company to use their facilities of in the event of a disaster. What is this
type of arrangement called?
A. Tertiary site
B. Reciprocal agreement
C. Alternate facility
D. Hot swap
25. Bill is running data backup program for his company. The type of backup he
has selected backs up all files that have changed since the last full backup, and
the archive bit of the backed up files is not changed. Which of the following
backup types is Bill running?
A. Partial
B. Intermediate
C. Incremental
D. Differential
26. Key stroke logging, shoulder surfing, and social engineering are methods for
thwarting which of the information security principles?
A. Integrity
B. Availability
C. Authorization
D. Confidentiality
27. Every network interface card manufactured has a unique identifying code. What
is this code called?
A. IEEE code
B. IANA code
C. MAC address
D. IP address
28. Which of the following enables a device with a private IP to communicate with
a device with a public IP?
A. IPv4
B. SIP
C. QoS
D. NAT
29. Which of the following is the most accurate and secure form of biometric
recognition?
A. Iris scanning
B. Retinal scanning
C. Vascular patterns
D. Fingerprints
A. SABSA
B. Bell LaPadula
C. ISO 17001
D. Zackman Framework
31. When the development process is complete and the code is compiled into its
final version, Western Data Corporation stores production ready software in a
secure data repository. At that point, the developers have no further interaction
with the code. Only the system administration team responsible for the roll out
of the application has access to this software. What is this security posture
called?
A. Collusion
B. Access control
C. Separation of duties
D. Job rotation
32. Bob and Alice plan to exchange messages using secret keys. However, they
each live in a different country. The most expedient way to exchange secret keys
is over a network. However, the key exchange must take place without yet
having a secret key to encrypt the data, leaving the key exchange transaction
relatively unsecured. Which of the following provides the most secure
workaround to this chicken-and-the-egg problem?
A. Quantum cryptography
B. PKI
C. KDC
D. Digital signature
33. Which of the following can allow unauthorized users to access and alter
software code?
A. Maintenance hooks
B. Stovepipe implementations
C. Keystroke logging
D. Overflow buffers
B. Latency
C. Packet loss
D. Repeated transmissions
35. Bill is reviewing the laws and regulations that apply to his company's use of
confidential employee data. Which of the following statements is most true?
36. A government agency has installed a Class 3 vault to house top secret materials.
How long will this type of vault withstand an attack with common mechanical
tools?
A. 1 hour
B. 30 minutes
C. 2 hours
D. 15 minutes
37. Matt has just loaded a computer with the operating system, application, patches,
and configuration tweaks that his company uses for all new desktop computer
deployments. What is this standard system setup called?
A. Software inventory
B. Baseline
C. Library
D. Configuration management
38. Bill is testing a newly released operating system update with all supported
versions of his company's software products, to ensure operability. What is this
type of testing called?
A. Localization testing
B. Unit testing
C. Regression testing
D. Validation testing
A. Turnstiling
B. Anti-passback
C. Location logging
D. Badging out
40. Which of the following would provide the most effective tool for reviewing
and analyzing data for a security event in progress?
B. Event viewer
8. A - Subnets break networks into segments. By doing so, traffic can be routed
directly between source and destination systems on the same segment, rather
than sending the traffic out over the network as a whole. [Communications and
Network Security]
9. D - Providing each of two user with one half of the key required to access a
resource is called split knowledge. In order for this approach to be completely
secure, however, each user must maintain full control over his or her half of the
key, and it must be protected by a password known only to the holder of the key
half. [Asset Security]
10. D - Due care is the act of developing and implementing security policies,
standards, guidelines, and technologies to eliminate or reduce risks to an
organization's assets. These risks are identified during the due diligence
process. [Security and Risk Management]
11. D - Executive succession plans specify the activities to be executed when the
head of the organization is incapacitated, killed, retires, or is in some material
way unable to fulfill his or her duties for an extended period of time. These
plans may include the terms and conditions under which the leadership changes
are required, and which staff will be called upon to step into the head position.
[Security and Risk Management]
12. D - In link encryption, all of the data along a network communication path is
encrypted, including routing information. Because it hides the source and
destination of the data itself, it is impossible for an eavesdropper to discern
which two parties are sending and receiving data. [Asset Security]
13. B - Because Gary was recruited to play a role in a crime that the gang member
had already intended to commit, this scenario is best described as enticement.
For this to have been entrapment, Gary would have had to manipulate or trick
the gang member into committing a crime. Entrapment does not establish that a
suspect had prior intent to commit a crime. [Security Assessment and Testing]
14. C - Garbage collectors manage memory by reclaiming old and unused objects
stored in memory that were not released by an application. Attackers can exploit
memory bugs that cause buffer overflows, whereby data exceeds the capacity of
its assigned memory space and overwrites data in adjacent spaces. These
overflows can cause data loss or application crashes, resulting in loss of data
integrity or availability. [Software Development Security]
15. D - In a failure state, devices that fail secure will revert to a most secure stance.
In the case of an electronic lock, the lock would remain closed. Devices
designed to fail safe will revert to a secure posture, but with built in safety
measures; an fail-safe electronic lock would permit some measure of access
for life safety purposes. In this scenario, the server closet would benefit from a
fail secure device, as the area it is protecting does not require an escape
mechanism for staff. [Security Operations]
16. A - A standby UPS offers basic power surge protection and battery backup
power. This type of UPS is not continually powered by utility power, however,
so there is a slight delay between the time its sensor detects a power outage and
the time the battery packs are activated. [Security Assessment and Testing]
18. A - There are a number of areas in which a disaster can impact a business.
These include operational disruption and productivity, financial considerations,
regulatory responsibilities, and reputation. During a business impact analysis or
BIA, the BCP committee identifies of potential threats to the company, and maps
them to these areas of impact.. [Security and Risk Management]
22. D - Modules with low coupling require very little interaction with other
modules to carry out their tasks. Lower cohesion modules are easier to update
and reuse than modules that depend more heavily on other modules to complete
its task. [Software Development Security]
23. B - A disaster recovery site that is fully configured and ready to operate within
a few hours and owned and operated by the organization that will be using it is
called a redundant site. A hot site also provides an organization with the ability
to be back up and running in just a few hours. However hot sites are not owned
by the organization who will be using it; rather they are a rented or leased
facility. [Security and Risk Management]
24. B - Organizations may arrange to allow each company to use the facilities of
the other company in the event of a disaster. This is called a reciprocal
agreement. If offers cost savings over each company maintaining its own
facility, but it may also decrease the efficiency with which each company
operates, as the processes, policies, and resource availability of the hosting
organization may cause conflicts or constraints for the company that relocates
to this site. [Security and Risk Management]
25. D - In a differential backup, all data that has changed since the last full backup is
backed up, without changing the archive bit. [Security and Risk Management]
26. D - The confidentiality of data is breached when unauthorized parties access it.
Confidentiality breaches may be intentional by methods such as shoulder
surfing or social engineering to gather passwords, or unintentional such as by
failing to encrypt data while it is at rest or in transit. [Security and Risk
Management]
27. C - NIC cards are identified by a unique code called a Media Access Control
(MAC) address. While this value can be spoofed by hackers, it is typically
considered to be a permanent identifying code. [Communications and Network
Security]
28. D - Because the available public IPv4 address space is not large enough to
support the number of IP devices in use today, private IP address ranges have
been implemented. These IP addresses are not routable over the internet,
however, so network address translation (NAT) was developed to support
communication between devices on private and public networks.
[Communications and Network Security]
29. B - Retinal scanning offers low false positive rates, and false negative rates of
close to zero. It also has a very small base of outliers, those users who are
unable to be enrolled in the system. Further is much more difficult to defeat this
type of system than other types of biometric readers, including iris scanning.
[Security Assessment and Testing]
33. A - Maintenance hooks are backdoors left in software during the development
process to provide an easy way to update software, intentionally bypassing
normal security checks. If these maintenance hooks are not removed before
deployment, they become a vulnerability that can be exploited by unauthorized
users. [Security Engineering]
35. A - Laws are issued by legislative bodies such as the US Congress or the British
Parliament. Regulations are issued by governmental agencies dictating the
manner in which laws will be implemented. For example, the Health Insurance
Portability and Accountability Act legislated by the US Congress, but the
standards and guidelines governing how it is put into practice are issued and
maintained by the US Office for Civil Rights. [Security Assessment and
Testing]
36. C - Underwriter Laboratories has set forth ratings for vault attack resistance.
The lowest rating, Class M, will resist attack for 15 minutes. The highest rating,
Class 3, will withstand attack for two hours. [Security Assessment and Testing]
Test Description
This is a cumulative CISSP Mock Exam which can be used as a benchmark for your
CISSP aptitude. This practice test includes questions from all eight domains of the
CISSP CBK.
Test Questions
A. n-tier
B. 4GL
C. Middleware
D. 5GL
3. Johnson Brothers, Inc. has deployed a certain word processor on all of its
Windows Vista, Windows 7, and Windows XP workstations,. Which of the
following best describes the process that allows the same application to run on
a variety of hardware and operating system configurations?
B. Abstraction
D. Relocation
A. Transferred risk
B. Mitigated risk
C. Vulnerability
D. Residual risk
A. M-node
B. Broadcast
C. Analysis
D. Promiscuous
6. Central Coast Farms grows and sells cut flowers to wholesale customers such
as grocery stores and florists. The company has decided it is time to start
accepting internet orders, and has hired a consultant to design and setup a
webstore that integrates with its existing systems. These applications and
databases run on disparate hardware and software platforms. To meet the
company's integration requirement, the consultant recommends an approach
based on which of the following?
A. CORBA
B. Modular programming
C. Multithreading
D. Symmetric processing
7. Castle Enterprises is evaluating the lighting in the parking deck and other
exterior areas of their campus, to ensure the safety of their employees. The
consultant they have called in has reviewed the layout of the campus and made a
number of recommendations. Which of the following would be the
recommendation for the parking deck, which is a light colored structure?
8. A tile manufacturing company has a large warehouse from which they ship
their products. Their corporate data center is also located in this warehouse.
Which of the following would be used to protect the data center from physical
damage resulting from heavy equipment such as forklifts?
A. Motion detectors
B. Bollards
A. RPO
B. MTBF
C. MTTR
D. RTO
10. The finance department deployed a very large server with multiple processors
to handle a heavy load of database queries. While some of the queries are easily
executed, others requires dedicated CPU resources. What is this dedicated state
known as?
A. Asymmetric mode
B. Multithreading
C. Symmetric mode
D. Thunking
11. Nancy, the HR manager of WLB, Inc., defines data classification, retention and
backup requirements, and access rights for employee data at her company.
Dave, the system administrator, implements these controls by performing
operational tasks such as setting permissions on files and folders, running
backups. Which of the following correctly matches the roles Nancy and Dave
play?
A. Network documentation
B. Communications plan
13. Mike is analyzing the traffic on his network to identify the device that is
saturating a link with traffic. He is looking at the source address information on
a packet. At which network layer are addressing and routing information added,
and what is this specific bundle of data called?
B. Transport; segment
D. Transport; datagram
15. Nora has embedded a video and photos of her most recent vacation on her
social networking page. The video and photos are actually hosted on two other
websites. Which of the following allows Nora to share on her social
networking page?
A. XML
B. OLE
C. API
D. HTML
16. Jerry's email application uses SMTP over port 25 to send messages to a mail
server. Email applications, regardless of the application vendor, almost always
use SMTP over port 25. What is this standardized mapping of a specific port
number to a specific protocol called?
B. Open standards
D. Sockets
17. A mortgage company is evaluating how secure a new operating system is. The
review goes beyond simply checking the default installation configurations; it
also includes a complete review of the security and control capabilities and
features. Additionally, the company is examining how the operating system was
developed. Based on this review, the company deems the operating system to be
highly trusted. What are these review points called?
C. Orange book
D. SDLC
18. The lack of a fire suppression system in a data center is an example of which of
the following concepts?
A. Threat
B. Risk
C. OSHA violation
D. Vulnerability
A. Weak passwords
C. No firewall
20. Over the last 6 months, an IT group has replaced server and network
components that have mysteriously failed. These failures occurred at intervals
more frequent than the Mean Time Between Failures rating of the affected
components, so the team began to suspect an environmental issue. It was
discovered that the HVAC system had not been receiving annual maintenance
service. Which of the following could be the result of an HVAC system's faulty
performance?
B. Moisture damage
D. Mold growth
21. Wilco Systems has implemented two factor authentication for remote access. A
token device is distributed to each employee authorized to have remote access.
Token devices are examples of what type of password system?
A. Password aging
B. Password clipping
C. Password hashing
22. A small consulting firm has purchased a new accounting software package. The
accounting manager would like to load a copy of the software on her personal
computer so that she can work from home occasionally. Which of the
following would provide information about where and how many times a given
application may be installed?
A. Patent
C. Copyright
D. Trademark
A. Penetration testing
A. Virtual
B. Hybrid
C. Permanent
D. Role based
25. Global Data Systems has a large IT staff located in various corporate offices
throughout the world. Files with data about the organization's network are
regularly sent between the staff members. Which of the following should be
implemented to protect this data while it is in transit?
A. PKI
B. Transport encryption
C. Digital signatures
D. One-way hashing
26. All computer users at a government agency must meet the following
requirements: clearance, documented formal access, and the need to know. This
is what type of security operations mode?
C. Directive mode
D. Trusted mode
27. John is pitching his idea for a new software application to some investors. The
investors stated explicitly that they are cost sensitive and want this application to
his the market as soon as possible, in order to beat out possible competitors as
well as reap a quick return on their investment. In which of the following
software development phases should security be thoroughly considered, in
order to deliver a secure product on time and within budget?
A. Functional design
B. Project initiation
28. A municipal courthouse has several self-service kiosks in its lobby. These
kiosks have limited access to the court's network because they use a standard
internet connection to access the court's web-based applications. However,
because the public has physical access to the systems, an attacker can cause
damage to the kiosk itself. Which of the following options will prevent a user
from accessing the command line?
A. Every 3 years
B. Every 2 years
C. Annually
D. Quarterly
30. Many systems are configured to acquire an IP address from a remote server
rather than using a pre-configured static IP address. What is this remote server
called?
A. RADIUS
B. DHCP
C. LDAP
D. RRAS
31. Which of the following RAID options mirrors disks first, then stripes data
across the array?
A. RAID 0
B. RAID 1+0
C. RAID 0+1
D. RAID 1
32. Many encryption algorithms mandate the key size, block size, and number of
rounds of encryption to be performed. Which of the following do not mandate
a fixed value for these elements?
A. RC2
B. RC5
C. AES
D. RC4
A. 16 bits
B. 64 bits
C. 256 bits
D. 56 bits
B. Preventive measure
C. Process automation
D. Operations planning
C. The opinions of experts are used to identify the highest priority issues and
appropriate countermeasures
D. Requires no calculations
37. Which of the following can be used in conjunction with a CCTV system to
eliminate the need for someone to continuously monitor the video feed for
intruders?
B. Two-way radios
C. Annunciator system
C. Require users to sign an acknowledgement that the have read the policy,
understand their responsibilities, and agree to abide by the policy.
39. Developers at Core Graphic Systems are testing the newest version of video
card driver, in preparation for release. This code is located on a shared drive,
but several engineers have saved a copy to their computers. The team discovers
variances in their testing results that are outside the expected range. Upon
further investigation it is discovered that, although the revision level of the
code the testers are using is identical, there are differences in the code running
on each tester's computer. Which of the following would prevent a recurrence
of this scenario?
B. Revision control
C. Rollback
D. Reversion
40. Protection rings are one of the most common architectures implemented to
guard system functionality and data from malicious behavior and faults. Which
of the following protects the kernel?
A. Ring 0
B. Ring 2
C. Ring 1
D. Ring 3
CISSP Mock Exam (LITE)17
Answer Key and Explanations
1. A - Job controls are intended to reduce the risk of internal risks by limiting and
or monitoring access to data. Job rotation is the regular cycling of staff through
a series of positions, with the goal of uncovering irregularities and preventing
collusion between employees. Mandatory vacations allow work to be
temporarily reassigned to other staff, during which time irregularities may be
discovered through the course of normal business processes. [Security and Risk
Management]
3. B - Abstraction is the process by which a system hides its own processes and
hardware from an application, and provides only a simple, high level
representation to an application. This allows an application to remain largely
agnostic with regards to the specific implementation details of the system on
which it is installed. Without abstraction, any given application would have to
be rewritten for every single system upon which it is installed, to accommodate
for variations in hardware and operating systems. [Security Engineering]
4. D - Residual risk is the risk that remains after countermeasures have been
implemented. It is calculated by this formula: threats x vulnerability x asset
value x controls gap = residual risk [Security and Risk Management]
8. B - Bollards are concrete or metal pillars that are intended to prevent a vehicle
or other conveyance from being driven through a wall. Typically used to secure
the perimeter of a facility, they may also be used inside facilities. In an active
warehouse, it is possible for a large piece of equipment to be accidentally or
intentionally rammed into a wall, thus permitting unauthorized access to
sensitive areas. Bollards provide a physical barrier against this. [Security
Assessment and Testing]
10. A - Work that isn't constrained by time or data processing dependencies can
typically be handed to an available CPU on an as needed basis. In asymmetric
processing, however, CPUs are dedicated to performing specific tasks, and are
not available to perform other types of processing. [Security Engineering]
11. D - Nancy is the Data Owner and Dave is the Data Custodian. The Data Owner is
typically a manager who has ultimate responsibility for the protection of
specific data. However, the Data Owner may delegate some of his or her
responsibilities to another person. The Data Custodian is the staff to whom the
day-to-day maintenance and security of the data has been delegated. [Security
and Risk Management]
14. C - The Biba access model focus is integrity. In order to protect data from
corruption or unauthorized access, users are prohibited from writing data
above their classification label, and from reading data below their classification
level. [Security Engineering]
16. C - Commonly used port- protocol mappings are called well known ports.
Standardization of these mappings enables interoperability between systems and
devices, regardless of vendor. Port numbers between 0 and 1023 constitute the
range of well known ports that have fixed protocol mappings.
[Communications and Network Security]
17. B - In order for a system to be classified as highly trusted, there must be a way
to verify that the system as a whole meets an organization's security
requirements. Operational and lifecycle assurances provide guarantees that a
given system works only as designed, and was developed within a very secure
development and distribution environment. [Security Operations]
19. D - Physical access to a server is the biggest vulnerability. Once an attacker has
physical control or possession of the system, he or she is not subject to time or
resource constraints associated with defeating technical access controls such as
firewalls, intrusion detection, or access control lists. [Identity and Access
Management]
21. D - Token devices are commonly used in two factor authentication to generate a
one time password that is valid for a single use. Token devices provide hashed
values to the user for entry along with his or her user ID. The token is
synchronized with an authentication service either synchronously or
asynchronously. [Security Assessment and Testing]
22. B - End User License Agreements, also known as EULAs, define the acceptable
use, terms, limits and conditions associated with a specific application. For
instance, EULA may state that an application may be installed on a maximum of
two workstations, that it may not be transferred to another party, and that it is
intended only for use in an educational environment. [Security Assessment and
Testing]
25. B - Encrypting all data as it is sent over the network will protect sensitive data
from interception by an attacker. However, it is recommended that all sensitive
data be encrypted while at rest and in transit. [Security Operations]
26. B - Dedicated security mode, specified in DOD Directive 5200.28, is an
operational mode in which all users have clearance or authorization,
documented formal access approval, and a need to know the information stored
on the system. Dedicated security mode can be implemented with a single or
multiple data classification levels. [Security Assessment and Testing]
28. C - Systems provided for public use can be secured with a constrained UI. By
configuring the system to present only the permitted applications, and hiding
access to any other applications or operating system functions, users are unable
to access the directory structure or command line to view, execute, and/ or
delete files. [Security Operations]
29. C - Best practice calls for annual of testing of business continuity plans.
However, it is imperative to update the BCP on a regular basis, to ensure it
includes the most recent changes in organizational polices, processes,
resources, and goals. [Security and Risk Management]
31. B - In a disk array using RAID 1+0, data on a drive in the first array is mirrored
to a matching drive in the second array, then striped across all disks in each
array. In RAID 0+1 data is first striped in an array then mirrored to a second
array. The combination of two different types of RAID in a single redundancy
mechanisms is called nested RAID. [Security Operations]
32. B - RC5 offers variable parameters that can be configured for encryption with
this cipher. Block size may be 32, 64 or 128 bits, key size may be 0 to 2040 bits,
and the number of rounds may be 0 to 255. [Asset Security]
33. D - DES, also known as Digital Encryption Standard, uses a 56 bit key. DES was
originally introduced as a Federal Information Processing Standard (FIPS) in
1976, but has been replaced in production systems with symmetric encryption
algorithms that offer a longer key length.; the short key length of DES is easily
cracked by the processing power of modern computers. [Asset Security]
35. A - The Bell- LaPadula access model allows users to read resources at or below
their classification level, but they are not permitted to write data in locations
below their access level. [Security Assessment and Testing]
36. A - Quantitative analysis uses numerical data to measure risks, while qualitative
analysis uses a subjective approach to prioritizing risks. Cost/ benefit analyses
are more credible when based on numerical data. [Security and Risk
Management]
37. C - Annunciator systems work in tandem with CCTC systems to alert staff that
some sort of movement has been detected, by means of lights, SMS messages,
sirens, or other mechanism. [Security Assessment and Testing]
Test Description
This is a cumulative CISSP Mock Exam which can be used as a benchmark for your
CISSP aptitude. This practice test includes questions from all eight domains of the
CISSP CBK.
Test Questions
1. Blackstone Realty has been operating at an alternate site following a flood that
caused major damage to their corporate offices. The corporate offices have
now been repaired and restored to a state of operational readiness, and the
company is now preparing to move back into their headquarters. In which phase
of the business continuity plan is Blackstone Realty now operating?
A. Reconstitution phase
B. Restoration phase
C. Salvage phase
D. Recovery phase
A. SAN
B. NAS
C. RAIT
D. Hot swappable
3. Jones & Dallas Trucking Co. is developing a business continuity plan. With
which of the following corporate initiatives should this plan be most tightly
integrated?
B. OSHA regulations
D. SEC regulations
A. Dual controls
B. Job rotation
C. Least privilege
D. Separation of duties
A. SESAME
B. HAMLET
C. TEMPEST
D. WAVES
B. Shatterproof
C. Both A and B
A. Shoulder surfing
B. Fraud
C. Social engineering
D. Identity theft
11. Mary has deleted the files on her hard drive prior to donating it to the local
library. However, Mary's data may not have been completely deleted, leaving
that information subject to access by unknown parties. What is this vulnerability
called?
A. Slack space
B. Data mining
C. Data remanence
D. Dumpster diving
12. Application layer protocols interface with applications, ensuring that a given
program is able to communicate over a network. Which of the following is an
example of an application layer protocol?
A. FTP
B. All of the above
C. HTTP
D. SMTP
13. The IT staff at Finkelstein & Smith Distributing notices unusual activity on a
server and discovers the system has been compromised. During the incident
response, it becomes apparent that the attack was the result of an exploit that
changed the order in which lines of code that use the same resource are
executed. Which of the following is this type of attack?
A. Race condition
C. Smurf
D. Teardrop
14. What tool would a hacker use to obtain a password from a hashed value?
A. Social engineering
B. SAM database
C. Encryption salt
D. Rainbow table
15. Five years ago, Marshall Manufacturing implemented a proprietary ERP system
at all 15 of its factories and distribution centers. The software was developed by
a company that recently declared bankruptcy and has gone out of business. A
critical security vulnerability has been discovered by Marshall Manufacturing,
but because they do not have access to the source code, and the company that
wrote the software has closed down, the company is unable to address this
problem. Which of the following would have prevented this situation?
A. Software as a service
B. Statement of responsibility
D. Software escrow
C. Software piracy
A. Sequence exploit
B. Stack flow
C. Race condition
D. Authentication failure
18. World Wide Paint and Pigment is relocating to a new facility. Melissa, the
network architect, is designing the backbone of the new network. Which of the
following topologies will provide the best protection from an outage at the
core of the network?
A. Bus
B. Star
C. Ring
D. Mesh
19. Smith, Klein & Harper has deployed an IDS that can detect a new type of attack
without needing to do regular signature updates. Which of the following IDS
types are capable of this?
A. Anomaly-based
B. Stateful matching
C. Rule-based
D. Signature-based
20. Covert intelligence agents Bob and Alice encrypt all their communications with
each other. Because of the high level of sensitivity of the information they are
sharing, they have implemented a cryptographic mechanism that offers perfect
secrecy of their messages. However, the trade-off of this encryption is that it is
impossible for Bob or Alice to be 100% sure they are communicating with each
other, nor can they be 100% certain of the veracity of the content of the
messages. Which of the following types of encryption methods are Bob and
Alice using?
A. Stream cipher
B. Blowfish
C. One-time pad
D. RSA
21. Three young boys have formed a club, and use a secret code to communicate
with each other. To create the code, they scrambled the 26 letters of the alphabet,
and use the resulting order of letters in place of the standard alphabetical order.
What type of cipher is this?
A. Transposition cipher
B. Stream cipher
C. Polyalphabetic cipher
D. Substitution cipher
22. The Picket Fence cipher encrypts a plain text message by arranging the letters
of the message rows, and then adding dummy characters. The message is
essentially scrambled and hidden within other text. What is this type of cipher
called?
A. Substitution cipher
B. Transposition cipher
C. Monoalphabetic cipher
D. Homophonic cipher
23. John is replacing a switch and a router in his company's data center. At which
layers of the OSI model do each of these devices function?
24. Janet and Steven are using the same encryption software to securely share
information between themselves. Both Janet and Steven have a public key that
they share with each other, and a private key that is used only by the owner of
that key. The shared key is used to encrypt data, the private is used to decrypt
data. By which of the following names is this type of system known?
A. Asymmetric encryption
B. DES encryption
C. AES encryption
D. Symmetric encryption
25. When modems send data, they include a data string that tells the recipient where
the data starts and stops. What is this method of communication called?
A. Asynchronous communication
B. Baseband
C. Synchronous communication
D. Streaming
A. Diameter
C. TACACS
D. RADIUS
27. A large hospital has determined that its disaster recovery site must be located
far enough away from its primary operations site to avoid potential impacts
from a regional disaster. What is the minimum recommended distance from the
primary site?
A. 50-200 miles
B. 5 miles
C. 500 miles
D. 15 miles
28. Which of the following is codified in the ISC2 Code of Ethics, to which all
CISSPs are bound?
A. Observe and abide by all contracts, expressed or implied
29. Which of the following protocols would be the best choice for an application
that is not dependent on guaranteed packet delivery?
A. IP
B. TCP
C. UDP
D. FTP
A. DoD model
B. ANSI model
D. TCP/IP stack
A. Technical staff
32. A team of hackers has broken the encryption code in use on a law firm's
database by monitoring how much CPU power is used during encryption and
decryption processes, as well as how long these processes take to execute. What
is this type of attack called?
A. Side-channel attack
B. Differential analysis
C. TEMPEST
D. Lands End
33. Which of the following is the most important component of a Kerberos system?
A. PGP
B. KDC
C. Tickets
D. TGT
B. The design should require the application to be restarted and users to re-
logon after restart.
C. A security patch
36. Best practices for the organization of information technology specify which of
the following reporting structures?
A. Transfers
B. Encapsulation
C. Ethernet
D. Store and forward
38. The legal counsel of Marbury Enterprises has advised that its incident response
procedures should be well documented in order to stand up in court. As a result,
the team developing the process has decided to base its policy on the six phases
of incidence response identified by ISC2. Which of the following is not one of
theses phases?
A. Tracking
B. Containment
C. Restitution
D. Triage
39. Due to budget cuts, several developers at a small company have been laid off.
Before their access rights were terminated, one of the developers, angry at the
company for his job loss, plants a script intended to delete certain files on a date
approximately 6 weeks in the future. What is this type of attack called?
A. Logic bomb
B. Social engineering
C. Trojan horse
D. Counterclockwise
40. Which of the following accurately represents the state of a trusted computing
base?
D. Transitive trust
CISSP Mock Exam (LITE)18
Answer Key and Explanations
2. D - Hot swappable drives will provide the fastest repair path for these
customers. In the event a disk in an external attached drive array failed, it could
be replaced without powering down the system it serves. [Security Operations]
4. C - Providing a user only the minimum rights and permissions required for his
or her job is known as least privilege. This approach prevents control of or
access to critical resources from being distributed too broadly within an
organization. [Security Operations]
8. C - Software piracy is an example of both the Candy From A Baby Fallacy and
the Shatterproof Fallacy. The Candy From A Baby Fallacy is the belief that
because something is easy to do with a computer, it can't be wrong. The
Shatterproof Fallacy is the belief that actions taken with a computer only affect
a few files, without considering the harm that can be caused to others through
those actions. [Security and Risk Management]
10. B - To determine total risk, one must first identify and quantify threats and
vulnerabilities, as well as the value of assets, and then apply the following
formula: threats x vulnerability x asset value. [Security and Risk Management]
11. C - Data remanence refers to data that remains on a disk or in memory even
after attempts have been made to remove it. [Security Assessment and Testing]
12. B - All of the above protocols are used by applications to transmit data over the
network. Each of these protocols interfaces with a specific type of application to
ensure that data it sends or receives is constructed in a format usable by the
application and the adjacent presentation Layer [Communications and Network
Security]
13. A - In a race condition, two different processes need to use one resource to
perform their tasks, and the processes must follow a specific sequence. In this
type of attack, the order in which code is processed is changed, thereby
allowing an attacker to control the outcome. For example, an attacker could
force an application to process a request for data access first, circumventing the
process for authentication. [Security Assessment and Testing]
15. D - Contracting with a 3rd party to hold source code, documentation, user
manuals, and other supporting data owned by one company but implemented by
another company is called a software escrow. The interests of both companies
are protected by this type of agreement. The intellectual property of the
software owner is held securely by a 3rd party, and a contract defines the
conditions under which the implementing company may access it. In this
scenario, software escrow would have permitted Marshall Manufacturing to
legally access the source code in order to develop necessary patches, despite the
fact the developing company is defunct. [Security and Risk Management]
16. A - The types of activities classified as cybercrimes extends beyond the theft of
credit card numbers, denial of service attacks, or vandalizing a corporate
website. A cybercrime is any act where digital property such as software or
digital music is used in a manner not authorized by the owner, or where the type
of information disseminated violates local ordinances. Distribution of
unlicensed software, copyrighted movies or music, or pornographic materials
in violation of local laws are all examples of cybercrimes. [Security
Assessment and Testing]
17. C - A race condition results when an application attempts to complete two steps
at the same time, and the completion of one process is dependent on the output
of another process. It is possible that an attacker could exploit the Federated
Freight application by forcing the authorization process to take place first,
bypassing the authentication process. [Security Assessment and Testing]
23. A - Switches are Layer 2 (Data link Layer) devices that are intended to simply
transmit data from device to device, while routers are Layer 3 (Network Layer)
devices that are intended to transmit data from network to network.
[Communications and Network Security]
25. A - When two systems communicate, they must be able to determine where data
starts and stops for processing purposes. Asynchronous communication, used
by modems, terminal services, and serial communication devices, uses data
strings to denote that information. Because these start and stop delimiters add
additional overhead, it is best for communications that involve sending small
amounts of data at one time. [Communications and Network Security]
26. B - In the centralized access control model all authentication, authorization, and
accounting functions are handled by a single entity. RADIUS, TACACS, and
Diameter are all remote access control technologies that are managed by a
single entity. The advantage of a centralized model is consistently applied
access policies. The disadvantage, however, is this model tends to be slower to
respond to requests for changes, adds, or deletes. [Security Assessment and
Testing]
28. B - All of the above responsibilities are part of the ISC2 Code of Ethics. The
Code is composed of 4 major canons, which are intended to guide CISSPs and
information security professionals when ethical dilemmas are encountered.
[Security Assessment and Testing]
29. C - UDP is a transport protocol that offers very fast speed with very low
overhead. However, it is a connectionless protocol, meaning it does not
establish a communications channel with the system with which is
communicating, nor does it offer any sort of guaranteed packet delivery or
sequencing. [Communications and Network Security]
30. C - The OSI reference model compartmentalizes network functions into seven
layers: physical, data link, network, transport, session, presentation, and
application. [Communications and Network Security]
31. C - Computer Incident Response Teams (CIRT) are composed of staff with a
range of roles, responsibilities, and skills both technical and non-technical.
Depending on the organization and the types of incidents to which the CIRT is
chartered to respond to, these teams include members of legal, human
resources, finance, IT, and senior management. [Security and Risk
Management]
32. A - A side-channel attack uses data gathered from the physical infrastructure
upon which an encryption algorithm runs to crack an encryption key, rather
than brute force or exploiting weaknesses. This can include monitoring CPU
cycles and usage, electromagnetic patterns, power usage, or even the sounds a
device makes as it executes computational functions. [Asset Security]
33. B - The Key Distribution Center (KDC) is the most critical component of a
Kerberos system. Besides containing the secret keys of all users and services,
the KDC provides key distribution and authentication services. [Security
Assessment and Testing]
34. B - When an application fails it should enter a mode called a failed state. Once
an application enters a failed state, it must be restarted and user credentials
presented again. By designing this as the default failure recovery mechanism,
application teams do not have to develop solutions for every possible reason an
application may fail. [Security Assessment and Testing]
39. A - A logic bomb is a piece of malicious code that is intended to perform one
or more processes at such time as specific criteria are met. Planting code that is
set to execute a file deletion script on a certain date is an example of this type of
attack. [Security Assessment and Testing]
40. A - A trusted computing base (TCB) is the set of all the hardware, software, and
firmware components that are critical to a system's security. The TCB is trusted
to provide system security within practical limits, but it is understood the TCB
is not trustworthy, can be compromised by defects such as faulty code or
physical failure of the hardware. [Security Assessment and Testing]
CISSP Mock Exam (LITE)19
Practice Questions
Test Description
This is a cumulative CISSP Mock Exam which can be used as a benchmark for your
CISSP aptitude. This practice test includes questions from all eight domains of the
CISSP CBK.
Test Questions
B. Type II errors
C. Ejection rate
D. Type I errors
A. UDP
B. HTTPS
C. FTP
D. TCP
A. User
B. I/O
C. Privileged
D. Protected
A. Journaling
B. Vaulting
C. Incremental
D. Full
5. Mills Trucking has implemented a special zone to house its corporate network.
This zone is logically situated between two firewalls. One firewall is between
the webserver and the Internet, the other firewall is between the webserver and
the corporate network. What is this zone called?
A. Gateway
B. Subnet
C. VLAN
D. DMZ
A. IDS
B. Firewall
C. Web server
D. Web browser
7. A user enters a www.acme.com into a web browser, and the request is sent over
the internet to the webserver that hosts that website. Because network traffic is
directed across the internet by means of a destination address, what service is
necessary to translate www.acme.com to its IP address?
A. ARP
B. DNS
C. WIINS
D. Cache
8. The law firm of Ross, Huff, and Wilson is remodeling its single story office
building. The renovation work includes replacing all exterior windows and
doors. Which of the following types of glass is recommended for this
scenario?
B. Tempered glass
C. Laminated glass
D. Wired glass
B. Virus
C. Worm
D. Mobile code
10. Which of the Rainbow Series books defines the requirements for testing the
security of a computer system?
A. Blue Book
B. Yellow Book
C. Orange Book
D. Red Book
11. The customer credit card data of PCC Industries has been stolen by hackers who
then used this information to make hundreds of fraudulent credit card
purchases. Several affected customers decide to sue PCC. During the trial their
attorney provides evidence that PCC had a legally recognized obligation to
protect it's customers' data but failed to do so, and the customers' damages were
the result of this failure. What has the plaintiff's attorney established?
A. Criminal intent
B. Malfeasance
C. Negligence
D. Risk
12. What types of risk management are representing in the following scenarios? a)
Implementing an enterprise backup system to reduce the likelihood of data loss
is an example of what type of risk management, and b) acquiring insurance for
the data center in which the backup system resides.
13. Planning for a disaster must include more than just a plan for replacement
facilities and infrastructure. Which of the following is another critical area of
analysis and business continuity planning?
B. Role evaluation
C. Responsibility matrix
D. Resource accountability
14. The city library of Pine Branch would like to provide a computer for the public
to use for internet access. However, the staff wants to prevent users from
accessing critical system files or changing configuration parameters like
screen savers, desktop background, and so forth. Which of the following access
controls would best meet their needs?
A. Discretionary
B. Role-based
15. Joan and Mary each work for a different company, but often collaborate on
projects. Both companies have setup PKI infrastructure, and their employees
have been given certificates authenticating their identities. Joan needs to access
resources in Mary's network, and Mary needs to access resources in Joan's
network. Which of the following would allow Joan and Mary to be
authenticated to access the resources they need?
C. Root certificate
16. The administrator of a small office LAN is investigating the cause of slow
performance on the network. It appears that a broadcast storm from a faulty
network card is the cause of the latency. Which of the following devices would
pass this broadcast traffic from one LAN segment to another?
A. Bridges
B. Concentrator
C. Router
D. Repeater
17. Carl wants to send a file securely to Bob. It is important that the encryption
mechanism be fast and provide a high level of confidentiality. Message
integrity, authentication, and non-repudiation are not as important to Carl.
Which of the following encryption mechanisms best meets Carl's needs?
A. El Gamal
B. RSA
C. AES
D. Diffie-Hellman
A. Role-based access
B. Group policy
C. Rule-based access
A. Safe Harbor
B. SAFER Barrier
C. PKI
D. X.509
20. Ted is a sales rep for a health club. Once he has closed a sale, he takes payment
for the $80 joining fee. Every so often, Ted tells the new member the joining
fee is $100, charges the customer this amount, but enters $80 into the club's
accounting system and keeps the extra $20 for himself. What is type of data
attack called?
A. Data diddling
B. Embezzlement
C. Superman attack
D. Salami attack
21. Following an information security breach, the incident response team at Lloyd
& Grace, LLP gathers evidence of the attack. The team documents who gathered
the evidence, how it was gathered, to whom the evidence was given for safe
storage, where the storage site is located, and every person that has accessed the
evidence following its collection. What is this documentation called?
A. Chain of custody
B. Logging
C. Incident report
D. Protocol
A. Telephoto
24. A company has taken out an insurance policy as a countermeasure against loss
due to a material breach in its network. What type of loss could be incurred
from a data breach?
C. Loss of reputation
D. All of the above
25. Zoey is performing penetration testing on her company's network. What is the
purpose of this type of testing?
A. Vulnerability identification
B. Intrusion prevention
C. Intrusion detection
D. Malware prevention
26. A small business has implemented a security policy mandating the use of 2-
factor authentication to log on to their network, and the encryption of all data
sent into or out of the network. However, limiting their security policies to just
these two protective mechanisms will leave the business exposed to what type of
threat?
B. Spoofing
C. DoS
D. Replay attacks
27. John swipes his badge to open the door to the warehouse of Wilson Lumber and
holds the door for Jane to pass through without swiping her badge. What is this
type of access control circumvention called?
A. Carpooling
B. Proximity access
C. Piggybacking
A. Managed
B. Optimizing
C. Defined
D. Repeatable
29. The lock on a storage facility uses an electronic keypad for access code entry.
What additional security components should be implemented with this?
A. Twofish
B. RC6
C. Rijndael
D. MARS
31. Jan is calculating the maximum tolerable downtime (MTD) for financial
reporting capabilities for her company's business continuity plan. After
interviewing the company's senior and executive management team, it is
determined that, because the company operates on a global basis and a disaster
at one location would not necessarily impact operations at another location, the
ability to run these reports should be restored within 24 hours. Which of the
following MTD estimates would apply to reporting capabilities
A. Critical
B. Normal
C. Urgent
D. Important
32. The most recent inventory at McCall's Fixtures shows the level of certain types
of products in storage is lower than expected. In response, management decides
to change the types of locks in use on its storage facilities. They have selected a
type of lock that is resistant to attack for 30 minutes. Which of the following
locks have they selected?
B. Rim Lock
C. Deadbolt lock
D. Cylinder lock
33. Currently, when a sales person at MPC Systems wants to know which customers
purchased a specific product, he or she must run the same query on each of
several databases that contain information from each of the company's
divisions. This approach takes several minutes, and the sales person must then
consolidate the data into a single report before analyzing the data. Which of the
following could streamline this process?
A. Relational database
B. Data warehousing
A. Deter-detect-delay-respond
D. Defense in depth
35. Dan is reviewing account usage logs and sees that Jan has not logged in for
several weeks. He contacts Jan's supervisor to investigate this inactivity, and
learns that Jan is on maternity leave for the next 60 days. What should Dan's
next step be?
A. OCTAVE
B. PUSH
D. Delphi
37. A small company has posted links to several files on its public website. Rather
than using a sanitized version of a URL that points to a virtual directory,
however, the URLs for these files reveal the actual file and folder structure of
the server where the files are housed. Which of the following attacks exploits
this particular vulnerability?
A. Denial of service
B. Spoofing
C. Rainbow tables
D. Directory traversal
38. The Payment Card Industry Security Standards Council has mandated various
security standards for ATM hardware, software, and keypads. Which of the
following encryption algorithms is the PCI standard for ATMs?
A. 3DES
B. Blowfish
C. SSL
D. DES
39. Backing up to tape or other removable media can take a significant amount of
time to complete. Which of the following backup types take the least amount of
time to perform?
A. Partial
B. Incremental
C. Intermediate
D. Differential
A. Journaling
B. Electronic vaulting
C. Differential
D. Disk shadowing
CISSP Mock Exam (LITE)19
Answer Key and Explanations
1. A - The crossover error rate (CER) provides the best insight into a biometric
system's accuracy. It is the point at which Type I errors (false rejection rate)
equal Type II errors (false acceptance rate). When comparing the CER of two
systems, the system with a lower rate is the more accurate of the two. [Security
Assessment and Testing]
6. D - ActiveX download settings are configured at the user level, within the
browser. Users may opt to download ActiveX components automatically (less
secure) or manually (more secure). [Security Assessment and Testing]
8. C - Laminated glass is recommended for use in street level windows and doors.
It is composed of two sheets of glass bonded to a middle layer of plastic. When
laminated glass is struck with enough force to break the glass, the plastic layer
prevents the glass from shattering and displacement onto surrounding surfaces.
[Security Assessment and Testing]
9. D - Mobile code is any application that has a remote source but is executed
locally. Examples of this type of threat include java scripts hidden on website,
or applications on removable media that launch and run automatically upon
insertion into a system. Because there is no need for user intervention to launch
these code attacks, it is easy for attackers exploit remote systems that do not
have appropriate countermeasures. [Security Assessment and Testing]
10. C - The Rainbow Books are a series of security guidelines and standards
published by various US government agencies. They are known as the Rainbow
Books because each book has a different color cover. The Orange Book is
called the Trusted Computer System Evaluation Criteria (TCSEC) and sets forth
the requirements for assessing the security of a given computer system.
[Security Assessment and Testing]
12. D - Risk mitigation and risk transference is the correct response. Risk
mitigation is the reduction or elimination of a risk by implementing
countermeasures against a threat. Countermeasures include such safeguards as
backup systems, firewalls, or badge readers. Risk transference is the practice of
passing the risk to another party, such as an insurance company or a managed
service provider. [Security and Risk Management]
13. A - Business process recovery is a very important element of a business
continuity plan. The BCP team must identify critical business processes and
analyze the steps in those processes, as well as the staff and resources required
to execute the process. This information is used to create a contingency plan for
recovery in the event of the loss of staff or resources needed to execute the
processes. [Security and Risk Management]
14. C - None of the above is the correct answer. The access control technique the
library staff should implement is called a constrained user interface. This
control prevents or limits access to functions or files by not allowing users to
request prohibited resources. This can be accomplished by providing a menu
that contains limited choices. In the case of the library, the menu could present
only the web browser. [Security Assessment and Testing]
15. B - Multiple organizations that have a need for its users to be recognized by
each of the other organizations can sign each other's public key or root
certificate. This is called cross-certification, and establishes a trust relationship
based on the controls negotiated by the organizations. Cross- certifications can
be peer to peer or hierarchical. [Asset Security]
16. A - Bridges are used to subdivide networks into smaller segments. Because they
have more intelligence than hubs, they are able to forward traffic between
network segments. However, this capability also allows broadcast storms that
occur on one segment to be forwarded to all other segments, potentially
impacting an entire LAN. [Communications and Network Security]
17. C - AES offers the highest level of encryption among the cryptographic
mechanisms listed. It is a symmetric algorithm, and encrypts data very quickly.
However, it does not offer authentication, integrity, or proof of origin controls.
The remaining algorithms are asymmetric algorithms used for exchanging
keys, not the encryption of data. [Asset Security]
18. A - Rather than granting permissions and access rights to individual users,
database administrators can assign these rights and permissions to a role, then
add the user to that role. By managing security at the role level, administrators
can avoid situations whereby individual accounts may, over time, accumulate
more access rights and permissions than required for their specific job within
the organization. [Security Assessment and Testing]
19. A - Safe Harbor is a set of principles that provide guidance on acceptable levels
of security for personal data transmitted between organizations in Europe and
the US. This framework allows each country to adhere to its own laws,
regulations, and organizational policies, while still providing a meaningful
level of security trusted by other countries. [Security Assessment and Testing]
20. A - Data diddling refers to an attack that alters existing data in some way. In this
scenario, the data was altered between the new member's approval of the $100
fee and Ted entering it as $80 in the accounting application. [Security
Assessment and Testing]
22. A - Adhering to the principle of least privilege, Tim should have two accounts:
a privileged admin level account for performing systems work, and a non-
privileged account such as an ordinary user or power user to perform non-
administrative tasks. [Security Operations]
23. D - Short focal length lenses provide a wide angle view of an area, which is
ideal in an open area such as a lobby. Long focal length lenses provide a very
narrow view, which is more appropriate for small areas such as entry/ exit
points. [Security Assessment and Testing]
24. D - When the security of an organization's data is breached, both direct and
indirect losses can occur. Direct losses include loss of trade secrets and
intellectual property, while indirect losses can include loss of reputation, lost
productivity during an outage caused by the breach, and the cost of fines and
restitution related to the loss of confidential customer or employee information.
[Security Assessment and Testing]
26. D - Strong authentication and encryption will thwart most man in the middle
and spoofing attacks. However, the data packets in transit may be intercepted
and used in a replay attack, where the data is resent to the destination at a later
time. Using some sort of timestamp on the packets being sent are an effective
countermeasure to this threat. [Asset Security]
27. C - Piggybacking is the term for two or more persons passing through an
access point on a single access method, such as one card swipe or PIN entry.
This isn't always a malicious intrusion; many times one employee simply holds
the door open for the employee behind him or her. However, this could allow
users without proper authorization to enter highly sensitive or secure areas. A
security awareness program reminding users that every staff member must use
their access control mechanism (e.g. swiping their badge or entering their PIN)
every time they pass through a controlled portal is a company policy is a
countermeasure for this. [Security Assessment and Testing]
29. D - When using electronic cipher locks, it is highly recommended that the
keypad be shielded from view by anyone but the immediate user, to prevent
unauthorized users from shoulder surfing key codes. These types of locks
should also be connected to a battery backup to ensure continuous operation of
the lock during power outages. [Security Assessment and Testing]
30. C - NIST selected the Rijndael algorithm as the replacement standard for DES.
Also known as the Advanced Encryption Standard or AES, it is a symmetric
block cipher that supports key sizes of 128, 192, and 256 bits. [Asset Security]
31. C - ISC2 provides the following MTD estimates for business continuity
planning: nonessential: 30 days; normal: seven days; important: 72 hours;
urgent: 24 hours; critical: minutes to hours. It is important to note that more
than one estimate will be used within an organization, as various functions and
capabilities much each be MTD-rated. [Security and Risk Management]
32. A - Underwriter Laboratories standard 437 requires that security container key
locks withstand 30 minutes of attack by various means, including picking,
drilling, sawing, prying, and punching. [Security Assessment and Testing]
33. B - Data warehousing could streamline data gathering and reporting for this
organization. A data warehouse consolidates data from different databases and
provides it in a user friendly format. It is important to note the warehouse
contains copies of the data from each source it services; when a user executes a
query, the results returned are from the warehouse's data store. [Security
Assessment and Testing]
34. C - A robust physical security plan includes multiple elements that are layered
in such a way as to act as failsafe measures. Defense in depth, CPTED, and
deter-detect-delay-respond all address this layered approach to security.
[Security Assessment and Testing]
36. C - OCTAVE, Delphi, and PUSH are qualitative risk assessment methodologies
that use subjective measurements, including likelihood determination and
determination of impact, to determine risk. Quantitative risk assessment
methodologies use numerical values to determine risk. [Security and Risk
Management]
37. D - When an attacker can see the true file path as part of a URL, he or she can
execute a directory traversal attack to navigate into other folders and files. This
is accomplished by inserting a standard comandline directory navigation
command, “../”, into the URL to move upward in the directory structure, then
running other commands to view and change directories at will. This attack is
also known as the “dot slash” attack, named after the characters used to initiate
the directory traversal. [Security Assessment and Testing]
38. A - 3DES, also known as Triple DES is an encryption algorithm that applies the
DES cipher 3 times to each data block, with either 2 or 3 different keys. This is
a very strong cryptographic algorithm, but the tradeoff is that it is also very
computationally intensive. [Asset Security]
39. B - Incremental backups take less time to complete than either full or
differential backups, as only the files with changed archived bits are backed up.
However, incremental backups are more complicated and take more time to
restore, because they must be restored in the precise order in which they were
backed up to avoid missing a file. [Security and Risk Management]
40. D - Disk shadowing uses two complete and identical sets of data on two or
more disks that appear as a single drive to the system. In the event that one of
the disks fails, the data on the remaining set is still available to users. Because
identical data are available on two separate disks, IO performance is improved
when a multiple users attempt to simultaneously access a file. [Security and Risk
Management]
Extra Domain Area Test: Security and Risk Management
Practice Questions
Test Name: Extra Domain Area Test: Security and Risk Management
Total Questions: 15
Correct Answers Needed to Pass: 11 (73.33%)
Time Allowed: 25 Minutes
Test Description
This practice test specifically targets your knowledge of the Security and Risk
Management domain area.
Test Questions
B. Hackers are only trying to learn and do not make a profit by entering in to
private systems. They should not be penalized.
A. Circumstantial
B. Hearsay
C. Real
D. Opinion
4. There are various types of evidence that can be used in a court of law. What
type of evidence cannot be used on its own, but may be admissible to prove
other, more substantial evidence?
A. Circumstantial evidence
B. Opinion evidence
C. Hearsay evidence
D. Corroborative evidence
5. Alice is the network security administrator for her company. She detects a real-
time attack on a server containing valuable and private records. Which of the
following should she do first?
A. Social Engineering
B. Dumpster Diving
C. Phreaking
D. Black Boxing
A. Firewall Hacking
B. Phishing
C. Dumpster Diving
D. Social Engineering
B. World-wide
A. Isolate the system from the network, power down the system, take a memory
dump and make a copy of the attacked system's disk drives.
B. Isolate the system from the network, take a memory dump, power down the
system and make a copy of the attacked system's disk drives.
C. Power down the system, isolate the system from the network, make a copy
of the attacked system's disk drives and take a memory dump.
D. Power down the system, isolate the system from the network, take a memory
dump and make a copy of the attacked system's disk drives
B. He should have every user of the product sign an End User Licensing
Agreement (EULA).
A. Trademark
B. Patent
C. Copyright
D. Trade secret
15. A CISSP violates the (ISC)2 Code of Ethics for CISSPs. Another CISSP, who is
his peer, reports this to (ISC)2. What is the next step that may happen?
A. (ISC)2 will give the alleged violator a warning and inform him that the next
occurrence could result in his losing his certification.
B. (ISC)2 will subject the alleged violator to a peer review panel to determine
whether he knowingly or unknowingly committed the violation.
D. (ISC)2 will place the alleged violator's name on a black-list and inform him
that his certification is no longer valid.
Extra Domain Area Test: Security and Risk Management
Answer Key and Explanations
1. B - All evidence placed before a court of law must have a significant bearing on
a material fact. This data should be reliable and contribute to the proving or
disproving of the disputed issue. [Security and Risk Management]
2. C - Encryption of personal data is the only choice listed that is not an ethical
fallacy. [Security and Risk Management]
5. C - Disconnecting from the network is the best course of action. Anything that
might interrupt the power to machine will destroy evidence in cache and RAM.
A backup is useless once the damage is done. [Security and Risk Management]
7. B - Dumpster diving is the specific term used for this action. Social engineering
was not used here. Phreaking is a type of telephone hacking to make free calls,
and black boxing is a specific type of phreaking [Security and Risk
Management]
8. D - Such a team is usually called the Incident Response Team. This team works
with a set of procedures to be carried out in the event of actual or suspected
incidents. [Security and Risk Management]
12. B - The correct sequence of events would be to: Isolate the system from the
network, take a memory dump, power down the system and make a copy of the
attacked system's disk drives. Since primary memory is volatile, its contents
will be lost if the system is powered down. Hence it has to be copied first.
[Security and Risk Management]
13. C - The software product manufacturer should acquire a patent so that he has
full control over the algorithm and who can use it in their products. This will be
typically valid for a specific period of time. [Security and Risk Management]
15. B - When a CISSP violates the (ISC)2 Code of Ethics, (ISC)2 will form a peer
review panel to determine whether he knowingly violated the Code of Ethics.
Subsequent actions are decided based on the recommendations of this panel.
[Security and Risk Management]
Extra Domain Area Test: Security Operations
Practice Questions
Test Description
This practice test specifically targets your knowledge of the Security Operations
domain area.
Test Questions
2. Which of the following is the best option to handle data security for portable
devices such as a laptops?
C. Stay alert in airports and public places to prevent loss of the laptop.
D. The administrator should ask the users to discuss and introduce a formal set
of protocols known only to them.
4. A computer application that accessed a very critical file server was developed
such that it required two administrator-level users to simultaneously log in for
either of them to gain access to the system. Such a precaution would be termed
as:
A. Separation of duties.
B. Good authentication.
C. Excessive authentication.
D. Joint duties
B. Weekly reports are too far apart and reporting needs to happen daily.
A. Supervision
B. Highest privilege
C. Need-to-know
D. Separation of duties
7. As part of object reuse assurance, software tools are used that overwrite sectors
of magnetic media so that the average attacker or hacker is unable to retrieve
information that was stored on it. What is the typical recommendation for such
overwriting?
D. Multiple rounds of overwriting for all kinds of data. (Ideally this should be
done 7 times).
8. An optical disk was not properly purged, with the result that some of the
company data was leaked out to a competitor. What is the best way to purge an
optical disk?
9. An IT services company plans to upgrade its computer systems and donate the
older systems for a social cause. What would your primary suggestion be?
A. All hard disks and digital media should be destroyed and the systems should
be dispatched without the media.
B. The computers should be dispatched only after all data on hard disks has
been deleted by using the basic format functionality of the operating
systems.
D. All hard disks and digital media should be sanitized before the systems leave
the company premises.
10. What configuration will ensure that received fax documents are kept
confidential and secure?
A. Configure the fax device to only accept faxes when a user is present to
receive it.
B. Configure a fax server to route the received faxes to the appropriate user's
electronic mailbox.
C. Configure the fax device to only accept faxes from known senders.
D. Configure a fax server to print the faxes to the nearest printer and include a
cover page that separates the printed faxes by user name.
11. What type of backup will contain any files that have changed since the last full
backup?
A. Partial
B. Full
C. Differential
D. Complete
12. The HR director of a company had certain valuable data on her desktop
computer. A hard disk crash wiped out important data that was hard to recreate.
Which could have been done to avoid this?
A. Hard disk crashes are an operational risk. There is not much that can be
done in case of a hard disk crash on a desktop.
C. It is the user's responsibility to backup data. Nothing much can be done about
such a failure.
13. During the quarterly audit of software licenses being used in a company, it was
discovered that there were two extra software installations for which no valid
license was available. What should the next step be?
D. This is a legal issue. The applications must immediately be deleted from the
computer systems.
B. Biometrics
C. Personal Firewalls
1. C - A key consideration while deciding the off-site backup location is that the
location should be sufficiently far enough so that it is not affected by the same
natural calamity; at the same time, it should not be so far away that recovering
the backup becomes difficult. The choice of a location 100 miles away is a
good choice. The choices of a backup within the same facility and city are poor
choices. A backup location 1000 miles away is too far away for quick retrieval.
[Security Operations]
4. A - At first glance, this might seem like a situation where security requirements
have been exaggerated. However, if there is a mission-critical server, it might
be necessary to have two individuals manage the system, thus ensuring that no
one person can misuse it. Hence, this is separation of duties enforced to a very
high degree. [Security Operations]
8. A - Grinding the data side of the optical disk such that the media is rendered
unreadable is a very effective way of destroying it. At a minimum, the grinding
can be used to scratch the surface to such an extent that the media is rendered
unreadable. [Security Operations]
10. B - The best way to ensure that faxed documents are kept confidential is to
implement a fax server. When a fax is received by the fax server, it determines
who the fax is intended for and sends it to the electronic mailbox of that user so
that they can view it with their email client. This ensures that only the user that is
intended to see the fax will actually see it. This overcomes the issue with
traditional fax machines where faxes could be easily compromised. [Security
Operations]
11. C - The differential backup will contain any files that have changed since the
last full backup, regardless of the fact that they have been backed up before.
This is because the archive bit is left on to identify that these files have not yet
been saved to a full backup. [Security Operations]
14. D - When personnel do not lock their console or log out, they may be held
liable for what is done on their equipment in their absence. Biometrics and
firewalls do not help when someone leaves a session unattended. Mandatory
screen timeouts will help in such cases. [Security Operations]
Studying for a multiple choice exam entails preparing in a unique way as opposed
to other types of tests. The CISSP exam asks one to recognize correct answers
among a set of four options. The extra options that are not the correct answer are
called the “distracters”; and their purpose, unsurprisingly, is to distract the test taker
from the actual correct answer among the bunch.
Students usually consider multiple choice exams as much easier than other types of
exams; this is not necessarily true with the CISSP exam. Among these reasons are:
• Most multiple choice exams ask for simple, factual information; unlike the
CISSP exam which often requires the student to apply knowledge and make a
best judgment.
Although 6 hours may seem like more than enough time for a multiple choice
exam; time management remains a crucial factor in succeeding and doing well. You
should always try and answer all of the questions you are confident about first, and
then go back to those items you are not sure about afterwards. Always read carefully
through the entire test as well, and do your best to not leave any question blank upon
submission– even if you do not readily know the answer.
Many people do very well with reading through each question and not looking at the
options before trying to answer. This way, they can steer clear (usually) of being
fooled by one of the “distracter” options or get into a tug-of-war between two
choices that both have a good chance of being the actual answer.
Never assume that “all of the above” or “none of the above” answers are the actual
choice. Many times they are, but in recent years they have been used much more
frequently as distracter options on standardized tests. Typically this is done in an
effort to get people to stop believing the myth that they are always the correct
answer.
You should be careful of negative answers as well. These answers contain words
such as “none”, “not”, “neither”, and the like. Despite often times being very
confusing, if you read these types of questions and answers carefully, then you
should be able to piece together which is the correct answer. Just take your time!
Never try to overanalyze a question, or try and think about how the test givers are
trying to lead astray potential test takers. Keep it simple and stay with what you
know.
If you ever narrow down a question to two possible answers, then try and slow
down your thinking and think about how the two different options/answers differ.
Look at the question again and try to apply how this difference between the two
potential answers relates to the question. If you are convinced there is literally no
difference between the two potential answers (you’ll more than likely be wrong in
assuming this), then take another look at the answers that you’ve already eliminated.
Perhaps one of them is actually the correct one and you’d made a previously
unforeseen mistake.
Although you should always take each question individually, “none of the above”
answers are usually less likely to be the correct selection than “all of the above” is.
Keep this in mind with the understanding that it is not an absolute rule, and should be
analyzed on a case-by-case (or “question-by-question”) basis.
Looking for grammatical errors can also be a huge clue. If the stem ends with an
indefinite article such as “an” then you’ll probably do well to look for an answer
that begins with a vowel instead of a consonant. Also, the longest response is also
oftentimes the correct one, since whoever wrote the question item may have tended
to load the answer with qualifying adjectives or phrases in an effort to make it
correct. Again though, always deal with these on a question-by-question basis,
because you could very easily be getting a question where this does not apply.
Verbal associations are oftentimes critical because a response may repeat a key
word that was in the question. Always be on the alert for this. Playing the old
Sesame Street game “Which of these things is not like the other” is also a very solid
strategy, if a bit preschool. Sometimes many of a question’s distracters will be very
similar to try to trick you into thinking that one choice is related to the other. The
answer very well could be completely unrelated however, so stay alert.
Just because you have finished a practice test, be aware that you are not done
working. After you have graded your test with all of the necessary corrections,
review it and try to recognize what happened in the answers that you got wrong. Did
you simply not know the qualifying correct information? Perhaps you were led
astray by a solid distracter answer? Going back through your corrected test will
give you a leg up on your next one by revealing your tendencies as to what you may
be vulnerable with, in terms of multiple choice tests.
It may be a lot of extra work, but in the long run, going through your corrected
multiple choice tests will work wonders for you in preparation for the real exam.
See if you perhaps misread the question or even missed it because you were
unprepared. Think of it like instant replays in professional sports. You are going
back and looking at what you did on the big stage in the past so you can help fix and
remedy any errors that could pose problems for you on the real exam.