CISSP
CISSP
Version: Demo
Question Set 1
QUESTION 1
A potential problem related to the physical installation of the Iris Scanner in regards to the usage of the iris
pattern within a biometric system is:
Correct Answer: D
Explanation
Explanation/Reference:
Because the optical unit utilizes a camera and infrared light to create the images, sun light can impact the
aperture so it must not be positioned in direct light of any type. Because the subject does not need to have
direct contact with the optical reader, direct light can impact the reader. An Iris recognition is a form of
biometrics that is based on the uniqueness of a subject's iris. A camera like device records the patterns of
the iris creating what is known as Iriscode. It is the unique patterns of the iris that allow it to be one of the
most accurate forms of biometric identification of an individual. Unlike other types of biometics, the iris
rarely changes over time. Fingerprints can change over time due to scaring and manual labor, voice
patterns can change due to a variety of causes, hand geometry can also change as well. But barring
surgery or an accident it is not usual for an iris to change. The subject has a high-resoulution image taken
of their iris and this is then converted to Iriscode. The current standard for the Iriscode was developed by
John Daugman. When the subject attempts to be authenticated an infrared light is used to capture the iris
image and this image is then compared to the Iriscode. If there is a match the subject's identity is
confirmed. The subject does not need to have direct contact with the optical reader so it is a less invasive
means of authentication then retinal scanning would be.
The iris pattern changes as a person grows older. The question asked about the physical installation of the
scanner, so this was not the best answer. If the question would have been about long term problems then
it could have been the best choice. Recent research has shown that Irises actually do change over time:
http://www.nature.com/news/ageing-eyes-hinder- biometric-scans-110722
There is a relatively high rate of false accepts. Since the advent of the Iriscode there is a very low rate of
false accepts, in fact the algorithm used has never had a false match. This all depends on the quality of the
equipment used but because of the uniqueness of the iris even when comparing identical twins, iris
patterns are unique.
QUESTION 2
In Mandatory Access Control, sensitivity labels attached to object contain what information?
Correct Answer: B
Explanation
Explanation/Reference:
The following is the correct answer: the item's classification and category set.
A Sensitivity label must contain at least one classification and one category set.
Category set and Compartment set are synonyms, they mean the same thing. The sensitivity label must
contain at least one Classification and at least one Category. It is common in some environments for a
single item to belong to multiple categories. The list of all the categories to which an item belongs is called
a compartment set or category set.
The item's need to know. Is incorrect because there is no such thing. The need to know is indicated by the
catergories the object belongs to. This is NOT the best answer.
QUESTION 3
Which of the following is true about Kerberos?
Correct Answer: C
Explanation
Explanation/Reference:
Kerberos depends on secret keys (symmetric ciphers). Kerberos is a third party authentication protocol. It
was designed and developed in the mid 1980's by MIT. It is considered open source but is copyrighted and
owned by MIT. It relies on the user's secret keys. The password is used to encrypt and decrypt the keys.
It encrypts data after a ticket is granted, but passwords are exchanged in plain text. Is incorrect because
the passwords are not exchanged but used for encryption and decryption of the keys.
It is a second party authentication system. Is incorrect because Kerberos is a third party authentication
system, you authenticate to the third party (Kerberos) and not the system you are accessing.
References:
MIT http://web.mit.edu/kerberos/
Wikipedi http://en.wikipedia.org/wiki/Kerberos_%28protocol%29 OIG CBK Access Control (pages 181 -
184)
AIOv3 Access Control (pages 151 - 155)
QUESTION 4
Which of the following is needed for System Accountability?
A. Audit mechanisms.
B. Documented design as laid out in the Common Criteria.
C. Authorization.
D. Formal verification of system design.
Correct Answer: A
Explanation
Explanation/Reference:
Is a means of being able to track user actions. Through the use of audit logs and other tools the user
actions are recorded and can be used at a later date to verify what actions were performed.
Accountability is the ability to identify users and to be able to track user actions.
Authorization. Is incorrect because Authorization is granting access to subjects, just because you have
authorization does not hold the subject accountable for their actions.
Formal verification of system design. Is incorrect because all you have done is to verify the system design
and have not taken any steps toward system accountability.
References:
OIG CBK Glossary (page 778)
QUESTION 5
What is Kerberos?
Correct Answer: B
Explanation
Explanation/Reference:
Is correct because that is exactly what Kerberos is.
A security model. Is incorrect because Kerberos is an authentication protocol and not just a security model.
A remote authentication dial in user server. Is incorrect because Kerberos is not a remote authentication
dial in user server that would be called RADIUS.
QUESTION 6
Kerberos depends upon what encryption method?
Correct Answer: B
Explanation
Explanation/Reference:
Kerberos depends on Secret Keys or Symmetric Key cryptography.
Kerberos a third party authentication protocol. It was designed and developed in the mid 1980's by MIT. It
is considered open source but is copyrighted and owned by MIT. It relies on the user's secret keys. The
password is used to encrypt and decrypt the keys.
This question asked specifically about encryption methods. Encryption methods can be SYMMETRIC (or
secret key) in which encryption and decryption keys are the same, or ASYMMETRIC (aka 'Public Key') in
which encryption and decryption keys differ.
'Public Key' methods must be asymmetric, to the extent that the decryption key CANNOT be easily derived
from the encryption key. Symmetric keys, however, usually encrypt more efficiently, so they lend
themselves to encrypting large amounts of data. Asymmetric encryption is often limited to ONLY
encrypting a symmetric key and other information that is needed in order to decrypt a data stream, and the
remainder of the encrypted data uses the symmetric key method for performance reasons. This does not in
any way diminish the security nor the ability to use a public key to encrypt the data, since the symmetric
key method is likely to be even MORE secure than the asymmetric method.
For symmetric key ciphers, there are basically two types: BLOCK CIPHERS, in which a fixed length block
is encrypted, and STREAM CIPHERS, in which the data is encrypted one 'data unit' (typically 1 byte) at a
time, in the same order it was received in.
Public Key cryptography. Is incorrect because Kerberos depends on Secret Keys or Symmetric Key
cryptography and not Public Key or Asymmetric Key cryptography.
References:
OIG CBK Access Control (pages 181 - 184)
AIOv3 Access Control (pages 151 - 155)
Wikipedia http://en.wikipedia.org/wiki/Blowfish_%28cipher%29 ; http://en.wikipedia.org/wiki/El_Gamal
http://www.mrp3com/encrypt.html
QUESTION 7
A confidential number used as an authentication factor to verify a user's identity is called a:
A. PIN
B. User ID
C. Password
D. Challenge
Correct Answer: A
Explanation
Explanation/Reference:
PIN Stands for Personal Identification Number, as the name states it is a combination of numbers.
Password. This is incorrect because a password is not required to be a number, it could be any
combination of characters.
Challenge. This is incorrect because a challenge is not defined as a number, it could be anything.
QUESTION 8
Individual accountability does not include which of the following?
A. unique identifiers
B. policies & procedures
C. access rules
D. audit trails
Correct Answer: B
Explanation
Explanation/Reference:
Accountability would not include policies & procedures because while important on an effective security
program they cannot be used in determing accountability.
Unique identifiers. Is incorrect because Accountability would include unique identifiers so that you can
identify the individual.
Access rules. Is incorrect because Accountability would include access rules to define access violations.
Audit trails. Is incorrect because Accountability would include audit trails to be able to trace violations or
attempted violations.
QUESTION 9
Which of the following exemplifies proper separation of duties?
Correct Answer: A
Explanation
Explanation/Reference:
This is an example of Separation of Duties because operators are prevented from modifying the system
time which could lead to fraud. Tasks of this nature should be performed by they system administrators.
AIO defines Separation of Duties as a security principle that splits up a critical task among two or more
individuals to ensure that one person cannot complete a risky task by himself.
Programmers are permitted to use the system console. Is incorrect because programmers should not be
permitted to use the system console, this task should be performed by operators. Allowing programmers
access to the system console could allow fraud to occur so this is not an example of Separation of Duties..
Console operators are permitted to mount tapes and disks. Is incorrect because operators should be able
to mount tapes and disks so this is not an example of Separation of Duties.
Tape operators are permitted to use the system console. Is incorrect because operators should be able to
use the system console so this is not an example of Separation of Duties.
References:
OIG CBK Access Control (page 98 - 101)
AIOv3 Access Control (page 182)
QUESTION 10
An access control policy for a bank teller is an example of the implementation of which of the following?
A. Rule-based policy
B. Identity-based policy
C. User-based policy
D. Role-based policy
Correct Answer: D
Explanation
Explanation/Reference:
The position of a bank teller is a specific role within the bank, so you would implement a role- based policy.
Rule-based policy. Is incorrect because this is based on rules and not the role of a of a bank teller so this
would not be applicable for a specific role within an organization.
Identity-based policy. Is incorrect because this is based on the identity of an individual and not the role of a
bank teller so this would not be applicable for a specific role within an organization. User-based policy. Is
incorrect because this would be based on the user and not the role of a bank teller so this would not be not
be applicable for a specific role within an organization.
QUESTION 11
Which one of the following authentication mechanisms creates a problem for mobile users?
Correct Answer: A
Explanation
Explanation/Reference:
Anything based on a fixed IP address would be a problem for mobile users because their location and its
associated IP address can change from one time to the next. Many providers will assign a new IP every
time the device would be restarted. For example an insurance adjuster using a laptop to file claims online.
He goes to a different client each time and the address changes every time he connects to the ISP.
The term MOBILE in this case is synonymous with Road Warriors where a user is constantly traveling and
changing location. With smartphone today that may not be an issue but it would be an issue for laptops or
WIFI tablets. Within a carrier network the IP will tend to be the same and would change rarely. So this
question is more applicable to devices that are not cellular devices but in some cases this issue could
affect cellular devices as well.
QUESTION 12
Organizations should consider which of the following first before allowing external access to their LANs via
the Internet?
Correct Answer: D
Explanation
Explanation/Reference:
Before a LAN is connected to the Internet, you need to determine what the access controls mechanisms
are to be used, this would include how you are going to authenticate individuals that may access your
network externally through access control.
Plan for implementing workstation locking mechanisms. This is incorrect because locking the workstations
have no impact on the LAN or Internet access.
Plan for protecting the modem pool. This is incorrect because protecting the modem pool has no impact on
the LAN or Internet access, it just protects the modem.
Plan for providing the user with his account usage information. This is incorrect because the question asks
what should be done first. While important your primary concern should be focused on security.
QUESTION 13
Kerberos can prevent which one of the following attacks?
A. Tunneling attack.
B. Playback (replay) attack.
C. Destructive attack.
D. Process attack.
Correct Answer: B
Explanation
Explanation/Reference:
Each ticket in Kerberos has a timestamp and are subject to time expiration to help prevent these types of
attacks.
Tunneling attack. This is incorrect because a tunneling attack is an attempt to bypass security and access
low-level systems. Kerberos cannot totally prevent these types of attacks. Destructive attack. This is
incorrect because depending on the type of destructive attack, Kerberos cannot prevent someone from
physically destroying a server.
Process attack. This is incorrect because with Kerberos cannot prevent an authorized individuals from
running processes
QUESTION 14
In discretionary access environments, which of the following entities is authorized to grant information
access to other people?
A. Manager
B. Group Leader
C. Security Manager
D. Data Owner
Correct Answer: D
Explanation
Explanation/Reference:
In Discretionary Access Control (DAC) environments, the user who creates a file is also considered the
owner and has full control over the file including the ability to set permissions for that file.
Manager is incorrect because in Discretionary Access Control (DAC) environments it is the owner/user that
is authorized to grant information access to other people group leader. Is incorrect because in
Discretionary Access Control (DAC) environments it is the owner/user that is authorized to grant
information access to other people security manager. Is incorrect because in Discretionary Access Control
(DAC) environments it is the owner/user that is authorized to grant information access to other people.
IMPORTANT NOTE:
The term Data Owner is also used within Classifications as well. Under the subject of classification the
Data Owner is a person from management who has been entrusted with a data set that belongs to the
company. For example it could be the Chief Financial Officer (CFO) who is entrusted with all of the
financial data for a company. As such the CFO would determine the classification of the financial data and
who can access as well. The Data Owner would then tell the Data Custodian (a technical person) what the
classification and need to know is on the specific set of data.
The term Data Owner under DAC simply means whoever created the file and as the creator of the file the
owner has full access and can grant access to other subjects based on their identity.
QUESTION 15
What is the main concern with single sign-on?
Correct Answer: A
Explanation
Explanation/Reference:
A major concern with Single Sign-On (SSO) is that if a user's ID and password are compromised, the
intruder would have access to all the systems that the user was authorized for.
The security administrator's workload would increase. Is incorrect because the security administrator's
workload would decrease and not increase. The admin would not be responsible for maintaining multiple
user accounts just the one.
The users' password would be too hard to remember. Is incorrect because the users would have less
passwords to remember.
User access rights would be increased. Is incorrect because the user access rights would not be any
different than if they had to log into systems manually.
QUESTION 16
Who developed one of the first mathematical models of a multilevel-security computer system?
Correct Answer: C
Explanation
Explanation/Reference:
In 1973 Bell and LaPadula created the first mathematical model of a multi-level security system.
A. Data diddling
B. Sniffing
C. IP Spoofing
D. Smurfing
Correct Answer: B
Explanation
Explanation/Reference:
A network sniffer captures a copy every packet that traverses the network segment the sniffer is connect
to.
Sniffers are typically devices that can collect information from a communication medium, such as a
network. These devices can range from specialized equipment to basic workstations with customized
software.
A sniffer can collect information about most, if not all, attributes of the communication. The most common
method of sniffing is to plug a sniffer into an existing network device like a hub or switch. A hub (which is
designed to relay all traffic passing through it to all of its ports) will automatically begin sending all the
traffic on that network segment to the sniffing device. On the other hand, a switch (which is designed to
limit what traffic gets sent to which port) will have to be specially configured to send all traffic to the port
where the sniffer is plugged in.
Another method for sniffing is to use a network tap--a device that literally splits a network transmission into
two identical streams; one going to the original network destination and the other going to the sniffing
device. Each of these methods has its advantages and disadvantages, including cost, feasibility, and the
desire to maintain the secrecy of the sniffing activity.
The packets captured by sniffer are decoded and then displayed by the sniffer. Therfore, if the username/
password are contained in a packet or packets traversing the segment the sniffer is connected to, it will
capture and display that information (and any other information on that segment it can see).
Of course, if the information is encrypted via a VPN, SSL, TLS, or similar technology, the information is still
captured and displayed, but it is in an unreadable format.
The following answers are incorrect:
Data diddling involves changing data before, as it is enterred into a computer, or after it is extracted.
Spoofing is forging an address and inserting it into a packet to disguise the origin of the communication - or
causing a system to respond to the wrong address. Smurfing would refer to the smurf attack, where an
attacker sends spoofed packets to the broadcast address on a gateway in order to cause a denial of
service. The following reference(s) were/was used to create this question:
QUESTION 18
Which of the following would constitute the best example of a password to use for access to a system by a
network administrator?
A. holiday
B. Christmas12
C. Jenny
D. GyN19Za!
Correct Answer: D
Explanation
Explanation/Reference:
GyN19Za! would be the best answer because it contains a mixture of upper and lower case characters,
alphabetic and numeric characters, and a special character making it less vulnerable to password attacks.
All of the other answers are incorrect because they are vulnerable to brute force or dictionary attacks.
Passwords should not be common words or names. The addition of a number to the end of a common
word only marginally strengthens it because a common password attack would also check combinations of
words:
Christmas23
Christmas123 etc...
QUESTION 19
What physical characteristic does a retinal scan biometric device measure?
Correct Answer: D
Explanation
Explanation/Reference:
The retina, a thin nerve (1/50th of an inch) on the back of the eye, is the part of the eye which senses light
and transmits impulses through the optic nerve to the brain - the equivalent of film in a camera. Blood
vessels used for biometric identification are located along the neural retina, the outermost of retina's four
cell layers.
QUESTION 20
The Computer Security Policy Model the Orange Book is based on is which of the following?
A. Bell-LaPadula
B. Data Encryption Standard
C. Kerberos
D. Tempest
Correct Answer: A
Explanation
Explanation/Reference:
The Computer Security Policy Model Orange Book is based is the Bell-LaPadula Model. Orange Book
Glossary.
The Data Encryption Standard (DES) is a cryptographic algorithm. National Information Security Glossary.
TEMPEST is related to limiting the electromagnetic emanations from electronic equipment. Reference:
U.S. Department of Defense, Trusted Computer System Evaluation Criteria (Orange Book), DOD 520028-
STD. December 1985 (also available here).
QUESTION 21
The end result of implementing the principle of least privilege means which of the following?
A. Users would get access to only the info for which they have a need to know
B. Users can access all systems.
C. Users get new privileges added when they change positions.
D. Authorization creep.
Correct Answer: A
Explanation
Explanation/Reference:
The principle of least privilege refers to allowing users to have only the access they need and not anything
more. Thus, certain users may have no need to access any of the files on specific systems.
Users can access all systems. Although the principle of least privilege limits what access and systems
users have authorization to, not all users would have a need to know to access all of the systems. The best
answer is still Users would get access to only the info for which they have a need to know as some of the
users may not have a need to access a system.
Users get new privileges when they change positions. Although true that a user may indeed require new
privileges, this is not a given fact and in actuality a user may require less privileges for a new position. The
principle of least privilege would require that the rights required for the position be closely evaluated and
where possible rights revoked.
Authorization creep. Authorization creep occurs when users are given additional rights with new positions
and responsibilities. The principle of least privilege should actually prevent authorization creep.
QUESTION 22
Which of the following is the most reliable authentication method for remote access?
Correct Answer: B
Explanation
Explanation/Reference:
A Synchronous token generates a one-time password that is only valid for a short period of time. Once the
password is used it is no longer valid, and it expires if not entered in the acceptable time frame.
Fixed callback system. Authentication provides assurance that someone or something is who or what he/it
is supposed to be. Callback systems authenticate a person, but anyone can pretend to be that person.
They are tied to a specific place and phone number, which can be spoofed by implementing call-
forwarding.
Combination of callback and Caller ID. The caller ID and callback functionality provides greater confidence
and auditability of the caller's identity. By disconnecting and calling back only authorized phone numbers,
the system has a greater confidence in the location of the call. However, unless combined with strong
authentication, any individual at the location could obtain access.
QUESTION 23
Which of the following is true of two-factor authentication?
A. It uses the RSA public-key signature based on integers with large prime factors.
B. It requires two measurements of hand geometry.
C. It does not use single sign-on technology.
D. It relies on two independent proofs of identity.
Correct Answer: D
Explanation
Explanation/Reference:
It relies on two independent proofs of identity. Two-factor authentication refers to using two independent
proofs of identity, such as something the user has (e.g. a token card) and something the user knows (a
password). Two-factor authentication may be used with single sign-on. The following answers are
incorrect: It requires two measurements of hand geometry. Measuring hand geometry twice does not yield
two independent proofs.
It uses the RSA public-key signature based on integers with large prime factors. RSA encryption uses
integers with exactly two prime factors, but the term "two-factor authentication" is not used in that context.
QUESTION 24
The primary service provided by Kerberos is which of the following?
A. non-repudiation
B. confidentiality
C. authentication
D. authorization
Correct Answer: C
Explanation
Explanation/Reference:
non-repudiation. Since Kerberos deals primarily with symmetric cryptography, it does not help with non-
repudiation.
confidentiality. Once the client is authenticated by Kerberos and obtains its session key and ticket, it may
use them to assure confidentiality of its communication with a server; however, that is not a Kerberos
service as such.
authorization. Although Kerberos tickets may include some authorization information, the meaning of the
authorization fields is not standardized in the Kerberos specifications, and authorization is not a primary
Kerberos service.
QUESTION 25
There are parallels between the trust models in Kerberos and Public Key Infrastructure (PKI). When we
compare them side by side, Kerberos tickets correspond most closely to which of the following?
A. public keys
B. private keys
C. public-key certificates
D. private-key certificates
Correct Answer: C
Explanation
Explanation/Reference:
A Kerberos ticket is issued by a trusted third party. It is an encrypted data structure that includes the
service encryption key. In that sense it is similar to a public-key certificate. However, the ticket is not the
key.
public keys. Kerberos tickets are not shared out publicly, so they are not like a PKI public key.
private keys. Although a Kerberos ticket is not shared publicly, it is not a private key. Private keys are
associated with Asymmetric crypto system which is not used by Kerberos. Kerberos uses only the
Symmetric crypto system.
private key certificates. This is a detractor. There is no such thing as a private key certificate.
QUESTION 26
In which of the following security models is the subject's clearance compared to the object's classification
such that specific rules can be applied to control how the subject-to-object interactions take place?
A. Bell-LaPadula model
B. Biba model
C. Access Matrix model
D. Take-Grant model
Correct Answer: A
Explanation
Explanation/Reference:
Details:
The Answer: Bell-LaPadula model
The Bell-LAPadula model is also called a multilevel security system because users with different
clearances use the system and the system processes data with different classifications.
Developed by the US Military in the 1970s.
A security model maps the abstract goals of the policy to information system terms by specifying explicit
data structures and techniques necessary to enforce the security policy. A security model is usually
represented in mathematics and analytical ideas, which are mapped to system specifications and then
developed by programmers through programming code. So we have a policy that encompasses security
goals, such as "each subject must be authenticated and authorized before accessing an object." The
security model takes this requirement and provides the necessary mathematical formulas, relationships,
and logic structure to be followed to accomplish this goal.
A system that employs the Bell-LaPadula model is called a multilevel security system because users with
different clearances use the system, and the system processes data at different classification levels. The
level at which information is classified determines the handling procedures that should be used. The Bell-
LaPadula model is a state machine model that enforces the confidentiality aspects of access control. A
matrix and security levels are used to determine if subjects can access different objects. The subject's
clearance is compared to the object's classification and then specific rules are applied to control how
subject-to-object subject-to- object interactions can take place.
Reference(s) used for this question:
Harris, Shon (2012-10-25). CISSP All-in-One Exam Guide, 6th Edition (p. 369). McGraw-Hill.
Kindle Edition.
QUESTION 27
Which of the following was developed to address some of the weaknesses in Kerberos and uses public
key cryptography for the distribution of secret keys and provides additional access control support?
A. SESAME
B. RADIUS
C. KryptoKnight
D. TACACS+
Correct Answer: A
Explanation
Explanation/Reference:
Secure European System for Applications in a Multi-vendor Environment (SESAME) was developed to
address some of the weaknesses in Kerberos and uses public key cryptography for the distribution of
secret keys and provides additional access control support.
Reference:
TIPTON, Harold, Official (ISC)2 Guide to the CISSP CBK (2007), page 184
QUESTION 28
Single Sign-on (SSO) is characterized by which of the following advantages?
A. Convenience
B. Convenience and centralized administration
C. Convenience and centralized data administration
D. Convenience and centralized network administration
Correct Answer: B
Explanation
Explanation/Reference:
Convenience -Using single sign-on users have to type their passwords only once when they first log in to
access all the network resources; and Centralized Administration as some single sign-on systems are built
around a unified server administration system. This allows a single administrator to add and delete
accounts across the entire network from one user interface.
Centralized Data or Network Administration - these are thrown in to mislead the student. Neither are a
benefit to SSO, as these specifically should not be allowed with just an SSO.
References: TIPTON, Harold F. & KRAUSE, MICKI, Information Security Management Handbook, 4th
Edition, Volume 1, page 35
TIPTON, Harold F. & HENRY, Kevin, Official (ISC)2 Guide to the CISSP CBK, 2007, page 180
QUESTION 29
What is the primary role of smartcards in a PKI?
Correct Answer: D
Explanation
Explanation/Reference:
Reference: HARRIS, Shon, All-In-One CISSP Certification Exam Guide, 2001, McGraw- Hill/Osborne,
page 139;
Tamper-resistant microprocessors are used to store and process private or sensitive information, such as
private keys or electronic money credit. To prevent an attacker from retrieving or modifying the information,
the chips are designed so that the information is not accessible through external means and can be
accessed only by the embedded software, which should contain the appropriate security measures.
Examples of tamper-resistant chips include all secure cryptoprocessors, such as the IBM 4758 and chips
used in smartcards, as well as the Clipper chip.
It has been argued that it is very difficult to make simple electronic devices secure against tampering,
because numerous attacks are possible, including:
· physical attack of various forms (microprobing, drills, files, solvents, etc.) · freezing the device
· applying out-of-spec voltages or power surges
· applying unusual clock signals
· inducing software errors using radiation
· measuring the precise time and power requirements of certain operations (see power analysis)
Tamper-resistant chips may be designed to zeroise their sensitive data (especially cryptographic keys) if
they detect penetration of their security encapsulation or out-of-specification environmental parameters. A
chip may even be rated for "cold zeroisation", the ability to zeroise itself even after its power supply has
been crippled.
Nevertheless, the fact that an attacker may have the device in his possession for as long as he likes, and
perhaps obtain numerous other samples for testing and practice, means that it is practically impossible to
totally eliminate tampering by a sufficiently motivated opponent. Because of this, one of the most important
elements in protecting a system is overall system design. In particular, tamper-resistant systems should
"fail gracefully" by ensuring that compromise of one device does not compromise the entire system. In this
manner, the attacker can be practically restricted to attacks that cost less than the expected return from
compromising a single device (plus, perhaps, a little more for kudos). Since the most sophisticated attacks
have been estimated to cost several hundred thousand dollars to carry out, carefully designed systems
may be invulnerable in practice.
QUESTION 30
What kind of certificate is used to validate a user identity?
Correct Answer: A
Explanation
Explanation/Reference:
In cryptography, a public key certificate (or identity certificate) is an electronic document which
incorporates a digital signature to bind together a public key with an identity -- information such as the
name of a person or an organization, their address, and so forth. The certificate can be used to verify that
a public key belongs to an individual.
In a typical public key infrastructure (PKI) scheme, the signature will be of a certificate authority (CA). In a
web of trust scheme, the signature is of either the user (a self-signed certificate) or other users
("endorsements"). In either case, the signatures on a certificate are attestations by the certificate signer
that the identity information and the public key belong together.
Some people constantly confuse PKCs and ACs. An analogy may make the distinction clear. A PKC can
be considered to be like a passport: it identifies the holder, tends to last for a long time, and should not be
trivial to obtain. An AC is more like an entry visa: it is typically issued by a different authority and does not
last for as long a time. As acquiring an entry visa typically requires presenting a passport, getting a visa
can be a simpler process.
A real life example of this can be found in the mobile software deployments by large service providers and
are typically applied to platforms such as Microsoft Smartphone (and related), Symbian OS, J2ME, and
others.
In each of these systems a mobile communications service provider may customize the mobile terminal
client distribution (ie. the mobile phone operating system or application environment) to include one or
more root certificates each associated with a set of capabilities or permissions such as "update firmware",
"access address book", "use radio interface", and the most basic one, "install and execute". When a
developer wishes to enable distribution and execution in one of these controlled environments they must
acquire a certificate from an appropriate CA, typically a large commercial CA, and in the process they
usually have their identity verified using out-of- band mechanisms such as a combination of phone call,
validation of their legal entity through government and commercial databases, etc., similar to the high
assurance SSL certificate vetting process, though often there are additional specific requirements imposed
on would-be developers/publishers.
Once the identity has been validated they are issued an identity certificate they can use to sign their
software; generally the software signed by the developer or publisher's identity certificate is not distributed
but rather it is submitted to processor to possibly test or profile the content before generating an
authorization certificate which is unique to the particular software release. That certificate is then used with
an ephemeral asymmetric key-pair to sign the software as the last step of preparation for distribution.
There are many advantages to separating the identity and authorization certificates especially relating to
risk mitigation of new content being accepted into the system and key management as well as recovery
from errant software which can be used as attack vectors.
HARRIS, Shon, All-In-One CISSP Certification Exam Guide, 2001, McGraw-Hill/Osborne, page 540
http://en.wikipedia.org/wiki/Attribute_certificate
http://en.wikipedia.org/wiki/Public_key_certificate
QUESTION 31
The following is NOT a security characteristic we need to consider while choosing a biometric identification
systems:
Correct Answer: B
Explanation
Explanation/Reference:
Cost is a factor when considering Biometrics but it is not a security characteristic. All the other answers are
incorrect because they are security characteristics related to Biometrics.
Data acquisition process can cause a security concern because if the process is not fast and efficient it
can discourage individuals from using the process.
Enrollment process can cause a security concern because the enrollment process has to be quick and
efficient. This process captures data for authentication.
Speed and user interface can cause a security concern because this also impacts the users acceptance
rate of biometrics. If they are not comfortable with the interface and speed they might sabotage the devices
or otherwise attempt to circumvent them.
References:
From: TIPTON, Harold F. & KRAUSE, MICKI, Information Security Management Handbook, 4th Edition,
Volume 1, Pages 5-6
** in process of correction **
QUESTION 32
In biometric identification systems, at the beginning, it was soon apparent that truly positive identification
could only be based on physical attributes of a person. This raised the necessity of answering 2 questions
:
Correct Answer: B
Explanation
Explanation/Reference:
Today implementation of fast, accurate reliable and user-acceptable biometric identification systems is
already taking place. Unique physical attributes or behavior of a person are used for that purpose.
From: TIPTON, Harold F. & KRAUSE, MICKI, Information Security Management Handbook, 4th Edition,
Volume 1, Page 7
QUESTION 33
In biometric identification systems, the parts of the body conveniently available for identification are:
Correct Answer: B
Explanation
Explanation/Reference:
Today implementation of fast, accurate, reliable, and user-acceptable biometric identification systems are
already under way. Because most identity authentication takes place when a people are fully clothed (neck
to feet and wrists), the parts of the body conveniently available for this purpose are hands, face, and eyes.
From: TIPTON, Harold F. & KRAUSE, MICKI, Information Security Management Handbook, 4th Edition,
Volume 1, Page 7
QUESTION 34
Controlling access to information systems and associated networks is necessary for the preservation of
their:
Correct Answer: B
Explanation
Explanation/Reference:
Controlling access to information systems and associated networks is necessary for the preservation of
their confidentiality, integrity and availability.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 31
QUESTION 35
To control access by a subject (an active entity such as individual or process) to an object (a passive entity
such as a file) involves setting up:
A. Access Rules
B. Access Matrix
C. Identification controls
D. Access terminal
Correct Answer: A
Explanation
Explanation/Reference:
Controlling access by a subject (an active entity such as individual or process) to an object (a passive
entity such as a file) involves setting up access rules.
These rules can be classified into three access control models: Mandatory, Discretionary, and Non-
Discretionary.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 33
Answer:
QUESTION 36
Rule-Based Access Control (RuBAC) access is determined by rules. Such rules would fit within what
category of access control?
Correct Answer: C
Explanation
Explanation/Reference:
Rule-based access control is a type of non-discretionary access control because this access is determined
by rules and the subject does not decide what those rules will be, the rules are uniformly applied to ALL of
the users or subjects.
In general, all access control policies other than DAC are grouped in the category of non- discretionary
access control (NDAC). As the name implies, policies in this category have rules that are not established at
the discretion of the user. Non-discretionary policies establish controls that cannot be changed by users,
but only through administrative action.
Both Role Based Access Control (RBAC) and Rule Based Access Control (RuBAC) fall within Non
Discretionary Access Control (NDAC). If it is not DAC or MAC then it is most likely NDAC.
IT IS NOT ALWAYS BLACK OR WHITE
The different access control models are not totally exclusive of each others. MAC is making use of Rules to
be implemented. However with MAC you have requirements above and beyond having simple access
rules. The subject would get formal approval from management, the subject must have the proper security
clearance, objects must have labels/sensitivity levels attached to them, subjects must have the proper
security clearance. If all of this is in place then you have MAC.
Under a mandatory access control environment, the system or security administrator will define what
permissions subjects have on objects. The administrator does not dictate user's access but simply
configure the proper level of access as dictated by the Data Owner.
The MAC system will look at the Security Clearance of the subject and compare it with the object
sensitivity level or classification level. This is what is called the dominance relationship.
The subject must DOMINATE the object sensitivity level. Which means that the subject must have a
security clearance equal or higher than the object he is attempting to access.
MAC also introduce the concept of labels. Every objects will have a label attached to them indicating the
classification of the object as well as categories that are used to impose the need to know (NTK) principle.
Even thou a user has a security clearance of Secret it does not mean he would be able to access any
Secret documents within the system. He would be allowed to access only Secret document for which he
has a Need To Know, formal approval, and object where the user belong to one of the categories attached
to the object.
Many of the other models can mimic MAC but none of them have labels and a dominance relationship so
they are NOT in the MAC category.
NISTR-7316 Says:
Usually a labeling mechanism and a set of interfaces are used to determine access based on the MAC
policy; for example, a user who is running a process at the Secret classification should not be allowed to
read a file with a label of Top Secret. This is known as the "simple security rule," or "no read up."
Conversely, a user who is running a process with a label of Secret should not be allowed to write to a file
with a label of Confidential. This rule is called the "*-property" (pronounced "star property") or "no write
down." The *-property is required to maintain system security in an automated environment. A variation on
this rule called the "strict *-property" requires that information can be written at, but not above, the subject's
clearance level. Multilevel security models such as the Bell-La Padula Confidentiality and Biba Integrity
models are used to formally specify this kind of MAC policy.
The owner of an object is define as the person who created the object. As such the owner has the
discretion to grant access to other users on the network. Access will be granted based solely on the
identity of those users.
Such system is good for low level of security. One of the major problem is the fact that a user who has
access to someone's else file can further share the file with other users without the knowledge or
permission of the owner of the file. Very quickly this could become the wild west as there is no control on
the dissemination of the information.
For example there might be 5 security administrator within your company. Instead of creating each of their
profile one by one, you would simply create a role and assign the administrators to the role. Once an
administrator has been assigned to a role, he will IMPLICITLY inherit the permissions of that role.
RBAC is great tool for environment where there is a a large rotation of employees on a daily basis such as
a very large help desk for example.
Lot of people tend to confuse MAC and Rule Based Access Control.
Mandatory Access Control must make use of LABELS. If there is only rules and no label, it cannot be
Mandatory Access Control. This is why they call it Non Discretionary Access control (NDAC).
There are even books out there that are WRONG on this subject. Books are sometimes opiniated and not
strictly based on facts.
In MAC subjects must have clearance to access sensitive objects. Objects have labels that contain the
classification to indicate the sensitivity of the object and the label also has categories to enforce the need
to know.
Today the best example of rule based access control would be a firewall. All rules are imposed globally to
any user attempting to connect through the device. This is NOT the case with MAC.
NISTIR-7316 at http://csrc.nist.gov/publications/nistir/7316/NISTIR-7316pdf
It is one of the best Access Control Study document to prepare for the exam. Usually I tell people not to
worry about the hundreds of NIST documents and other reference. This document is an exception. Take
some time to read it.
Reference(s) used for this question:
KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer
Security, 2001, John Wiley & Sons, Page 33
And
NISTIR-7316 at http://csrc.nist.gov/publications/nistir/7316/NISTIR-7316pdf
And
Conrad, Eric; Misenar, Seth; Feldman, Joshua (2012-09-01). CISSP Study Guide (Kindle Locations 651-
652). Elsevier Science (reference). Kindle Edition.
QUESTION 37
The type of discretionary access control (DAC) that is based on an individual's identity is also called:
Correct Answer: A
Explanation
Explanation/Reference:
An identity-based access control is a type of Discretionary Access Control (DAC) that is based on an
individual's identity.
DAC is good for low level security environment. The owner of the file decides who has access to the file.
If a user creates a file, he is the owner of that file. An identifier for this user is placed in the file header and/
or in an access control matrix within the operating system.
Ownership might also be granted to a specific individual. For example, a manager for a certain department
might be made the owner of the files and resources within her department. A system that uses
discretionary access control (DAC) enables the owner of the resource to specify which subjects can
access specific resources.
This model is called discretionary because the control of access is based on the discretion of the owner.
Many times department managers, or business unit managers , are the owners of the data within their
specific department. Being the owner, they can specify who should have access and who should not.
Harris, Shon (2012-10-18). CISSP All-in-One Exam Guide, 6th Edition (p. 220). McGraw-Hill .
Kindle Edition.
QUESTION 38
Which access control type has a central authority that determine to what objects the subjects have access
to and it is based on role or on the organizational security policy?
Correct Answer: C
Explanation
Explanation/Reference:
Non Discretionary Access Control include Role Based Access Control (RBAC) and Rule Based Access
Control (RBAC or RuBAC). RABC being a subset of NDAC, it was easy to eliminate RBAC as it was
covered under NDAC already.
Some people think that RBAC is synonymous with NDAC but RuBAC would also fall into this category.
Discretionary Access control is for environment with very low level of security. There is no control on the
dissemination of the information. A user who has access to a file can copy the file or further share it with
other users.
Rule Based Access Control is when you have ONE set of rules applied uniformly to all users. A good
example would be a firewall at the edge of your network. A single rule based is applied against any
packets received from the internet.
Mandatory Access Control is a very rigid type of access control. The subject must dominate the object and
the subject must have a Need To Know to access the information. Objects have labels that indicate the
sensitivity (classification) and there is also categories to enforce the Need To Know (NTK).
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 33
QUESTION 39
Which of the following control pairings include: organizational policies and procedures, pre- employment
background checks, strict hiring practices, employment agreements, employee termination procedures,
vacation scheduling, labeling of sensitive materials, increased supervision, security awareness training,
behavior awareness, and sign-up procedures to obtain access to information systems and networks?
A. Preventive/Administrative Pairing
B. Preventive/Technical Pairing
C. Preventive/Physical Pairing
D. Detective/Administrative Pairing
Correct Answer: A
Explanation
Explanation/Reference:
organizational policies and procedures, pre-employment background checks, strict hiring practices,
employment agreements, friendly and unfriendly employee termination procedures, vacation scheduling,
labeling of sensitive materials, increased supervision, security awareness training, behavior awareness,
and sign-up procedures to obtain access to information systems and networks.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 34
QUESTION 40
Technical controls such as encryption and access control can be built into the operating system, be
software applications, or can be supplemental hardware/software units. Such controls, also known as
logical controls, represent which pairing?
A. Preventive/Administrative Pairing
B. Preventive/Technical Pairing
C. Preventive/Physical Pairing
D. Detective/Technical Pairing
Correct Answer: B
Explanation
Explanation/Reference:
Preventive/Technical controls are also known as logical controls and can be built into the operating
system, be software applications, or can be supplemental hardware/software units. Source: KRUTZ,
Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security,
2001, John Wiley & Sons, Page 34
QUESTION 41
What is called the use of technologies such as fingerprint, retina, and iris scans to authenticate the
individuals requesting access to resources?
A. Micrometrics
B. Macrometrics
C. Biometrics
D. MicroBiometrics
Correct Answer: C
Explanation
Explanation/Reference:
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 35
QUESTION 42
What is called the access protection system that limits connections by calling back the number of a
previously authorized location?
A. Sendback systems
B. Callback forward systems
C. Callback systems
D. Sendback forward systems
Correct Answer: C
Explanation
Explanation/Reference:
The Answer: Call back Systems; Callback systems provide access protection by calling back the number
of a previously authorized location, but this control can be compromised by call forwarding.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 35
QUESTION 43
What are called user interfaces that limit the functions that can be selected by a user?
Correct Answer: A
Explanation
Explanation/Reference:
Another method for controlling access is by restricting users to specific functions based on their role in the
system. This is typically implemented by limiting available menus, data views, encryption, or by physically
constraining the user interfaces.
This is common on devices such as an automated teller machine (ATM). The advantage of a constrained
user interface is that it limits potential avenues of attack and system failure by restricting the processing
options that are available to the user.
On an ATM machine, if a user does not have a checking account with the bank he or she will not be shown
the "Withdraw money from checking" option. Likewise, an information system might have an "Add/Remove
Users" menu option for administrators, but if a normal, non- administrative user logs in he or she will not
even see that menu option. By not even identifying potential options for non-qualifying users, the system
limits the potentially harmful execution of unauthorized system or application commands.
Many database management systems have the concept of "views." A database view is an extract of the
data stored in the database that is filtered based on predefined user or system criteria. This permits
multiple users to access the same database while only having the ability to access data they need (or are
allowed to have) and not data for another user. The use of database views is another example of a
constrained user interface.
QUESTION 44
Controls such as job rotation, the sharing of responsibilities, and reviews of audit records are associated
with:
A. Preventive/physical
B. Detective/technical
C. Detective/physical
D. Detective/administrative
Correct Answer: D
Explanation
Explanation/Reference:
Additional detective/administrative controls are job rotation, the sharing of responsibilities, and reviews of
audit records.
Reference(s) used for this question:
KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer
Security, 2001, John Wiley & Sons, Page 35
QUESTION 45
The control measures that are intended to reveal the violations of security policy using software and
hardware are associated with:
A. Preventive/physical
B. Detective/technical
C. Detective/physical
D. Detective/administrative
Correct Answer: B
Explanation
Explanation/Reference:
The detective/technical control measures are intended to reveal the violations of security policy using
technical means.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 35
QUESTION 46
The controls that usually require a human to evaluate the input from sensors or cameras to determine if a
real threat exists are associated with:
A. Preventive/physical
B. Detective/technical
C. Detective/physical
D. Detective/administrative
Correct Answer: C
Explanation
Explanation/Reference:
Detective/physical controls usually require a human to evaluate the input from sensors or cameras to
determine if a real threat exists.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 36
QUESTION 47
External consistency ensures that the data stored in the database is:
Correct Answer: D
Explanation
Explanation/Reference:
External consistency ensures that the data stored in the database is consistent with the real world. Source:
KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer
Security, 2001, John Wiley & Sons, page 33
QUESTION 48
A central authority determines what subjects can have access to certain objects based on the
organizational security policy is called:
Correct Answer: C
Explanation
Explanation/Reference:
A central authority determines what subjects can have access to certain objects based on the
organizational security policy.
The key focal point of this question is the 'central authority' that determines access rights.
Cecilia one of the quiz user has sent me feedback informing me that NIST defines MAC as:
"MAC Policy means that Access Control Policy Decisions are made by a CENTRAL AUTHORITY. Which
seems to indicate there could be two good answers to this question.
However if you read the NISTR document mentioned in the references below, it is also mentioned that:
MAC is the most mentioned NDAC policy. So MAC is a form of NDAC policy.
Within the same document it is also mentioned: "In general, all access control policies other than DAC are
grouped in the category of non- discretionary access control (NDAC). As the name implies, policies in this
category have rules that are not established at the discretion of the user. Non-discretionary policies
establish controls that cannot be changed by users, but only through administrative action."
MAC is implemented using RULES which makes it fall under RBAC which is a form of NDAC.
It is a subset of NDAC.
This question is representative of what you can expect on the real exam where you have more than once
choice that seems to be right. However, you have to look closely if one of the choices would be higher level
or if one of the choice falls under one of the other choice. In this case NDAC is a better choice because
MAC is falling under NDAC through the use of Rule Based Access Control.
The need for a MAC mechanism arises when the security policy of a system dictates that:
1 Protection decisions must not be decided by the object owner. 2 The system must enforce the protection
decisions (i.e., the system enforces the security policy over the wishes or intentions of the object owner).
Usually a labeling mechanism and a set of interfaces are used to determine access based on the MAC
policy; for example, a user who is running a process at the Secret classification should not be allowed to
read a file with a label of Top Secret. This is known as the "simple security rule," or "no read up."
Conversely, a user who is running a process with a label of Secret should not be allowed to write to a file
with a label of Confidential. This rule is called the "*-property" (pronounced "star property") or "no write
down." The *-property is required to maintain system security in an automated environment.
DISCRETIONARY ACCESS CONTROL
In Discretionary Access Control the rights are determined by many different entities, each of the persons
who have created files and they are the owner of that file, not one central authority.
DAC leaves a certain amount of access control to the discretion of the object's owner or anyone else who
is authorized to control the object's access. For example, it is generally used to limit a user's access to a
file; it is the owner of the file who controls other users' accesses to the file. Only those users specified by
the owner may have some combination of read, write, execute, and other permissions to the file.
DAC policy tends to be very flexible and is widely used in the commercial and government sectors.
However, DAC is known to be inherently weak for two reasons:
First, granting read access is transitive; for example, when Ann grants Bob read access to a file, nothing
stops Bob from copying the contents of Ann's file to an object that Bob controls. Bob may now grant any
other user access to the copy of Ann's file without Ann's knowledge. Second, DAC policy is vulnerable to
Trojan horse attacks. Because programs inherit the identity of the invoking user, Bob may, for example,
write a program for Ann that, on the surface, performs some useful function, while at the same time
destroys the contents of Ann's files. When investigating the problem, the audit files would indicate that Ann
destroyed her own files.
Thus, formally, the drawbacks of DAC are as follows:
· Discretionary Access Control (DAC) Information can be copied from one object to another; therefore,
there is no real assurance on the flow of information in a system. · No restrictions apply to the usage of
information when the user has received it. · The privileges for accessing objects are decided by the owner
of the object, rather than through a system-wide policy that reflects the organization's security
requirements.
ACLs and owner/group/other access control mechanisms are by far the most common mechanism for
implementing DAC policies. Other mechanisms, even though not designed with DAC in mind, may have
the capabilities to implement a DAC policy.
In Rule-based Access Control a central authority could in fact determine what subjects can have access
when assigning the rules for access. However, the rules actually determine the access and so this is not
the most correct answer.
RuBAC (as opposed to RBAC, role-based access control) allow users to access systems and information
based on pre determined and configured rules. It is important to note that there is no commonly
understood definition or formally defined standard for rule-based access control as there is for DAC, MAC,
and RBAC. "Rule-based access" is a generic term applied to systems that allow some form of
organization-defined rules, and therefore rule-based access control encompasses a broad range of
systems. RuBAC may in fact be combined with other models, particularly RBAC or DAC. A RuBAC system
intercepts every access request and compares the rules with the rights of the user to make an access
decision. Most of the rule-based access control relies on a security label system, which dynamically
composes a set of rules defined by a security policy. Security labels are attached to all objects, including
files, directories, and devices. Sometime roles to subjects (based on their attributes) are assigned as well.
RuBAC meets the business needs as well as the technical needs of controlling service access. It allows
business rules to be applied to access control--for example, customers who have overdue balances may
be denied service access. As a mechanism for MAC, rules of RuBAC cannot be changed by users. The
rules can be established by any attributes of a system related to the users such as domain, host, protocol,
network, or IP addresses. For example, suppose that a user wants to access an object in another network
on the other side of a router. The router employs RuBAC with the rule composed by the network
addresses, domain, and protocol to decide whether or not the user can be granted access. If employees
change their roles within the organization, their existing authentication credentials remain in effect and do
not need to be re configured. Using rules in conjunction with roles adds greater flexibility because rules
can be applied to people as well as to devices. Rule-based access control can be combined with role-
based access control, such that the role of a user is one of the attributes in rule setting. Some provisions of
access control systems have rule- based policy engines in addition to a role-based policy engine and
certain implemented dynamic policies [Des03]. For example, suppose that two of the primary types of
software users are product engineers and quality engineers. Both groups usually have access to the same
data, but they have different roles to perform in relation to the data and the application's function. In
addition, individuals within each group have different job responsibilities that may be identified using
several types of attributes such as developing programs and testing areas. Thus, the access decisions can
be made in real time by a scripted policy that regulates the access between the groups of product
engineers and quality engineers, and each individual within these groups. Rules can either replace or
complement role-based access control. However, the creation of rules and security policies is also a
complex process, so each organization will need to strike the appropriate balance.
And
Also
KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer
Security, 2001, John Wiley & Sons, Page 33
QUESTION 49
What is called the act of a user professing an identity to a system, usually in the form of a log-on ID?
A. Authentication
B. Identification
C. Authorization
D. Confidentiality
Correct Answer: B
Explanation
Explanation/Reference:
Identification is the act of a user professing an identity to a system, usually in the form of a log- on ID to the
system.
Identification is nothing more than claiming you are somebody. You identify yourself when you speak to
someone on the phone that you don't know, and they ask you who they're speaking to. When you say, "I'm
Jason.", you've just identified yourself.
In the information security world, this is analogous to entering a username. It's not analogous to entering a
password. Entering a password is a method for verifying that you are who you identified yourself as.
NOTE: The word "professing" used above means: "to say that you are, do, or feel something when other
people doubt what you say". This is exactly what happen when you provide your identifier (identification),
you claim to be someone but the system cannot take your word for it, you must further Authenticate to the
system to prove who you claim to be.
Authentication: is how one proves that they are who they say they are. When you claim to be Jane Smith
by logging into a computer system as "jsmith", it's most likely going to ask you for a password. You've
claimed to be that person by entering the name into the username field (that's the identification part), but
now you have to prove that you are really that person.
Many systems use a password for this, which is based on "something you know", i.e. a secret between you
and the system.
Another form of authentication is presenting something you have, such as a driver's license, an RSA token,
or a smart card.
You can also authenticate via something you are. This is the foundation for biometrics. When you do this,
you first identify yourself and then submit a thumb print, a retina scan, or another form of bio-based
authentication.
Once you've successfully authenticated, you have now done two things: you've claimed to be someone,
and you've proven that you are that person. The only thing that's left is for the system to determine what
you're allowed to do.
Authorization: is what takes place after a person has been both identified and authenticated; it's the step
determines what a person can then do on the system.
An example in people terms would be someone knocking on your door at night. You say, "Who is it?", and
wait for a response. They say, "It's John." in order to identify themselves. You ask them to back up into the
light so you can see them through the peephole. They do so, and you authenticate them based on what
they look like (biometric). At that point you decide they can come inside the house.
If they had said they were someone you didn't want in your house (identification), and you then verified that
it was that person (authentication), the authorization phase would not include access to the inside of the
house.
Confidentiality: Is one part of the CIA triad. It prevents sensitive information from reaching the wrong
people, while making sure that the right people can in fact get it. A good example is a credit card number
while shopping online, the merchant needs it to clear the transaction but you do not want your information
exposed over the network, you would use a secure link such as SSL, TLS, or some tunneling tool to
protect the information from prying eyes between point A and point B. Data encryption is a common
method of ensuring confidentiality.
Integrity involves maintaining the consistency, accuracy, and trustworthiness of data over its entire life
cycle. Data must not be changed in transit, and steps must be taken to ensure that data cannot be altered
by unauthorized people (for example, in a breach of confidentiality). In addition, some means must be in
place to detect any changes in data that might occur as a result of non-human-caused events such as an
electromagnetic pulse (EMP) or server crash. If an unexpected change occurs, a backup copy must be
available to restore the affected data to its correct state.
Availability is best ensured by rigorously maintaining all hardware, performing hardware repairs
immediately when needed, providing a certain measure of redundancy and failover, providing adequate
communications bandwidth and preventing the occurrence of bottlenecks, implementing emergency
backup power systems, keeping current with all necessary system upgrades, and guarding against
malicious actions such as denial-of-service (DoS) attacks.
http://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-CIA
http://www.danielmiessler.com/blog/security-identification-authentication-and-authorization
http://www.merriam-webster.com/dictionary/profess
KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer
Security, 2001, John Wiley & Sons, Page 36
QUESTION 50
Which one of the following factors is NOT one on which Authentication is based?
Correct Answer: D
Explanation
Explanation/Reference:
Authentication is based on the following three factor types:
Type 1 Something you know, such as a PIN or password
Type 2 Something you have, such as an ATM card or smart card Type 3 Something you are (Unique
physical characteristic), such as a fingerprint or retina scan
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 36
Also: HARRIS, Shon, All-In-One CISSP Certification Exam Guide, McGraw-Hill/Osborne, 2002, chapter 4:
Access Control (pages 132-133).
QUESTION 51
A central authority determines what subjects can have access to certain objects based on the
organizational security policy is called:
Correct Answer: C
Explanation
Explanation/Reference:
A central authority determines what subjects can have access to certain objects based on the
organizational security policy.
The key focal point of this question is the 'central authority' that determines access rights.
Cecilia one of the quiz user has sent me feedback informing me that NIST defines MAC as:
"MAC Policy means that Access Control Policy Decisions are made by a CENTRAL AUTHORITY. Which
seems to indicate there could be two good answers to this question. However if you read the NISTR
document mentioned in the references below, it is also mentioned that: MAC is the most mentioned NDAC
policy. So MAC is a form of NDAC policy.
Within the same document it is also mentioned: "In general, all access control policies other than DAC are
grouped in the category of non- discretionary access control (NDAC). As the name implies, policies in this
category have rules that are not established at the discretion of the user. Non-discretionary policies
establish controls that cannot be changed by users, but only through administrative action."
MAC is implemented using RULES which makes it fall under RBAC which is a form of NDAC.
It is a subset of NDAC.
This question is representative of what you can expect on the real exam where you have more than once
choice that seems to be right. However, you have to look closely if one of the choices would be higher level
or if one of the choice falls under one of the other choice. In this case NDAC is a better choice because
MAC is falling under NDAC through the use of Rule Based Access Control.
In Mandatory Access Control the labels of the object and the clearance of the subject determines access
rights, not a central authority. Although a central authority (Better known as the Data Owner) assigns the
label to the object, the system does the determination of access rights automatically by comparing the
Object label with the Subject clearance. The subject clearance MUST dominate (be equal or higher) than
the object being accessed.
The need for a MAC mechanism arises when the security policy of a system dictates that:
1 Protection decisions must not be decided by the object owner. 2 The system must enforce the protection
decisions (i.e., the system enforces the security policy over the wishes or intentions of the object owner).
Usually a labeling mechanism and a set of interfaces are used to determine access based on the MAC
policy; for example, a user who is running a process at the Secret classification should not be allowed to
read a file with a label of Top Secret. This is known as the "simple security rule," or "no read up."
Conversely, a user who is running a process with a label of Secret should not be allowed to write to a file
with a label of Confidential. This rule is called the "*-property" (pronounced "star property") or "no write
down." The *-property is required to maintain system security in an automated environment.
DAC leaves a certain amount of access control to the discretion of the object's owner or anyone else who
is authorized to control the object's access. For example, it is generally used to limit a user's access to a
file; it is the owner of the file who controls other users' accesses to the file. Only those users specified by
the owner may have some combination of read, write, execute, and other permissions to the file.
DAC policy tends to be very flexible and is widely used in the commercial and government sectors.
However, DAC is known to be inherently weak for two reasons:
First, granting read access is transitive; for example, when Ann grants Bob read access to a file, nothing
stops Bob from copying the contents of Ann's file to an object that Bob controls. Bob may now grant any
other user access to the copy of Ann's file without Ann's knowledge.
Second, DAC policy is vulnerable to Trojan horse attacks. Because programs inherit the identity of the
invoking user, Bob may, for example, write a program for Ann that, on the surface, performs some useful
function, while at the same time destroys the contents of Ann's files. When investigating the problem, the
audit files would indicate that Ann destroyed her own files.
Thus, formally, the drawbacks of DAC are as follows:
Discretionary Access Control (DAC) Information can be copied from one object to another; therefore,
there is no real assurance on the flow of information in a system.
No restrictions apply to the usage of information when the user has received it.
The privileges for accessing objects are decided by the owner of the object, rather than through a
system-wide policy that reflects the organization's security requirements.
ACLs and owner/group/other access control mechanisms are by far the most common mechanism for
implementing DAC policies. Other mechanisms, even though not designed with DAC in mind, may have
the capabilities to implement a DAC policy.
RuBAC (as opposed to RBAC, role-based access control) allow users to access systems and information
based on pre determined and configured rules. It is important to note that there is no commonly
understood definition or formally defined standard for rule-based access control as there is for DAC, MAC,
and RBAC. "Rule-based access" is a generic term applied to systems that allow some form of
organization-defined rules, and therefore rule-based access control encompasses a broad range of
systems. RuBAC may in fact be combined with other models, particularly RBAC or DAC. A RuBAC system
intercepts every access request and compares the rules with the rights of the user to make an access
decision. Most of the rule-based access control relies on a security label system, which dynamically
composes a set of rules defined by a security policy. Security labels are attached to all objects, including
files, directories, and devices. Sometime roles to subjects (based on their attributes) are assigned as well.
RuBAC meets the business needs as well as the technical needs of controlling service access. It allows
business rules to be applied to access control--for example, customers who have overdue balances may
be denied service access. As a mechanism for MAC, rules of RuBAC cannot be changed by users. The
rules can be established by any attributes of a system related to the users such as domain, host, protocol,
network, or IP addresses. For example, suppose that a user wants to access an object in another network
on the other side of a router. The router employs RuBAC with the rule composed by the network
addresses, domain, and protocol to decide whether or not the user can be granted access. If employees
change their roles within the organization, their existing authentication credentials remain in effect and do
not need to be re configured. Using rules in conjunction with roles adds greater flexibility because rules
can be applied to people as well as to devices. Rule-based access control can be combined with role-
based access control, such that the role of a user is one of the attributes in rule setting. Some provisions of
access control systems have rule- based policy engines in addition to a role-based policy engine and
certain implemented dynamic policies [Des03]. For example, suppose that two of the primary types of
software users are product engineers and quality engineers. Both groups usually have access to the same
data, but they have different roles to perform in relation to the data and the application's function. In
addition, individuals within each group have different job responsibilities that may be identified using
several types of attributes such as developing programs and testing areas. Thus, the access decisions can
be made in real time by a scripted policy that regulates the access between the groups of product
engineers and quality engineers, and each individual within these groups. Rules can either replace or
complement role-based access control. However, the creation of rules and security policies is also a
complex process, so each organization will need to strike the appropriate balance.
And
Also
KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer
Security, 2001, John Wiley & Sons, Page 33
QUESTION 52
What is called the act of a user professing an identity to a system, usually in the form of a log-on ID?
A. Authentication
B. Identification
C. Authorization
D. Confidentiality
Correct Answer: B
Explanation
Explanation/Reference:
Identification is the act of a user professing an identity to a system, usually in the form of a log- on ID to the
system.
Identification is nothing more than claiming you are somebody. You identify yourself when you speak to
someone on the phone that you don't know, and they ask you who they're speaking to. When you say, "I'm
Jason.", you've just identified yourself.
In the information security world, this is analogous to entering a username. It's not analogous to entering a
password. Entering a password is a method for verifying that you are who you identified yourself as.
NOTE: The word "professing" used above means: "to say that you are, do, or feel something when other
people doubt what you say". This is exactly what happen when you provide your identifier (identification),
you claim to be someone but the system cannot take your word for it, you must further Authenticate to the
system to prove who you claim to be.
Many systems use a password for this, which is based on "something you know", i.e. a secret between you
and the system.
Another form of authentication is presenting something you have, such as a driver's license, an RSA token,
or a smart card.
You can also authenticate via something you are. This is the foundation for biometrics. When you do this,
you first identify yourself and then submit a thumb print, a retina scan, or another form of bio-based
authentication.
Once you've successfully authenticated, you have now done two things: you've claimed to be someone,
and you've proven that you are that person. The only thing that's left is for the system to determine what
you're allowed to do.
Authorization: is what takes place after a person has been both identified and authenticated; it's the step
determines what a person can then do on the system.
An example in people terms would be someone knocking on your door at night. You say, "Who is it?", and
wait for a response. They say, "It's John." in order to identify themselves. You ask them to back up into the
light so you can see them through the peephole. They do so, and you authenticate them based on what
they look like (biometric). At that point you decide they can come inside the house.
If they had said they were someone you didn't want in your house (identification), and you then verified that
it was that person (authentication), the authorization phase would not include access to the inside of the
house.
Confidentiality: Is one part of the CIA triad. It prevents sensitive information from reaching the wrong
people, while making sure that the right people can in fact get it. A good example is a credit card number
while shopping online, the merchant needs it to clear the transaction but you do not want your informaiton
exposed over the network, you would use a secure link such as SSL, TLS, or some tunneling tool to
protect the information from prying eyes between point A and point B. Data encryption is a common
method of ensuring confidentiality.
Availability is best ensured by rigorously maintaining all hardware, performing hardware repairs
immediately when needed, providing a certain measure of redundancy and failover, providing adequate
communications bandwidth and preventing the occurrence of bottlenecks, implementing emergency
backup power systems, keeping current with all necessary system upgrades, and guarding against
malicious actions such as denial-of-service (DoS) attacks.
http://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-CIA
http://www.danielmiessler.com/blog/security-identification-authentication-and-authorization
http://www.merriam-webster.com/dictionary/profess
KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer
Security, 2001, John Wiley & Sons, Page 36
QUESTION 53
What is called the verification that the user's claimed identity is valid and is usually implemented through a
user password at log-on time?
A. Authentication
B. Identification
C. Integrity
D. Confidentiality
Correct Answer: A
Explanation
Explanation/Reference:
Authentication is verification that the user's claimed identity is valid and is usually implemented through a
user password at log-on time.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 36
QUESTION 54
Which one of the following factors is NOT one on which Authentication is based?
Correct Answer: D
Explanation
Explanation/Reference:
Authentication is based on the following three factor types:
Type 1. Something you know, such as a PIN or password
Type 2. Something you have, such as an ATM card or smart card Type 3. Something you are (Unique
physical characteristic), such as a fingerprint or retina scan
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 36. Also: HARRIS, Shon, All-In-One CISSP
Certification Exam Guide, McGraw-Hill/Osborne, 2002, chapter 4: Access Control (pages 132-133).
QUESTION 55
The act of requiring two of the three factors to be used in the authentication process refers to:
A. Two-Factor Authentication
B. One-Factor Authentication
C. Bi-Factor Authentication
D. Double Authentication
Correct Answer: A
Explanation
Explanation/Reference:
Two-Factor Authentication refers to the act of requiring two of the three factors to be used in the
authentication process.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 36
QUESTION 56
Which type of password provides maximum security because a new password is required for each new
log-on?
Correct Answer: A
Explanation
Explanation/Reference:
"One-time password" provides maximum security because a new password is required for each new log-
on.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 36
QUESTION 57
What is called a password that is the same for each log-on session?
A. "one-time password"
B. "two-time password"
C. static password
D. dynamic password
Correct Answer: C
Explanation
Explanation/Reference:
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 36
QUESTION 58
What is called a sequence of characters that is usually longer than the allotted number for a password?
A. passphrase
B. cognitive phrase
C. anticipated phrase
D. Real phrase
Correct Answer: A
Explanation
Explanation/Reference:
A passphrase is a sequence of characters that is usually longer than the allotted number for a password.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, page 37
QUESTION 59
Which best describes a tool (i.e. keyfob, calculator, memory card or smart card) used to supply dynamic
passwords?
A. Tickets
B. Tokens
C. Token passing networks
D. Coupons
Correct Answer: B
Explanation
Explanation/Reference:
Tokens; Tokens in the form of credit card-size memory cards or smart cards, or those resembling small
calculators, are used to supply static and dynamic passwords.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 37
QUESTION 60
Which of the following would be true about Static password tokens?
Explanation/Reference:
Tokens are electronic devices or cards that supply a user's password for them. A token system can be
used to supply either a static or a dynamic password. There is a big difference between the static and
dynamic systems, a static system will normally log a user in but a dynamic system the user will often have
to log themselves in.
The owner identity is authenticated by the token. This is done by the person who issues the token to the
owner (normally the employer). The owner of the token is now authenticated by "something you have". The
token authenticates the identity of the owner to the information system. An example of this occurring is
when an employee swipes his or her smart card over an electronic lock to gain access to a store room.
The clock synching problem is eliminated with asynchronous dynamic password tokens. This system
works on the same principal as the synchronous one but it does not have a time frame. A lot of big
companies use this system especially for employee's who may work from home on the companies VPN
(Virtual private Network).
This is an interesting system. A user will be sent special "challenge" strings at either random or timed
intervals. The user inputs this challenge string into their token device and the device will respond by
generating a challenge response. The user then types this response into the system and if it is correct they
are authenticated.
http://www.informit.com/guides/content.aspx?g=security&seqNum=146
and
QUESTION 61
In Synchronous dynamic password tokens:
A. The token generates a new password value at fixed time intervals (this password could be based on
the time of day encrypted with a secret key).
B. The token generates a new non-unique password value at fixed time intervals (this password could be
based on the time of day encrypted with a secret key).
C. The unique password is not entered into a system or workstation along with an owner's PIN.
D. The authentication entity in a system or workstation knows an owner's secret key and PIN, and the
entity verifies that the entered password is invalid and that it was entered during the invalid time
window.
Correct Answer: B
Explanation
Explanation/Reference:
Synchronous dynamic password tokens:
The token generates a new password value at fixed time intervals (this password could be the time of day
encrypted with a secret key).
The unique password is entered into a system or workstation along with an owner's PIN. The
authentication entity in a system or workstation knows an owner's secret key and PIN, and the entity
verifies that the entered password is valid and that it was entered during the valid time window.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 37
QUESTION 62
In biometrics, "one-to-many" search against database of stored biometric images is done in:
A. Authentication
B. Identification
C. Identities
D. Identity-based access control
Correct Answer: B
Explanation
Explanation/Reference:
In biometrics, identification is a "one-to-many" search of an individual's characteristics from a database of
stored images.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 38
QUESTION 63
Which of the following is true of biometrics?
A. It is used for identification in physical controls and it is not used in logical controls.
B. It is used for authentication in physical controls and for identification in logical controls.
C. It is used for identification in physical controls and for authentication in logical controls.
D. Biometrics has not role in logical controls.
Correct Answer: C
Explanation
Explanation/Reference:
When used in physical control biometric Identification is performed by doing a one to many match. When
you submit your biometric template a search is done through a database of templates until the matching
one is found. At that point your identity is revealed and if you are a valid employee access is granted.
When used in logical controls the biometric template is used to either confirm or deny someone identity.
For example if I access a system and I pretend to be user Nathalie then I would provide my biometric
template to confirm that I really am who I pretend to be. Biometric is one of the three authentication factor
(somethin you are) that can be use. The other two are something you know and something you have.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 38
QUESTION 64
What is called the percentage of valid subjects that are falsely rejected by a Biometric Authentication
system?
Correct Answer: A
Explanation
Explanation/Reference:
The percentage of valid subjects that are falsely rejected is called the False Rejection Rate (FRR) or Type
I Error.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 38
QUESTION 65
What is called the percentage of invalid subjects that are falsely accepted by a Biometric authentication
system?
Correct Answer: B
Explanation
Explanation/Reference:
The percentage of invalid subjects that are falsely accepted is called the False Acceptance Rate (FAR) or
Type II Error.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 38 And: HARRIS, Shon, All-In-One CISSP
Certification Exam Guide, McGraw-Hill/Osborne, 2002, chapter 4: Access Control (pages 127-128).
QUESTION 66
What is called the percentage at which the False Rejection Rate equals the False Acceptance Rate?
Correct Answer: C
Explanation
Explanation/Reference:
The percentage at which the False Rejection Rate equals the False Acceptance Rate is called the
Crossover Error Rate (CER). Another name for the CER is the Equal Error Rate (EER), any of the two
terms could be used.
It is the rate at which both accept and reject errors are equal. The EER is a quick way to compare the
accuracy of devices with different ROC curves. In general, the device with the lowest EER is most
accurate.
KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer
Security, 2001, John Wiley & Sons, Page 38
And
https://en.wikipedia.org/wiki/Biometrics
QUESTION 67
Considerations of privacy, invasiveness, and psychological and physical comfort when using the system
are important elements for which of the following?
Correct Answer: B
Explanation
Explanation/Reference:
Acceptability refers to considerations of privacy, invasiveness, and psychological and physical comfort
when using the system.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 39
QUESTION 68
Which of the following offers advantages such as the ability to use stronger passwords, easier password
administration, one set of credential, and faster resource access?
A. Smart cards
B. Single Sign-On (SSO)
C. Symmetric Ciphers
D. Public Key Infrastructure (PKI)
Correct Answer: B
Explanation
Explanation/Reference:
The advantages of SSO include having the ability to use stronger passwords, easier administration as far
as changing or deleting the passwords, minimize the risks of orphan accounts, and requiring less time to
access resources. Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the
Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 39
QUESTION 69
Which of the following describes the major disadvantage of many Single Sign-On (SSO) implementations?
A. Once an individual obtains access to the system through the initial log-on, they have access to all
resources within the environment that the account has access to.
B. The initial logon process is cumbersome to discourage potential intruders.
C. Once a user obtains access to the system through the initial log-on, they only need to logon to some
applications.
D. Once a user obtains access to the system through the initial log-on, he has to logout from all other
systems
Correct Answer: A
Explanation
Explanation/Reference:
Single Sign-On is a distrubuted Access Control methodology where an individual only has to authenticate
once and would have access to all primary and secondary network domains. The individual would not be
required to re-authenticate when they needed additional resources. The security issue that this creates is if
a fraudster is able to compromise those credential they too would have access to all the resources that
account has access to. All the other answers are incorrect as they are distractors.
QUESTION 70
Which of the following is implemented through scripts or smart agents that replays the users multiple log-
ins against authentication servers to verify a user's identity which permit access to system services?
A. Single Sign-On
B. Dynamic Sign-On
C. Smart cards
D. Kerberos
Correct Answer: A
Explanation
Explanation/Reference:
SSO can be implemented by using scripts that replay the users multiple log-ins against authentication
servers to verify a user's identity and to permit access to system services. Single Sign on was the best
answer in this case because it would include Kerberos. When you have two good answers within the 4
choices presented you must select the BEST one. The high level choice is always the best. When one
choice would include the other one that would be the best as well.
QUESTION 71
Which of the following is NOT true of the Kerberos protocol?
Correct Answer: B
Explanation
Explanation/Reference:
Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/
server applications by using secret-key cryptography. It has the following characteristics:
Only a single login is required per session. Credentials defined at login are then passed between
resources without the need for additional logins.
The concept depends on a trusted third party a Key Distribution Center (KDC). The KDC is aware of
all systems in the network and is trusted by all of them.
It performs mutual authentication, where a client proves its identity to a server and a server proves its
identity to the client.
Kerberos introduces the concept of a Ticket-Granting Server/Service (TGS). A client that wishes to use a
service has to receive a ticket from the TGS a ticket is a time-limited cryptographic message giving it
access to the server. Kerberos also requires an Authentication Server (AS) to verify clients. The two
servers combined make up a KDC.
Within the Windows environment, Active Directory performs the functions of the KDC. The following figure
shows the sequence of events required for a client to gain access to a service using Kerberos
authentication. Each step is shown with the Kerberos message associated with it, as defined in RFC 4120
"The Kerberos Network Authorization Service (V5)".
Kerberos Authentication Step by Step
Step 1: The user logs on to the workstation and requests service on the host. The workstation sends a
message to the Authorization Server requesting a ticket granting ticket (TGT).
Step 2: The Authorization Server verifies the user's access rights in the user database and creates a
TGT and session key. The Authorization Sever encrypts the results using a key derived from the user's
password and sends a message back to the user workstation.
The workstation prompts the user for a password and uses the password to decrypt the incoming
message. When decryption succeeds, the user will be able to use the TGT to request a service ticket.
Step 3: When the user wants access to a service, the workstation client application sends a request to
the Ticket Granting Service containing the client name, realm name and a timestamp. The user proves
his identity by sending an authenticator encrypted with the session key received in Step 2
Step 4: The TGS decrypts the ticket and authenticator, verifies the request, and creates a ticket for the
requested server. The ticket contains the client name and optionally the client IP address. It also
contains the realm name and ticket lifespan. The TGS returns the ticket to the user workstation. The
returned message contains two copies of a server session key one encrypted with the client password,
and one encrypted by the service password.
Step 5: The client application now sends a service request to the server containing the ticket received
in Step 4 and an authenticator. The service authenticates the request by decrypting the session key.
The server verifies that the ticket and authenticator match, and then grants access to the service. This
step as described does not include the authorization performed by the Intel AMT device, as described
later.
Step 6: If mutual authentication is required, then the server will reply with a server authentication
message.
The Kerberos server knows "secrets" (encrypted passwords) for all clients and servers under its control, or
it is in contact with other secure servers that have this information. These "secrets" are used to encrypt all
of the messages shown in the figure above.
To prevent "replay attacks," Kerberos uses timestamps as part of its protocol definition. For timestamps to
work properly, the clocks of the client and the server need to be in synch as much as possible. In other
words, both computers need to be set to the same time and date. Since the clocks of two computers are
often out of synch, administrators can establish a policy to establish the maximum acceptable difference to
Kerberos between a client's clock and server's clock. If the difference between a client's clock and the
server's clock is less than the maximum time difference specified in this policy, any timestamp used in a
session between the two computers will be considered authentic. The maximum difference is usually set to
five minutes.
Note that if a client application wishes to use a service that is "Kerberized" (the service is configured to
perform Kerberos authentication), the client must also be Kerberized so that it expects to support the
necessary message responses.
For more information about Kerberos, see http://web.mit.edu/kerberos/www/.
References:
Introduction to Kerberos Authentication from Intel
and
http://www.zeroshell.net/eng/kerberos/Kerberos-definitions/#1353 and
http://www.ietf.org/rfc/rfc4120txt
QUESTION 72
The authenticator within Kerberos provides a requested service to the client after validating which of the
following?
A. timestamp
B. client public key
C. client private key
D. server public key
Correct Answer: A
Explanation
Explanation/Reference:
The server also checks the authenticator and, if that timestamp is valid, it provides the requested service to
the client.
Even if the user principal is present in a ticket and only the application server can extract and possibly
manage such information (since the ticket is encrypted with the secret key of the service), this is not
enough to guarantee the authenticity of the client.
An impostor could capture (remember the hypothesis of an open and insecure network) the ticket when it
is sent by a legitimate client to the application server, and at an opportune time, send it to illegitimately
obtain the service.
On the other hand, including the IP addresses of the machine from where it is possible to use it is not very
useful: it is known that in an open and insecure network addresses are easily falsified. To solve the
problem, one has to exploit the fact that the client and server, at least during a session have the session
key in common that only they know (also the KDC knows it since it generated it, but it is trusted by
definition!!!).
Thus the following strategy is applied: along with the request containing the ticket, the client adds another
packet (the authenticator) where the user principal and time stamp (its at that time) are included and
encrypts it with the session key; the server which must offer the service, upon receiving this request,
unpacks the first ticket, extracts the session key and, if the user is actually who he/she says, the server is
able to unencrypt the authenticator extracting the timestamp.
If the latter differs from the server time by less than 2 minutes (but the tolerance can be configured) then
the authentication is successful. This underlines the criticality of synchronization between machines
belonging to the same realm.
The Authenticator is created for the AS_REQ or the TGS_REQ and sends additional data, such as an
encrypted IP list, the client's timestamp and the ticket lifetime. If a packet is replayed, the timestamp is
checked. If the timestamp is earlier or the same as a previous authenticator, the packet is rejected
because it's a replay. In addition, the time stamp in the Authenticator is compared to the server time. It
must be within five minutes (by default in Windows).
Kerberos Authenticator to prevent replay attacks
If the time skew is greater than five minutes the packet is rejected. This limits the number of possible
replay attacks. While it is technically possible to steal the packet and present it to the server before the
valid packet gets there, it is very difficult to do.
It's fairly well known that all computers in a Windows domain must have system times within five minutes of
each other. This is due to the Kerberos requirement.
Correct Answer: A
Explanation
Explanation/Reference:
Kerberos addresses the confidentiality and integrity of information. It also addresses primarily
authentication but does not directly address availability.
QUESTION 74
Kerberos is vulnerable to replay in which of the following circumstances?
Correct Answer: C
Explanation
Explanation/Reference:
Replay can be accomplished on Kerberos if the compromised tickets are used within an allotted time
window.
The security depends on careful implementation:enforcing limited lifetimes for authentication credentials
minimizes the threat of of replayed credentials, the KDC must be physically secured, and it should be
hardened, not permitting any non-kerberos activities.
Reference:
Official ISC2 Guide to the CISSP, 2007 Edition, page 184 also see:
KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer
Security, 2001, John Wiley & Sons, Page 42
QUESTION 75
Like the Kerberos protocol, SESAME is also subject to which of the following?
A. timeslot replay
B. password guessing
C. symmetric key guessing
D. asymmetric key guessing
Correct Answer: B
Explanation
Explanation/Reference:
Sesame is an authentication and access control protocol, that also supports communication confidentiality
and integrity. It provides public key based authentication along with the Kerberos style authentication, that
uses symmetric key cryptography. Sesame supports the Kerberos protocol and adds some security
extensions like public key based authentication and an ECMA- style Privilege Attribute Service.
The users under SESAME can authenticate using either symmetric encryption as in Kerberos or Public
Key authentication. When using Symmetric Key authentication as in Kerberos, SESAME is also vulnerable
to password guessing just like Kerberos would be. The Symmetric key being used is based on the
password used by the user when he logged on the system. If the user has a simple password it could be
guessed or compromise. Even thou Kerberos or SESAME may be use, there is still a need to have strong
password discipline.
The user sends a request for authentication to the Authentication Server as in Kerberos, except that
SESAME is making use of public key cryptography for authentication where the client will present his
digital certificate and the request will be signed using a digital signature. The signature is communicated to
the authentication server through the preauthentication fields. Upon receipt of this request, the
authentication server will verifies the certificate, then validate the signature, and if all is fine the AS will
issue a ticket granting ticket (TGT) as in Kerberos. This TGT will be use to communicate with the privilage
attribute server (PAS) when access to a resource is needed.
Users may authenticate using either a public key pair or a conventional (symmetric) key. If public key
cryptography is used, public key data is transported in preauthentication data fields to help establish
identity.
Kerberos uses tickets for authenticating subjects to objects and SESAME uses Privileged Attribute
Certificates (PAC), which contain the subject's identity, access capabilities for the object, access time
period, and lifetime of the PAC. The PAC is digitally signed so that the object can validate that it came from
the trusted authentication server, which is referred to as the privilege attribute server (PAS). The PAS
holds a similar role as the KDC within Kerberos. After a user successfully authenticates to the
authentication service (AS), he is presented with a token to give to the PAS. The PAS then creates a PAC
for the user to present to the resource he is trying to access.
QUESTION 76
RADIUS incorporates which of the following services?
Correct Answer: D
Explanation
Explanation/Reference:
According to RFC 2865:
A Network Access Server (NAS) operates as a client of RADIUS. The client is responsible for passing user
information to
designated RADIUS servers, and then acting on the response which is returned.
RADIUS servers are responsible for receiving user connection requests, authenticating the user, and then
returning all
configuration information necessary for the client to deliver service to the user.
The term " RADIUS" is an acronym which stands for Remote Authentication Dial In User Service.
The main advantage to using a RADIUS approach to authentication is that it can provide a stronger form of
authentication. RADIUS is capable of using a strong, two-factor form of authentication, in which users need
to possess both a user ID and a hardware or software token to gain access.
Token-based schemes use dynamic passwords. Every minute or so, the token generates a unique 4-, 6- or
8-digit access number that is synchronized with the security server. To gain entry into the system, the user
must generate both this one-time number and provide his or her user ID and password.
Although protocols such as RADIUS cannot protect against theft of an authenticated session via some
realtime attacks, such as wiretapping, using unique, unpredictable authentication requests can protect
against a wide range of active attacks.
RADIUS: Key Features and Benefits
Features Benefits
Improved system security due to the fact that passwords are not static. It is much more difficult for a bogus
host to spoof users into giving up their passwords or password-generation algorithms.
RADIUS allows the user to have a single user ID and password for all computers in a network.
Improved usability due to the fact that the user has to remember only one login combination.
Provides very granular control over the types of logins allowed, on a per-user basis.
The time-out interval for failing over from an unresponsive primary RADIUS server to a backup RADIUS
server is site-configurable.
RADIUS gives System Administrator more flexibility in managing which users can login from which hosts or
devices.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Pages 43, 44
Also check: MILLER, Lawrence & GREGORY, Peter, CISSP for Dummies, 2002, Wiley Publishing, Inc.,
pages 45-46
QUESTION 77
Which of the following protects a password from eavesdroppers and supports the encryption of
communication?
Explanation/Reference:
CHAP: A protocol that uses a three way hanbdshake The server sends the client a challenge which
includes a random value(a nonce) to thwart replay attacks. The client responds with the MD5 hash of the
nonce and the password.
The authentication is successful if the client's response is the one that the server expected.
CHAP protects the password from eavesdroppers and supports the encryption of communication.
Reference: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 44
QUESTION 78
Which of the following represents the columns of the table in a relational database?
A. attributes
B. relation
C. record retention
D. records or tuples
Correct Answer: A
Explanation
Explanation/Reference:
The rows of the table represent records or tuples and the columns of the table represent the attributes.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 45
QUESTION 79
A database view is the results of which of the following operations?
Correct Answer: D
Explanation
Explanation/Reference:
1 The formal description of how a relational database operates.
2 The mathematics which underpin SQL operations.
A number of operations can be performed in relational algebra to build relations and operate on the data.
Five operations are primitives (Select, Project, Union, Difference and Product) and the other operations
can be defined in terms of those five. A View is defined from the operations of Join, Project, and Select.
For the purpose of the exam you must remember the following terms from relational algebra and their SQL
equivalent:
Attribute = Column
A tuple of a table corresponds to a row in the table. Tuples are unordered top to bottom because a relation
is a mathematical set and not a list. Also, because tuples are based on tables that are mathematical sets,
there are no duplicate tuples in a table (sets in mathematics by definition do not include duplicate
elements).
The primary key is an attribute or set of attributes that uniquely identifies a specific instance of an entity.
Each table in a database must have a primary key that is unique to that table. It is a subset of the
candidate key.
NOTE:
SQL offers three classes of operators: select, project, and join. The select operator serves to shrink the
table vertically by eliminating unwanted rows (tuples). The project operator serves to shrink the table
horizontally by removing unwanted columns (attributes).
And the join operator allows the dynamic linking of two tables that share a common column value. The join
operation is achieved by stating the selection criteria for two tables and equating them with their common
columns.
Most commercial implementations of SQL do not support a project operation, instead projections are
achieved by specifying the columns desired in the output. This is why the Project operator is not well
known as it is fading away from most databases.
QUESTION 80
Which of the following is used to create and modify the structure of your tables and other objects in the
database?
Correct Answer: A
Explanation
Explanation/Reference:
The SQL Data Definition Language (DDL) is used to create, modify, and delete views and relations
(tables).
Data Definition Language
The Data Definition Language (DDL) is used to create and destroy databases and database objects.
These commands will primarily be used by database administrators during the setup and removal phases
of a database project. Let's take a look at the structure and usage of four basic DDL commands:
CREATE
Installing a database management system (DBMS) on a computer allows you to create and manage many
independent databases. For example, you may want to maintain a database of customer contacts for your
sales department and a personnel database for your HR department.
The CREATE command can be used to establish each of these databases on your platform. For example,
the command:
creates an empty database named "employees" on your DBMS. After creating the database, your next
step is to create tables that will contain data. (If this doesn't make sense, you might want to read the article
Microsoft Access Fundamentals for an overview of tables and databases.) Another variant of the CREATE
command can be used for this purpose. The command:
CREATE TABLE personal_info (first_name char(20) not null, last_name char(20) not null, employee_id int
not null)
establishes a table titled "personal_info" in the current database. In our example, the table contains three
attributes: first_name, last_name and employee_id. Don't worry about the other information included in the
command -- we'll cover that in a future article.
USE
The USE command allows you to specify the database you wish to work with within your DBMS. For
example, if we're currently working in the sales database and want to issue some commands that will
affect the employees database, we would preface them with the following SQL command:
USE employees
It's important to always be conscious of the database you are working in before issuing SQL commands
that manipulate data.
ALTER
Once you've created a table within a database, you may wish to modify the definition of it. The ALTER
command allows you to make changes to the structure of a table without deleting and recreating it. Take a
look at the following command:
DROP
The final command of the Data Definition Language, DROP, allows us to remove entire database objects
from our DBMS. For example, if we want to permanently remove the personal_info table that we created,
we'd use the following command:
Use this command with care! Remember that the DROP command removes entire data structures from
your database. If you want to remove individual records, use the DELETE command of the Data
Manipulation Language.
The Data Manipulation Language (DML) is used to retrieve, insert and modify database information. These
commands will be used by all database users during the routine operation of the database. Let's take a
brief look at the basic DML commands:
The Data Manipulation Language (DML) is used to retrieve, insert and modify database information. These
commands will be used by all database users during the routine operation of the database. Let's take a
brief look at the basic DML commands:
INSERT
The INSERT command in SQL is used to add records to an existing table. Returning to the personal_info
example from the previous section, let's imagine that our HR department needs to add a new employee to
their database. They could use a command similar to the one shown below:
Note that there are four values specified for the record. These correspond to the table attributes in the
order they were defined: first_name, last_name, employee_id, and salary.
SELECT
The SELECT command is the most commonly used command in SQL. It allows database users to retrieve
the specific information they desire from an operational database. Let's take a look at a few examples,
again using the personal_info table from our employees database.
The command shown below retrieves all of the information contained within the personal_info table. Note
that the asterisk is used as a wildcard in SQL. This literally means "Select everything from the
personal_info table."
SELECT *
FROM personal_info
Alternatively, users may want to limit the attributes that are retrieved from the database. For example, the
Human Resources department may require a list of the last names of all employees in the company. The
following SQL command would retrieve only that information:
SELECT last_name
FROM personal_info
Finally, the WHERE clause can be used to limit the records that are retrieved to those that meet specified
criteria. The CEO might be interested in reviewing the personnel records of all highly paid employees. The
following command retrieves all of the data contained within personal_info for records that have a salary
value greater than $50,000:
SELECT *
FROM personal_info
WHERE salary > $50000
UPDATE
The UPDATE command can be used to modify information contained within a table, either in bulk or
individually. Each year, our company gives all employees a 3% cost-of-living increase in their salary. The
following SQL command could be used to quickly apply this to all of the employees stored in the database:
UPDATE personal_info
SET salary = salary * 103
On the other hand, our new employee Bart Simpson has demonstrated performance above and beyond
the call of duty. Management wishes to recognize his stellar accomplishments with a $5,000 raise. The
WHERE clause could be used to single out Bart for this raise:
UPDATE personal_info
SET salary = salary + $5000
WHERE employee_id = 12345
DELETE
Finally, let's take a look at the DELETE command. You'll find that the syntax of this command is similar to
that of the other DML commands. Unfortunately, our latest corporate earnings report didn't quite meet
expectations and poor Bart has been laid off. The DELETE command with a WHERE clause can be used
to remove his record from the personal_info table:
We'll first explore the use of a basic JOIN operation to combine data from two tables. In future installments,
we'll explore the use of outer and inner joins to achieve added power.
We'll continue with our example using the PERSONAL_INFO table, but first we'll need to add an additional
table to the mix. Let's assume we have a table called DISCIPLINARY_ACTION that was created with the
following statement:
CREATE TABLE disciplinary_action (action_id int not null, employee_id int not null, comments char(500))
This table contains the results of disciplinary actions on company employees. You'll notice that it doesn't
contain any information about the employee other than the employee number. It's then easy to imagine
many scenarios where we might want to combine information from the DISCIPLINARY_ACTION and
PERSONAL_INFO tables.
Assume we've been tasked with creating a report that lists the disciplinary actions taken against all
employees with a salary greater than $40,000 The use of a JOIN operation in this case is quite
straightforward. We can retrieve this information using the following command:
As you can see, we simply specified the two tables that we wished to join in the FROM clause and then
included a statement in the WHERE clause to limit the results to records that had matching employee IDs
and met our criteria of a salary greater than $40,000
Another term you must be familiar with as a security mechanism in Databases is: VIEW
What is a view?
In database theory, a view is a virtual or logical table composed of the result set of a query. Unlike ordinary
tables (base tables) in a relational database, a view is not part of the physical schema: it is a dynamic,
virtual table computed or collated from data in the database. Changing the data in a table alters the data
shown in the view.
The result of a view is stored in a permanent table whereas the result of a query is displayed in a
temporary table.
Just like functions (in programming) provide abstraction, views can be used to create abstraction. Also, just
like functions, views can be nested, thus one view can aggregate data from other views. Without the use of
views it would be much harder to normalise databases above second normal form. Views can make it
easier to create lossless join decomposition.
Rows available through a view are not sorted. A view is a relational table, and the relational model states
that a table is a set of rows. Since sets are not sorted - per definition - the rows in a view are not ordered
either. Therefore, an ORDER BY clause in the view definition is meaningless and the SQL standard
(SQL:2003) does not allow this for the subselect in a CREATE VIEW statement.
The following reference(s) were used for this question:
KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer
Security, 2001, John Wiley & Sons, Page 47
http://www.tomjewett.com/dbdesign/dbdesign.php?page=ddldml.php
QUESTION 81
Which of the following is used to monitor network traffic or to monitor host audit logs in real time to
determine violations of system security policy that have taken place?
Correct Answer: A
Explanation
Explanation/Reference:
An Intrusion Detection System (IDS) is a system that is used to monitor network traffic or to monitor host
audit logs in order to determine if any violations of an organization's system security policy have taken
place.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 48
QUESTION 82
Which of the following monitors network traffic in real time?
A. network-based IDS
B. host-based IDS
C. application-based IDS
D. firewall-based IDS
Correct Answer: A
Explanation
Explanation/Reference:
This type of IDS is called a network-based IDS because monitors network traffic in real time. Source:
KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer
Security, 2001, John Wiley & Sons, Page 48
QUESTION 83
A host-based IDS is resident on which of the following?
Correct Answer: A
Explanation
Explanation/Reference:
A host-based IDS is resident on a host and reviews the system and event logs in order to detect an attack
on the host and to determine if the attack was successful. All critical serves should have a Host Based
Intrusion Detection System (HIDS) installed. As you are well aware, network based IDS cannot make
sense or detect pattern of attacks within encrypted traffic. A HIDS might be able to detect such attack after
the traffic has been decrypted on the host. This is why critical servers should have both NIDS and HIDS.
FROM WIKIPEDIA:
A HIDS will monitor all or part of the dynamic behavior and of the state of a computer system. Much as a
NIDS will dynamically inspect network packets, a HIDS might detect which program accesses what
resources and assure that (say) a word-processor hasn\'t suddenly and inexplicably started modifying the
system password-database. Similarly a HIDS might look at the state of a system, its stored information,
whether in RAM, in the file-system, or elsewhere; and check that the contents of these appear as
expected.
One can think of a HIDS as an agent that monitors whether anything/anyone - internal or external - has
circumvented the security policy that the operating system tries to enforce. http://en.wikipedia.org/wiki/
Host-based_intrusion_detection_system
QUESTION 84
Which of the following usually provides reliable, real-time information without consuming network or host
resources?
A. network-based IDS
B. host-based IDS
C. application-based IDS
D. firewall-based IDS
Correct Answer: A
Explanation
Explanation/Reference:
A network-based IDS usually provides reliable, real-time information without consuming network or host
resources.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 48
QUESTION 85
The fact that a network-based IDS reviews packets payload and headers enable which of the following?
Correct Answer: A
Explanation
Explanation/Reference:
Because a network-based IDS reviews packets and headers, denial of service attacks can also be
detected.
This question is an easy question if you go through the process of elimination. When you see an answer
containing the keyword: ALL It is something a give away that it is not the proper answer. On the real exam
you may encounter a few question where the use of the work ALL renders the choice invalid. Pay close
attention to such keyword.
Even though most IDSs can detect some viruses and some password guessing attacks, they cannot detect
ALL viruses or ALL password guessing attacks. Therefore these two answers are only detractors.
Unless the IDS knows the valid values for a certain dataset, it can NOT detect data corruption.
QUESTION 86
Which of the following reviews system and event logs to detect attacks on the host and determine if the
attack was successful?
A. host-based IDS
B. firewall-based IDS
C. bastion-based IDS
D. server-based IDS
Correct Answer: A
Explanation
Explanation/Reference:
A host-based IDS can review the system and event logs in order to detect an attack on the host and to
determine if the attack was successful.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 48
QUESTION 87
What would be considered the biggest drawback of Host-based Intrusion Detection systems (HIDS)?
Correct Answer: A
Explanation
Explanation/Reference:
The biggest drawback of HIDS, and the reason many organizations resist its use, is that it can be very
invasive to the host operating system. HIDS must have the capability to monitor all processes and activities
on the host system and this can sometimes interfere with normal system processing.
A host-based IDS (HIDS) can be installed on individual workstations and/ or servers to watch for
inappropriate or anomalous activity. HIDSs are usually used to make sure users do not delete system files,
reconfigure important settings, or put the system at risk in any other way. So, whereas the NIDS
understands and monitors the network traffic, a HIDS's universe is limited to the computer itself. A HIDS
does not understand or review network traffic, and a NIDS does not "look in" and monitor a system's
activity. Each has its own job and stays out of the other's way.
An IDS is informative by nature and provides real-time information when suspicious activities are identified.
It is primarily a detective device and, acting in this traditional role, is not used to directly prevent the
suspected attack.
What about IPS?
In contrast, an intrusion prevention system (IPS), is a technology that monitors activity like an IDS but will
automatically take proactive preventative action if it detects unacceptable activity. An IPS permits a
predetermined set of functions and actions to occur on a network or system; anything that is not permitted
is considered unwanted activity and blocked. IPS is engineered specifically to respond in real time to an
event at the system or network layer. By proactively enforcing policy, IPS can thwart not only attackers, but
also authorized users attempting to perform an action that is not within policy. Fundamentally, IPS is
considered an access control and policy enforcement technology, whereas IDS is considered network
monitoring and audit technology.
QUESTION 88
Attributes that characterize an attack are stored for reference using which of the following Intrusion
Detection System (IDS)?
A. signature-based IDS
B. statistical anomaly-based IDS
C. event-based IDS
D. inferent-based IDS
Correct Answer: A
Explanation
Explanation/Reference:
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 49
QUESTION 89
Which of the following is an issue with signature-based intrusion detection systems?
Correct Answer: A
Explanation
Explanation/Reference:
An issue with signature-based ID is that only attack signatures that are stored in their database are
detected.
New attacks without a signature would not be reported. They do require constant updates in order to
maintain their effectiveness.
Reference used for this question:
KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer
Security, 2001, John Wiley & Sons, Page 49
QUESTION 90
Which of the following is an IDS that acquires data and defines a "normal" usage profile for the network or
host?
A. Statistical Anomaly-Based ID
B. Signature-Based ID
C. dynamical anomaly-based ID
D. inferential anomaly-based ID
Correct Answer: A
Explanation
Explanation/Reference:
Statistical Anomaly-Based ID - With this method, an IDS acquires data and defines a "normal" usage
profile for the network or host that is being monitored. Source: KRUTZ, Ronald L. & VINES, Russel D., The
CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 49
QUESTION 91
Which of the following is most relevant to determining the maximum effective cost of access control?
Correct Answer: A
Explanation
Explanation/Reference:
The cost of access control must be commensurate with the value of the information that is being protected.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 49
QUESTION 92
Which of the following is NOT a factor related to Access Control?
A. integrity
B. authenticity
C. confidentiality
D. availability
Correct Answer: B
Explanation
Explanation/Reference:
These factors cover the integrity, confidentiality, and availability components of information system
security.
Integrity is important in access control as it relates to ensuring only authorized subjects can make changes
to objects.
Authenticity is different from authentication. Authenticity pertains to something being authentic, not
necessarily having a direct correlation to access control.
Confidentiality is pertinent to access control in that the access to sensitive information is controlled to
protect confidentiality.
vailability is protected by access controls in that if an attacket attempts to disrupt availability they would first
need access.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 49
QUESTION 93
Which of the following is most appropriate to notify an external user that session monitoring is being
conducted?
A. Logon Banners
B. Wall poster
C. Employee Handbook
D. Written agreement
Correct Answer: A
Explanation
Explanation/Reference:
Banners at the log-on time should be used to notify external users of any monitoring that is being
conducted. A good banner will give you a better legal stand and also makes it obvious the user was
warned about who should access the system and if it is an unauthorized user then he is fully aware of
trespassing.
There are two possible answers based on how the question is presented, this question could either apply
to internal users or ANY anonymous user.
Internal users should always have a written agreement first, then logon banners serve as a constant
reminder.
Anonymous users, such as those logging into a web site, ftp server or even a mail server; their only
notification system is the use of a logon banner.
and
Shon Harris, CISSP All-in-one, 5th edition, pg 873
QUESTION 94
Which of the following pairings uses technology to enforce access control policies?
A. Preventive/Administrative
B. Preventive/Technical
C. Preventive/Physical
D. Detective/Administrative
Correct Answer: B
Explanation
Explanation/Reference:
The preventive/technical pairing uses technology to enforce access control policies.
TECHNICAL CONTROLS
Technical security involves the use of safeguards incorporated in computer hardware, operations or
applications software, communications hardware and software, and related devices. Technical controls are
sometimes referred to as logical controls.
Preventive Technical Controls
Preventive technical controls are used to prevent unauthorized personnel or programs from gaining remote
access to computing resources. Examples of these controls include:
Preventive physical controls are employed to prevent unauthorized personnel from entering computing
facilities (i.e., locations housing computing resources, supporting utilities, computer hard copy, and input
data media) and to help protect against natural disasters. Examples of these controls include:
Backup files and documentation.
Fences.
Security guards.
Badge systems.
Double door systems.
Locks and keys.
Backup power.
Biometric access controls.
Site selection.
Fire extinguishers.
Preventive administrative controls are personnel-oriented techniques for controlling people's behavior to
ensure the confidentiality, integrity, and availability of computing data and programs. Examples of
preventive administrative controls include:
Security awareness and technical training.
Separation of duties.
Procedures for recruiting and terminating employees.
Security policies and procedures.
Supervision.
Disaster recovery, contingency, and emergency plans.
User registration for computer access.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 34
QUESTION 95
In the course of responding to and handling an incident, you work on determining the root cause of the
incident. In which step are you in?
A. Recovery
B. Containment
C. Triage
D. Analysis and tracking
Correct Answer: D
Explanation
Explanation/Reference:
In this step, your main objective is to examine and analyze what has occurred and focus on determining
the root cause of the incident.
Recovery is incorrect as recovery is about resuming operations or bringing affected systems back into
production
Containment is incorrect as containment is about reducing the potential impact of an incident. Triage is
incorrect as triage is about determining the seriousness of the incident and filtering out false positives
Reference:
Official Guide to the CISSP CBK, pages 700-704
QUESTION 96
Access control is the collection of mechanisms that permits managers of a system to exercise a directing
or restraining influence over the behavior, use, and content of a system. It does not permit management to:
Correct Answer: C
Explanation
Explanation/Reference:
Access control is the collection of mechanisms that permits managers of a system to exercise a directing
or restraining influence over the behavior, use, and content of a system. It permits management to specify
what users can do, which resources they can access, and what operations they can perform on a system.
Specifying HOW to restrain hackers is not directly linked to access control.
Source: DUPUIS, Clement, Access Control Systems and Methodology, Version 1, May 2002, CISSP Open
Study Group Study Guide for Domain 1, Page 12
QUESTION 97
Access Control techniques do not include which of the following choices?
Correct Answer: A
Explanation
Explanation/Reference:
Access Control Techniques
Discretionary Access Control
Mandatory Access Control
Lattice Based Access Control
Rule-Based Access Control
Role-Based Access Control
Source: DUPUIS, Clement, Access Control Systems and Methodology, Version 1, May 2002, CISSP Open
Study Group Study Guide for Domain 1, Page 13
QUESTION 98
Which of the following statements relating to the Bell-LaPadula security model is FALSE (assuming the
Strong Star property is not being used)?
Correct Answer: C
Explanation
Explanation/Reference:
It is not a property of Bell LaPadula model.
The other answers are incorrect because:
A subject is not allowed to read up is a property of the 'simple security rule' of Bell LaPadula model.
The *- property restriction can be escaped by temporarily downgrading a high level subject can be
escaped by temporarily downgrading a high level subject or by identifying a set of trusted objects which are
permitted to violate the *-property as long as it is not in the middle of an operation.
It is restricted to confidentiality as it is a state machine model that enforces the confidentiality aspects of
access control.
Reference: Shon Harris AIO v3 , Chapter-5 : Security Models and Architecture , Page:279-282
QUESTION 99
When a biometric system is used, which error type deals with the possibility of GRANTING access to
impostors who should be REJECTED?
A. Type I error
B. Type II error
C. Type III error
D. Crossover error
Correct Answer: B
Explanation
Explanation/Reference:
When the biometric system accepts impostors who should have been rejected , it is called a Type II error
or False Acceptance Rate or False Accept Rate.
Biometrics verifies an individual's identity by analyzing a unique personal attribute or behavior, which is
one of the most effective and accurate methods of verifying identification.
Biometrics is a very sophisticated technology; thus, it is much more expensive and complex than the other
types of identity verification processes. A biometric system can make authentication decisions based on an
individual's behavior, as in signature dynamics, but these can change over time and possibly be forged.
Biometric systems that base authentication decisions on physical attributes (iris, retina, fingerprint) provide
more accuracy, because physical attributes typically don't change much, absent some disfiguring injury,
and are harder to impersonate.
When a biometric system rejects an authorized individual, it is called a Type I error (False Rejection Rate
(FRR) or False Reject Rate (FRR)).
When the system accepts impostors who should be rejected, it is called a Type II error (False Acceptance
Rate (FAR) or False Accept Rate (FAR)). Type II errors are the most dangerous and thus the most
important to avoid.
The goal is to obtain low numbers for each type of error, but When comparing different biometric systems,
many different variables are used, but one of the most important metrics is the crossover error rate (CER).
The accuracy of any biometric method is measured in terms of Failed Acceptance Rate (FAR) and Failed
Rejection Rate (FRR). Both are expressed as percentages. The FAR is the rate at which attempts by
unauthorized users are incorrectly accepted as valid. The FRR is just the opposite. It measures the rate at
which authorized users are denied access. The relationship between FRR (Type I) and FAR (Type II) is
depicted in the graphic below . As one rate increases, the other decreases. The Cross-over Error Rate
(CER) is sometimes considered a good indicator of the overall accuracy of a biometric system. This is the
point at which the FRR and the FAR have the same value. Solutions with a lower CER are typically more
accurate.
See graphic below from Biometria showing this relationship. The Cross-over Error Rate (CER) is also
called the Equal Error Rate (EER), the two are synonymous.
QUESTION 100
Which of the following is the FIRST step in protecting data's confidentiality?
A. Install a firewall
B. Implement encryption
C. Identify which information is sensitive
D. Review all user access rights
Correct Answer: C
Explanation
Explanation/Reference:
In order to protect the confidentiality of the data.
QUESTION 101
Which of the following best ensures accountability of users for the actions taken within a system or
domain?
A. Identification
B. Authentication
C. Authorization
D. Credentials
Correct Answer: B
Explanation
Explanation/Reference:
The only way to ensure accountability is if the subject is uniquely identified and authenticated. Identification
alone does not provide proof the user is who they claim to be. After showing proper credentials, a user is
authorized access to resources.
References:
HARRIS, Shon, All-In-One CISSP Certification Exam Guide, McGraw-Hill/Osborne, 2002, Chapter 4:
Access Control (page 126).
QUESTION 102
Which of the following statements pertaining to biometrics is FALSE?
Correct Answer: C
Explanation
Explanation/Reference:
As this is not a characteristic of Biometrics this is the rigth choice for this question. This is one of the three
basic way authentication can be performed and it is not related to Biometrics. Example of something you
know would be a password or PIN for example.
Please make a note of the negative 'FALSE' within the question. This question may seem tricky to some of
you but you would be amazed at how many people cannot deal with negative questions. There will be a
few negative questions within the real exam, just like this one the keyword NOT or FALSE will be in
Uppercase to clearly indicate that it is negative. Biometrics verifies an individual's identity by analyzing a
unique personal attribute or behavior, which is one of the most effective and accurate methods of
performing authentication (one to one matching) or identification (a one to many matching).
A biometric system scans an attribute or behavior of a person and compares it to a template store within
an authentication server datbase, such template would be created in an earlier enrollment process.
Because this system inspects the grooves of a person's fingerprint, the pattern of someone's retina, or the
pitches of someone's voice, it has to be extremely sensitive.
The system must perform accurate and repeatable measurements of anatomical or physiological
characteristics. This type of sensitivity can easily cause false positives or false negatives. The system must
be calibrated so that these false positives and false negatives occur infrequently and the results are as
accurate as possible.
Physiological Examples:
Unique Physical Attributes:
Fingerprint (Most commonly accepted)
Hand Geometry
Retina Scan (Most accurate but most intrusive)
Iris Scan
Vascular Scan
Behavioral Examples:
Repeated Actions
Keystroke Dynamics
(Dwell time (the time a key is pressed) and Flight time (the time between "key up" and the next "key
down").
Signature Dynamics
(Stroke and pressure points)
EXAM TIP:
Retina scan devices are the most accurate but also the most invasive biometrics system available today.
The continuity of the retinal pattern throughout life and the difficulty in fooling such a device also make it a
great long-term, high-security option. Unfortunately, the cost of the proprietary hardware as well the stigma
of users thinking it is potentially harmful to the eye makes retinal scanning a bad fit for most situations.
Remember for the exam that fingerprints are the most commonly accepted type of biometrics system.
QUESTION 103
Which of the following biometric devices offers the LOWEST CER?
A. Keystroke dynamics
B. Voice verification
C. Iris scan
D. Fingerprint
Correct Answer: C
Explanation
Explanation/Reference:
From most effective (lowest CER) to least effective (highest CER) are:
Iris scan, fingerprint, voice verification, keystroke dynamics. Reference : Shon Harris Aio v3 , Chapter-4 :
Access Control , Page : 131 Also see: http://www.sans.org/reading_room/whitepapers/authentication/
biometric-selection- body-parts-online_139
QUESTION 104
Which of the following is the WEAKEST authentication mechanism?
A. Passphrases
B. Passwords
C. One-time passwords
D. Token devices
Correct Answer: B
Explanation
Explanation/Reference:
Most of the time users usually choose passwords which can be guessed , hence passwords is the BEST
answer out of the choices listed above.
QUESTION 105
Which of the following statements pertaining to access control is false?
Explanation/Reference:
Access control mechanisms should default to no access to provide the necessary level of security and
ensure that no security holes go unnoticed. If access is not explicitly allowed, it should be implicitly denied.
Source: HARRIS, Shon, All-In-One CISSP Certification Exam Guide, McGraw-Hill/Osborne, 2002, Chapter
4: Access Control (page 143).
QUESTION 106
Which of the following is NOT part of the Kerberos authentication protocol?
Correct Answer: D
Explanation
Explanation/Reference:
There is no such component within kerberos environment. Kerberos uses only symmetric encryption and
does not make use of any public key component.
Principals : Key Distribution Center provides services to principals , which can be users , applications or
network services.
References : Shon Harris , AIO v3 , Chapter - 4: Access Control , Pages : 152-155
QUESTION 107
Which access control model enables the OWNER of the resource to specify what subjects can access
specific resources based on their identity?
Correct Answer: A
Explanation
Explanation/Reference:
Data owners decide who has access to resources based only on the identity of the person accessing the
resource.
Mandatory Access Control : users and data owners do not have as much freedom to determine who can
access files. The operating system makes the final decision and can override the users' wishes and access
decisions are based on security labels. Sensitive Access Control : There is no such access control in the
context of the above question.
Role-based Access Control : uses a centrally administered set of controls to determine how subjects and
objects interact , also called as non discretionary access control.
In a mandatory access control (MAC) model, users and data owners do not have as much freedom to
determine who can access files. The operating system makes the final decision and can override the
users' wishes. This model is much more structured and strict and is based on a security label system.
Users are given a security clearance (secret, top secret, confidential, and so on), and data is classified in
the same way. The clearance and classification data is stored in the security labels, which are bound to the
specific subjects and objects. When the system makes a decision about fulfilling a request to access an
object, it is based on the clearance of the subject, the classification of the object, and the security policy of
the system. The rules for how subjects access objects are made by the security officer, configured by the
administrator, enforced by the operating system, and supported by security technologies Reference : Shon
Harris , AIO v3 , Chapter-4 : Access Control , Page : 163-165
QUESTION 108
Which of the following access control models is based on sensitivity labels?
Correct Answer: B
Explanation
Explanation/Reference:
Access decisions are made based on the clearance of the subject and the sensitivity label of the object.
Example: Eve has a "Secret" security clearance and is able to access the "Mugwump Missile Design
Profile" because its sensitivity label is "Secret." She is denied access to the "Presidential Toilet Tissue
Formula" because its sensitivity label is "Top Secret."
References:
All in One third edition, page 164
Official ISC2 Guide page 187
QUESTION 109
Which access control model is also called Non Discretionary Access Control (NDAC)?
Correct Answer: C
Explanation
Explanation/Reference:
RBAC is sometimes also called non-discretionary access control (NDAC) (as Ferraiolo says "to distinguish
it from the policy-based specifics of MAC"). Another model that fits within the NDAC category is Rule-
Based Access Control (RuBAC or RBAC). Most of the CISSP books use the same acronym for both
models but NIST tend to use a lowercase "u" in between R and B to differentiate the two models.
You can certainly mimic MAC using RBAC but true MAC makes use of Labels which contains the
sensitivity of the objects and the categories they belong to. No labels means MAC is not being used.
One of the most fundamental data access control decisions an organization must make is the amount of
control it will give system and data owners to specify the level of access users of that data will have. In
every organization there is a balancing point between the access controls enforced by organization and
system policy and the ability for information owners to determine who can have access based on specific
business requirements. The process of translating that balance into a workable access control model can
be defined by three general access frameworks:
Discretionary access control
Mandatory access control
Nondiscretionary access control
A role-based access control (RBAC) model bases the access control authorizations on the roles (or
functions) that the user is assigned within an organization. The determination of what roles have access to
a resource can be governed by the owner of the data, as with DACs, or applied based on policy, as with
MACs.
Access control decisions are based on job function, previously defined and governed by policy, and each
role (job function) will have its own access capabilities. Objects associated with a role will inherit privileges
assigned to that role. This is also true for groups of users, allowing administrators to simplify access
control strategies by assigning users to groups and groups to roles.
There are several approaches to RBAC. As with many system controls, there are variations on how they
can be applied within a computer system.
2 Limited RBAC: Limited RBAC is achieved when users are mapped to roles within a single application
rather than through an organization-wide role structure. Users in a limited RBAC system are also able to
access non-RBAC-based applications or data. For example, a user may be assigned to multiple roles
within several applications and, in addition, have direct access to another application or system
independent of his or her assigned role. The key attribute of limited RBAC is that the role for that user is
defined within an application and not necessarily based on the user's organizational job function.
3 Hybrid RBAC: Hybrid RBAC introduces the use of a role that is applied to multiple applications or
systems based on a user's specific role within the organization. That role is then applied to applications or
systems that subscribe to the organization's role-based model. However, as the term "hybrid" suggests,
there are instances where the subject may also be assigned to roles defined solely within specific
applications, complimenting (or, perhaps, contradicting) the larger, more encompassing organizational role
used by other systems. 4 Full RBAC: Full RBAC systems are controlled by roles defined by the
organization's policy and access control infrastructure and then applied to applications and systems across
the enterprise. The applications, systems, and associated data apply permissions based on that enterprise
definition, and not one defined by a specific application or system.
Be careful not to try to make MAC and DAC opposites of each other -- they are two different access control
strategies with RBAC being a third strategy that was defined later to address some of the limitations of
MAC and DAC.
Label-based access control is incorrect because this is not a name for a type of access control but simply
a bogus detractor.
Lattice based access control is not adequate either. A lattice is a series of levels and a subject will be
granted an upper and lower bound within the series of levels. These levels could be sensitivity levels or
they could be confidentiality levels or they could be integrity levels.
Schneiter, Andrew (2013-04-15). Official (ISC)2 Guide to the CISSP CBK, Third Edition :
Access Control ((ISC)2 Press) (Kindle Locations 1557-1584). Auerbach Publications. Kindle Edition.
Schneiter, Andrew (2013-04-15). Official (ISC)2 Guide to the CISSP CBK, Third Edition :
Access Control ((ISC)2 Press) (Kindle Locations 1474-1477). Auerbach Publications. Kindle Edition.
QUESTION 110
Which access model is most appropriate for companies with a high employee turnover?
Correct Answer: A
Explanation
Explanation/Reference:
The underlying problem for a company with a lot of turnover is assuring that new employees are assigned
the correct access permissions and that those permissions are removed when they leave the company.
Selecting the best answer requires one to think about the access control options in the context of a
company with a lot of flux in the employee population. RBAC simplifies the task of assigning permissions
because the permissions are assigned to roles which do not change based on who belongs to them. As
employees join the company, it is simply a matter of assigning them to the appropriate roles and their
permissions derive from their assigned role. They will implicitely inherit the permissions of the role or roles
they have been assigned to. When they leave the company or change jobs, their role assignment is
revoked/changed appropriately.
Mandatory access control is incorrect. While controlling access based on the clearence level of employees
and the sensitivity of obects is a better choice than some of the other incorrect answers, it is not the best
choice when RBAC is an option and you are looking for the best solution for a high number of employees
constantly leaving or joining the company.
Lattice-based access control is incorrect. The lattice is really a mathematical concept that is used in
formally modeling information flow (Bell-Lapadula, Biba, etc). In the context of the question, an abstract
model of information flow is not an appropriate choice. CBK, pp. 324-325
Discretionary access control is incorrect. When an employee joins or leaves the company, the object
owner must grant or revoke access for that employee on all the objects they own. Problems would also
arise when the owner of an object leaves the company. The complexity of assuring that the permissions
are added and removed correctly makes this the least desirable solution in this situation.
References:
Alll in One, third edition page 165
RBAC is discussed on pp. 189 through 191 of the ISC(2) guide.
QUESTION 111
In a security context what are database views used for?
Correct Answer: C
Explanation
Explanation/Reference:
The use of a database view allows sensitive information to be hidden from unauthorized users. For
example, the employee table might contain employee name, address, office extension and sensitive
information such as social security number, etc. A view of the table could be constructed and assigned to
the switchboard operator that only included the name and office extension.
To ensure referential integrity is incorrect. Referential integrity states that for each foriegn key value in a
database table, there must be another table that contains a record with that value as its primary key (CBK,
p. 607). For example, consider a record in the line-items table of an order management database -- this
table contains a foreign key of part-number from the parts-master table. Referential integrity states that for
each part-number value in the line-items table, there must be a matching record with that same value in
the parts-master table. Referential integrity helps avoids consistency problems that could occur when, for
example, a part-number was deleted from parts-master that still appeared on records in the line-items
table.
To allow easier access to the database is incorrect. While views can be used for this purpose by, for
example, combining information from several tables in a single view, this is not the best answer for the use
of views in a security context.
To provide audit trails is incorrect. Since a view only affects what columns of a table are shown, this has
nothing to do with providing an audit trail.
References:
CBK, p. 632
AIOv3, p.168
QUESTION 112
What can be defined as a list of subjects along with their access rights that are authorized to access a
specific object?
A. A capability table
B. An access control list
C. An access control matrix
D. A role-based matrix
Correct Answer: B
Explanation
Explanation/Reference:
"It [ACL] specifies a list of users [subjects] who are allowed access to each object" CBK, p. 188
A capability table is incorrect. "Capability tables are used to track, manage and apply controls based on the
object and rights, or capabilities of a subject. For example, a table identifies the object, specifies access
rights allowed for a subject, and permits access based on the user's posession of a capability (or ticket) for
the object." CBK, pp. 191-192 The distinction that makes this an incorrect choice is that access is based
on posession of a capability by the subject. To put it another way, as noted in AIO3 on p. 169, "A capabiltiy
table is different from an ACL because the subject is bound to the capability table, whereas the object is
bound to the ACL."
An access control matrix is incorrect. The access control matrix is a way of describing the rules for an
access control strategy. The matrix lists the users, groups and roles down the left side and the resources
and functions across the top. The cells of the matrix can either indicate that access is allowed or indicate
the type of access. CBK pp 317 - 318
AIO3, p. 169 describes it as a table if subjects and objects specifying the access rights a certain subject
possesses pertaining to specific objects.
In either case, the matrix is a way of analyzing the access control needed by a population of subjects to a
population of objects. This access control can be applied using rules, ACL's, capability tables, etc.
A role-based matrix is incorrect. Again, a matrix of roles vs objects could be used as a tool for thinking
about the access control to be applied to a set of objects. The results of the analysis could then be
implemented using RBAC.
References:
CBK, Domain 2: Access Control.
AIO3, Chapter 4: Access Control
QUESTION 113
What is the difference between Access Control Lists (ACLs) and Capability Tables?
A. Access control lists are related/attached to a subject whereas capability tables are related/attached to
an object.
B. Access control lists are related/attached to an object whereas capability tables are related/attached to a
subject.
C. Capability tables are used for objects whereas access control lists are used for users.
D. They are basically the same.
Correct Answer: B
Explanation
Explanation/Reference:
Capability tables are used to track, manage and apply controls based on the object and rights, or
capabilities of a subject. For example, a table identifies the object, specifies access rights allowed for a
subject, and permits access based on the user's posession of a capability (or ticket) for the object. It is a
row within the matrix.
To put it another way, A capabiltiy table is different from an ACL because the subject is bound to the
capability table, whereas the object is bound to the ACL.
CLEMENT NOTE:
ACL's are attached to objects, it describe who has access to the object and what type of access they have.
It is a column within the matrix.
QUESTION 114
What can be defined as a table of subjects and objects indicating what actions individual subjects can take
upon individual objects?
A. A capacity table
B. An access control list
C. An access control matrix
D. A capability table
Correct Answer: C
Explanation
Explanation/Reference:
The matrix lists the users, groups and roles down the left side and the resources and functions across the
top. The cells of the matrix can either indicate that access is allowed or indicate the type of access. CBK
pp 317 - 318
AIO3, p. 169 describes it as a table if subjects and objects specifying the access rights a certain subject
possesses pertaining to specific objects.
In either case, the matrix is a way of analyzing the access control needed by a population of subjects to a
population of objects. This access control can be applied using rules, ACL's, capability tables, etc.
"It [ACL] specifies a list of users [subjects] who are allowed access to each object" CBK, p. 188 Access
control lists (ACL) could be used to implement the rules identified by an access control matrix but is
different from the matrix itself.
References:
CBK pp. 191-192, 317-318
AIO3, p. 169
QUESTION 115
Which access control model is best suited in an environment where a high security level is required and
where it is desired that only the administrator grants access control?
A. DAC
B. MAC
C. Access control matrix
D. TACACS
Correct Answer: B
Explanation
Explanation/Reference:
MAC provides high security by regulating access based on the clearance of individual users and sensitivity
labels for each object. Clearance levels and sensitivity levels cannot be modified by individual users -- for
example, user Joe (SECRET clearance) cannot reclassify the "Presidential Doughnut Recipe" from
"SECRET" to "CONFIDENTIAL" so that his friend Jane (CONFIDENTIAL clearance) can read it. The
administrator is ultimately responsible for configuring this protection in accordance with security policy and
directives from the Data Owner.
DAC is incorrect. In DAC, the data owner is responsible for controlling access to the object. Access control
matrix is incorrect. The access control matrix is a way of thinking about the access control needed by a
population of subjects to a population of objects. This access control can be applied using rules, ACL's,
capability tables, etc. TACACS is incorrect. TACACS is a tool for performing user authentication.
References:
CBK, p. 187, Domain 2: Access Control.
AIO3, Chapter 4, Access Control.
QUESTION 116
What is the primary goal of setting up a honey pot?
Correct Answer: D
Explanation
Explanation/Reference:
The primary purpose of a honeypot is to study the attack methods of an attacker for the purposes of
understanding their methods and improving defenses.
"To lure hackers into attacking unused systems" is incorrect. Honeypots can serve as decoys but their
primary purpose is to study the behaviors of attackers.
"To entrap and track down possible hackers" is incorrect. There are a host of legal issues around
enticement vs entrapment but a good general rule is that entrapment is generally prohibited and evidence
gathered in a scenario that could be considered as "entrapping" an attacker would not be admissible in a
court of law.
"To set up a sacrificial lamb on the network" is incorrect. While a honeypot is a sort of sacrificial lamb and
may attract attacks that might have been directed against production systems, its real purpose is to study
the methods of attackers with the goals of better understanding and improving network defenses.
References:
AIO3, p. 213
QUESTION 117
Which of the following countermeasures would be the most appropriate to prevent possible intrusion or
damage from wardialing attacks?
Correct Answer: B
Explanation
Explanation/Reference:
Knowlege of modem numbers is a poor access control method as an attacker can discover modem
numbers by dialing all numbers in a range. Requiring user authentication before remote access is granted
will help in avoiding unauthorized access over a modem line. "Monitoring and auditing for such activity" is
incorrect. While monitoring and auditing can assist in detecting a wardialing attack, they do not defend
against a successful wardialing attack. "Making sure that only necessary phone numbers are made public"
is incorrect. Since a wardialing attack blindly calls all numbers in a range, whether certain numbers in the
range are public or not is irrelevant.
"Using completely different numbers for voice and data accesses" is incorrect. Using different number
ranges for voice and data access might help prevent an attacker from stumbling across the data lines while
wardialing the public voice number range but this is not an adequate countermeaure.
References:
CBK, p. 214
AIO3, p. 534-535
QUESTION 118
Which access control model provides upper and lower bounds of access capabilities for a subject?
Explanation/Reference:
In the lattice model, users are assigned security clearences and the data is classified. Access decisions
are made based on the clearence of the user and the classification of the object. Lattice-based access
control is an essential ingredient of formal security models such as Bell- LaPadula, Biba, Chinese Wall,
etc.
The bounds concept comes from the formal definition of a lattice as a "partially ordered set for which every
pair of elements has a greatest lower bound and a least upper bound." To see the application, consider a
file classified as "SECRET" and a user Joe with a security clearence of "TOP SECRET." Under Bell-
LaPadula, Joe's "least upper bound" access to the file is "READ" and his least lower bound is "NO WRITE"
(star property). Role-based access control is incorrect. Under RBAC, the access is controlled by the
permissions assigned to a role and the specific role assigned to the user. Biba access control is incorrect.
The Biba integrity model is based on a lattice structure but the context of the question disqualiifes it as the
best answer. Content-dependent access control is incorrect. In content dependent access control, the
actual content of the information determines access as enforced by the arbiter.
References:
CBK, pp. 324-325
AIO3, pp. 291-293 See aprticularly Figure 5-19 on p. 293 for an illustration of bounds in action.
QUESTION 119
How are memory cards and smart cards different?
Correct Answer: C
Explanation
Explanation/Reference:
The main difference between memory cards and smart cards is their capacity to process information. A
memory card holds information but cannot process information. A smart card holds information and has the
necessary hardware and software to actually process that information.
A memory card holds a user's authentication information, so that this user needs only type in a user ID or
PIN and presents the memory card to the system. If the entered information and the stored information
match and are approved by an authentication service, the user is successfully authenticated.
A common example of a memory card is a swipe card used to provide entry to a building. The user enters
a PIN and swipes the memory card through a card reader. If this is the correct combination, the reader
flashes green and the individual can open the door and enter the building.
Memory cards can also be used with computers, but they require a reader to process the information. The
reader adds cost to the process, especially when one is needed for every computer. Additionally, the
overhead of PIN and card generation adds additional overhead and complexity to the whole authentication
process. However, a memory card provides a more secure authentication method than using only a
password because the attacker would need to obtain the card and know the correct PIN.
Administrators and management need to weigh the costs and benefits of a memory card implementation
as well as the security needs of the organization to determine if it is the right authentication mechanism for
their environment.
One of the most prevalent weaknesses of memory cards is that data stored on the card are not protected.
Unencrypted data on the card (or stored on the magnetic strip) can be extracted or copied. Unlike a smart
card, where security controls and logic are embedded in the integrated circuit, memory cards do not
employ an inherent mechanism to protect the data from exposure. Very little trust can be associated with
confidentiality and integrity of information on the memory cards.
"Smart cards provide two-factor authentication whereas memory cards don't" is incorrect. This is not
necessarily true. A memory card can be combined with a pin or password to offer two factors
authentication where something you have and something you know are used for factors. "Memory cards
normally hold more memory than smart cards" is incorrect. While a memory card may or may not have
more memory than a smart card, this is certainly not the best answer to the question.
"Only smart cards can be used for ATM cards" is incorrect. This depends on the decisions made by the
particular institution and is not the best answer to the question.
QUESTION 120
Which of the following issues is not addressed by Kerberos?
A. Availability
B. Confidentiality
C. Integrity
D. Authentication
Correct Answer: A
Explanation
Explanation/Reference:
The KDC (Kerberos Distribution Center) can be a single point of failure. Confidentiality is incorrect.
Kerberos does ensure confidentiality, keeping communications private between systems over a network.
Integrity is incorrect. Kerberos does ensure integrity. Authentication is incorrect. Kerberos does provide
authentication.
References:
CBK pp 181-194
QUESTION 121
Why do buffer overflows happen? What is the main cause?
Correct Answer: B
Explanation
Explanation/Reference:
Buffer Overflow attack takes advantage of improper parameter checking within the application. This is the
classic form of buffer overflow and occurs because the programmer accepts whatever input the user
supplies without checking to make sure that the length of the input is less than the size of the buffer in the
program.
The buffer overflow problem is one of the oldest and most common problems in software development and
programming, dating back to the introduction of interactive computing. It can result when a program fills up
the assigned buffer of memory with more data than its buffer can hold. When the program begins to write
beyond the end of the buffer, the program's execution path can be changed, or data can be written into
areas used by the operating system itself. This can lead to the insertion of malicious code that can be used
to gain administrative privileges on the program or system.
As explained by Gaurab, it can become very complex. At the time of input even if you are checking the
length of the input, it has to be check against the buffer size. Consider a case where entry point of data is
stored in Buffer1 of Application1 and then you copy it to Buffer2 within Application2 later on, if you are just
checking the length of data against Buffer1, it will not ensure that it will not cause a buffer overflow in
Buffer2 of Application2
A bit of reassurance from the ISC2 book about level of Coding Knowledge needed for the exam:
It should be noted that the CISSP is not required to be an expert programmer or know the inner workings
of developing application software code, like the FORTRAN programming language, or how to develop
Web applet code using Java. It is not even necessary that the CISSP know detailed security-specific
coding practices such as the major divisions of buffer overflow exploits or the reason for preferring str(n)
cpy to strcpy in the C language (although all such knowledge is, of course, helpful). Because the CISSP
may be the person responsible for ensuring that security is included in such developments, the CISSP
should know the basic procedures and concepts involved during the design and development of software
programming. That is, in order for the CISSP to monitor the software development process and verify that
security is included, the CISSP must understand the fundamental concepts of programming developments
and the security strengths and weaknesses of various application development processes.
"Because they are an easy weakness to exploit" is incorrect. This answer is sometimes true but is not the
best answer because the root cause of the buffer overflow is that the programmer did not check the size of
the user input.
"Because of insufficient system memory" is incorrect. This is irrelevant to the occurrence of a buffer
overflow.
QUESTION 122
What is the main focus of the Bell-LaPadula security model?
A. Accountability
B. Integrity
C. Confidentiality
D. Availability
Correct Answer: C
Explanation
Explanation/Reference:
The Bell-LaPadula model is a formal model dealing with confidentiality. The BellLaPadula Model
(abbreviated BLP) is a state machine model used for enforcing access control in government and military
applications. It was developed by David Elliott Bell and Leonard J. LaPadula, subsequent to strong
guidance from Roger R. Schell to formalize the U.S. Department of Defense (DoD) multilevel security
(MLS) policy. The model is a formal state transition model of computer security policy that describes a set
of access control rules which use security labels on objects and clearances for subjects. Security labels
range from the most sensitive (e.g."Top Secret"), down to the least sensitive (e.g., "Unclassified" or
"Public"). The BellLaPadula model focuses on data confidentiality and controlled access to classified
information, in contrast to the Biba Integrity Model which describes rules for the protection of data integrity.
In this formal model, the entities in an information system are divided into subjects and objects.
The notion of a "secure state" is defined, and it is proven that each state transition preserves security by
moving from secure state to secure state, thereby inductively proving that the system satisfies the security
objectives of the model. The BellLaPadula model is built on the concept of a state machine with a set of
allowable states in a computer network system. The transition from one state to another state is defined by
transition functions.
A system state is defined to be "secure" if the only permitted access modes of subjects to objects are in
accordance with a security policy. To determine whether a specific access mode is allowed, the clearance
of a subject is compared to the classification of the object (more precisely, to the combination of
classification and set of compartments, making up the security level) to determine if the subject is
authorized for the specific access mode. The clearance/classification scheme is expressed in terms of a
lattice. The model defines two mandatory access control (MAC) rules and one discretionary access control
(DAC) rule with three security properties:
The Simple Security Property - a subject at a given security level may not read an object at a higher
security level (no read-up).
The -property (read "star"-property) - a subject at a given security level must not write to any object at a
lower security level (no write-down). The -property is also known as the Confinement property.
The Discretionary Security Property - use of an access matrix to specify the discretionary access control.
References:
Wikipedia at https://en.wikipedia.org/wiki/Bell-La_Padula_model
QUESTION 123
Which of the following statements pertaining to the Bell-LaPadula is TRUE if you are NOT making use of
the strong star property?
Correct Answer: A
Explanation
Explanation/Reference:
BellLaPadula Confidentiality Model10 The BellLaPadula model is perhaps the most well- known and
significant security model, in addition to being one of the oldest models used in the creation of modern
secure computing systems. Like the Trusted Computer System Evaluation Criteria (or TCSEC), it was
inspired by early U.S. Department of Defense security policies and the need to prove that confidentiality
could be maintained. In other words, its primary goal is to prevent disclosure as the model system moves
from one state (one point in time) to another. When the strong star property is not being used it means that
both the * property and the Simple Security Property rules would be applied.
The Star (*) property rule of the Bell-LaPadula model says that subjects cannot write down, this would
compromise the confidentiality of the information if someone at the secret layer would write the object
down to a confidential container for example. The Simple Security Property rule states that the subject
cannot read up which means that a subject at the secret layer would not be able to access objects at Top
Secret for example. You must remember: The model tells you about are NOT allowed to do. Anything else
would be allowed. For example within the Bell LaPadula model you would be allowed to write up as it does
not compromise the security of the information. In fact it would upgrade it to the point that you could lock
yourself out of your own information if you have only a secret security clearance. The following are
incorrect answers because they are all FALSE:
"It allows read up" is incorrect. The "simple security" property forbids read up. "It addresses covert
channels" is incorrect. Covert channels are not addressed by the Bell- LaPadula model.
"It addresses management of access controls" is incorrect. Management of access controls are beyond
the scope of the Bell-LaPadula model.
QUESTION 124
Which security model introduces access to objects only through programs?
Correct Answer: C
Explanation
Explanation/Reference:
In the Clark-Wilson model, the subject no longer has direct access to objects but instead must access
them through programs (well -formed transactions). The ClarkWilson integrity model provides a foundation
for specifying and analyzing an integrity policy for a computing system.
The model is primarily concerned with formalizing the notion of information integrity. Information integrity is
maintained by preventing corruption of data items in a system due to either error or malicious intent. An
integrity policy describes how the data items in the system should be kept valid from one state of the
system to the next and specifies the capabilities of various principals in the system. The model defines
enforcement rules and certification rules. ClarkWilson is more clearly applicable to business and industry
processes in which the integrity of the information content is paramount at any level of classification.
References:
ISC2 Official Study Guide, Pages 325 - 327
AIO3, pp. 284 - 287
AIOv4 Security Architecture and Design (pages 338 - 342) AIOv5 Security Architecture and Design (pages
341 - 344)
QUESTION 125
An Intrusion Detection System (IDS) is what type of control?
A. A preventive control.
B. A detective control.
C. A recovery control.
D. A directive control.
Correct Answer: B
Explanation
Explanation/Reference:
These controls can be used to investigate what happen after the fact. Your IDS may collect information on
where the attack came from, what port was use, and other details that could be used in the investigation
steps.
"Preventative control" is incorrect. Preventative controls preclude events or actions that might compromise
a system or cause a policy violation. An intrusion prevention system would be an example of a
preventative control.
"Recovery control" is incorrect. Recover controls include processes used to return the system to a secure
state after the occurrence of a security incident. Backups and redundant components are examples of
recovery controls.
"Directive controls" is incorrect. Directive controls are administrative instruments such as policies,
procedures, guidelines, and aggreements. An acceptable use policy is an example of a directive control.
References:
CBK, pp. 646 647
QUESTION 126
Smart cards are an example of which type of control?
A. Detective control
B. Administrative control
C. Technical control
D. Physical control
Correct Answer: C
Explanation
Explanation/Reference:
Logical or technical controls involve the restriction of access to systems and the protection of information.
Smart cards and encryption are examples of these types of control.
Controls are put into place to reduce the risk an organization faces, and they come in three main flavors:
administrative, technical, and physical. Administrative controls are commonly referred to as "soft controls"
because they are more management-oriented. Examples of administrative controls are security
documentation, risk management, personnel security, and training. Technical controls (also called logical
controls) are software or hardware components, as in firewalls, IDS, encryption, identification and
authentication mechanisms. And physical controls are items put into place to protect facility, personnel,
and resources. Examples of physical controls are security guards, locks, fencing, and lighting. Many types
of technical controls enable a user to access a system and the resources within that system. A technical
control may be a username and password combination, a Kerberos implementation, biometrics, public key
infrastructure (PKI), RADIUS, TACACS +, or authentication using a smart card through a reader connected
to a system. These technologies verify the user is who he says he is by using different types of
authentication methods. Once a user is properly authenticated, he can be authorized and allowed access
to network resources.
Harris, Shon (2012-10-25). CISSP All-in-One Exam Guide, 6th Edition (p. 245). McGraw-Hill.
Kindle Edition.
and
KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer
Security, John Wiley & Sons, 2001, Chapter 2: Access control systems (page 32).
QUESTION 127
What ensures that the control mechanisms correctly implement the security policy for the entire life cycle of
an information system?
A. Accountability controls
B. Mandatory access controls
C. Assurance procedures
D. Administrative controls
Correct Answer: C
Explanation
Explanation/Reference:
Controls provide accountability for individuals accessing information. Assurance procedures ensure that
access control mechanisms correctly implement the security policy for the entire life cycle of an information
system.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, John Wiley & Sons, 2001, Chapter 2: Access control systems (page 33).
QUESTION 128
What security model is dependent on security labels?
Correct Answer: C
Explanation
Explanation/Reference:
With mandatory access control (MAC), the authorization of a subject's access to an object is dependant
upon labels, which indicate the subject's clearance, and the classification or sensitivity of the object. Label-
based access control is not defined. Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep
Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 2: Access
control systems (page 33).
QUESTION 129
What security model implies a central authority that define rules and sometimes global rules, dictating what
subjects can have access to what objects?
A. Flow Model
B. Discretionary access control
C. Mandatory access control
D. Non-discretionary access control
Correct Answer: D
Explanation
Explanation/Reference:
As a security administrator you might configure user profiles so that users cannot change the system's
time, alter system configuration files, access a command prompt, or install unapproved applications. This
type of access control is referred to as nondiscretionary, meaning that access decisions are not made at
the discretion of the user. Nondiscretionary access controls are put into place by an authoritative entity
(usually a security administrator) with the goal of protecting the organization's most critical assets.
Non-discretionary access control is when a central authority determines what subjects can have access to
what objects based on the organizational security policy. Centralized access control is not an existing
security model.
Both, Rule Based Access Control (RuBAC or RBAC) and Role Based Access Controls (RBAC) falls into
this category.
QUESTION 130
Which type of password token involves time synchronization?
Correct Answer: B
Explanation
Explanation/Reference:
Synchronous dynamic password tokens generate a new unique password value at fixed time intervals, so
the server and token need to be synchronized for the password to be accepted. Source: KRUTZ, Ronald L.
& VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John
Wiley & Sons, 2001, Chapter 2: Access control systems (page 37).
Also check out: HARRIS, Shon, All-In-One CISSP Certification Exam Guide, McGraw- Hill/Osborne, 2002,
chapter 4: Access Control (page 136).
QUESTION 131
Which of the following statements pertaining to biometrics is false?
Correct Answer: D
Explanation
Explanation/Reference:
Authentication is based on three factor types: type 1 is something you know, type 2 is something you have
and type 3 is something you are. Biometrics are based on the Type 3 authentication mechanism.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, John Wiley & Sons, 2001, Chapter 2: Access control systems (page 37).
QUESTION 132
Which of the following statements pertaining to Kerberos is TRUE?
Correct Answer: A
Explanation
Explanation/Reference:
The question was asking for a TRUE statement and the only correct statement is "Kerberos does not
address availability".
Kerberos addresses the confidentiality and integrity of information. It does not directly address availability.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, John Wiley & Sons, 2001, Chapter 2: Access control systems (page 42).
QUESTION 133
Database views are NOT used to:
Correct Answer: A
Explanation
Explanation/Reference:
A view is considered as a virtual table that is derived from other tables. It can be used to restrict access to
certain information within the database, to hide attributes, and to implement content- dependent access
restrictions. It does not implement referential integrity. Source: KRUTZ, Ronald L. & VINES, Russel D., The
CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter
2: Access control systems (page 46).
QUESTION 134
What IDS approach relies on a database of known attacks?
Correct Answer: A
Explanation
Explanation/Reference:
A weakness of the signature-based (or knowledge-based) intrusion detection approach is that only attack
signatures that are stored in a database are detected. Network-based intrusion detection can either be
signature-based or statistical anomaly-based (also called behavior-based). Source: KRUTZ, Ronald L. &
VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley
& Sons, 2001, Chapter 2: Access control systems (page 49).
QUESTION 135
What refers to legitimate users accessing networked services that would normally be restricted to them?
A. Spoofing
B. Piggybacking
C. Eavesdropping
D. Logon abuse
Correct Answer: D
Explanation
Explanation/Reference:
Unauthorized access of restricted network services by the circumvention of security access controls is
known as logon abuse. This type of abuse refers to users who may be internal to the network but access
resources they would not normally be allowed. Source: KRUTZ, Ronald L. & VINES, Russel D., The
CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter
3: Telecommunications and Network Security (page 74).
QUESTION 136
Which of the following is not a two-factor authentication mechanism?
Correct Answer: D
Explanation
Explanation/Reference:
Something you know and a password fits within only one of the three ways authentication could be done. A
password is an example of something you know, thereby something you know and a password does not
constitute a two-factor authentication as both are in the same category of factors.
A two-factor (strong) authentication relies on two different kinds of authentication factors out of a list of
three possible choice:
something you know (e.g. a PIN or password),
something you have (e.g. a smart card, token, magnetic card), something you are is mostly Biometrics
(e.g. a fingerprint) or something you do (e.g. signature dynamics).
QUESTION 137
Which of the following access control models introduces user security clearance and data classification?
Correct Answer: D
Explanation
Explanation/Reference:
The mandatory access control model is based on a security label system. Users are given a security
clearance and data is classified. The classification is stored in the security labels of the resources.
Classification labels specify the level of trust a user must have to access a certain file. Source: HARRIS,
Shon, All-In-One CISSP Certification Exam Guide, McGraw-Hill/Osborne, 2002, Chapter 4: Access Control
(Page 154).
QUESTION 138
Password management falls into which control category?
A. Compensating
B. Detective
C. Preventive
D. Technical
Correct Answer: C
Explanation
Explanation/Reference:
Password management is an example of preventive control. Proper passwords prevent unauthorized users
from accessing a system. There are literally hundreds of different access approaches, control methods,
and technologies, both in the physical world and in the virtual electronic world. Each method addresses a
different type of access control or a specific access need.
For example, access control solutions may incorporate identification and authentication mechanisms,
filters, rules, rights, logging and monitoring, policy, and a plethora of other controls. However, despite the
diversity of access control methods, all access control systems can be categorized into seven primary
categories.
1 Directive: Controls designed to specify acceptable rules of behavior within an organization 2 Deterrent:
Controls designed to discourage people from violating security directives 3 Preventive: Controls
implemented to prevent a security incident or information breach 4 Compensating: Controls implemented
to substitute for the loss of primary controls and mitigate risk down to an acceptable level
5 Detective: Controls designed to signal a warning when a security control has been breached
Hernandez CISSP, Steven (2012-12-21). Official (ISC)2 Guide to the CISSP CBK, Third Edition ((ISC)2
Press) (Kindle Locations 1156-1176). Auerbach Publications. Kindle Edition.
QUESTION 139
Which of the following access control models requires security clearance for subjects?
Correct Answer: D
Explanation
Explanation/Reference:
With mandatory access control (MAC), the authorization of a subject's access to an object is dependant
upon labels, which indicate the subject's clearance. Identity-based access control is a type of discretionary
access control. A role-based access control is a type of non-discretionary access control.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, John Wiley & Sons, 2001, Chapter 2: Access control systems (page 33).
QUESTION 140
Which of the following would describe a type of biometric error refers to as false rejection rate?
A. Type I error
B. Type II error
C. Type III error
D. CER error
Correct Answer: A
Explanation
Explanation/Reference:
When a biometric system rejects an authorized individual, it is called a Type I error. When a system
accepts impostors who should be rejected (false positive), it is called a Type II error.
The Crossover Error Rate (CER), stated in a percentage, represents the point at which false rejection
(Type I) rate equals the false acceptance (Type II) rate. Type III error is not defined and simply a distracter
in this case. Some people get trick on this one because they are thinking about Authentication Factors
where Biometric is a type III authentication factor.
Beware not to mix authentication factor with biometric errors. The 3 authentication factors are:
QUESTION 141
Which of the following access control models requires defining classification for objects?
Correct Answer: D
Explanation
Explanation/Reference:
With mandatory access control (MAC), the authorization of a subject's access to an object is dependant
upon labels, which indicate the subject's clearance, and classification of objects.
There is only one access control model that makes use of Label, Clearances, and Categories, it is
Mandatory Access Control, none of the other one makes use of those items.
QUESTION 142
In the context of access control, locks, gates, guards are examples of which of the following?
A. Administrative controls
B. Technical controls
C. Physical controls
D. Logical controls
Correct Answer: C
Explanation
Explanation/Reference:
Administrative, technical and physical controls are categories of access control mechanisms. Logical and
Technical controls are synonymous. So both of them could be eliminated as possible choices.
Physical Controls: These are controls to protect the organization's people and physical environment, such
as locks, gates, and guards. Physical controls may be called "operational controls" in some contexts.
Physical security covers a broad spectrum of controls to protect the physical assets (primarily the people)
in an organization. Physical Controls are sometimes referred to as "operational" controls in some risk
management frameworks. These controls range from doors, locks, and windows to environment controls,
construction standards, and guards. Typically, physical security is based on the notion of establishing
security zones or concentric areas within a facility that require increased security as you get closer to the
valuable assets inside the facility. Security zones are the physical representation of the defense-in-depth
principle discussed earlier in this chapter. Typically, security zones are associated with rooms, offices,
floors, or smaller elements, such as a cabinet or storage locker. The design of the physical security
controls within the facility must take into account the protection of the asset as well as the individuals
working in that area.
QUESTION 143
Which of the following statements pertaining to Kerberos is true?
Correct Answer: C
Explanation
Explanation/Reference:
Kerberos is a trusted, credential-based, third-party authentication protocol that was developed at MIT and
that uses symmetric (secret) key cryptography to authenticate clients to other entities on a network for
access to services. It does not use X.509 certificates, which are used in public key cryptography.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, John Wiley & Sons, 2001, Chapter 2: Access control systems (page 40).
QUESTION 144
Which of the following statements pertaining to using Kerberos without any extension is false?
Correct Answer: C
Explanation
Explanation/Reference:
Kerberos is a trusted, credential-based, third-party authentication protocol that uses symmetric (secret) key
cryptography to provide robust authentication to clients accessing services on a network.
Because a client's password is used in the initiation of the Kerberos request for the service protocol,
password guessing can be used to impersonate a client.
1 Introduction
The Kerberos V5 protocol [RFC4120] involves use of a trusted third party known as the Key Distribution
Center (KDC) to negotiate shared session keys between clients and services and provide mutual
authentication between them.
The corner-stones of Kerberos V5 are the Ticket and the Authenticator. A Ticket encapsulates a symmetric
key (the ticket session key) in an envelope (a public message) intended for a specific service. The
contents of the Ticket are encrypted with a symmetric key shared between the service principal and the
issuing KDC. The encrypted part of the Ticket contains the client principal name, among other items. An
Authenticator is a record that can be shown to have been recently generated using the ticket session key
in the associated Ticket. The ticket session key is known by the client who requested the ticket. The
contents of the Authenticator are encrypted with the associated ticket session key. The encrypted part of
an Authenticator contains a timestamp and the client principal name, among other items.
As shown in Figure 1, below, the Kerberos V5 protocol consists of the following message exchanges
between the client and the KDC, and the client and the application service:
The client obtains an "initial" ticket from the Kerberos authentication server (AS), typically a Ticket Granting
Ticket (TGT). The AS-REQ message and the AS-REP message are the request and the reply message,
respectively, between the client and the AS.
The client subsequently uses the TGT to authenticate and request a service ticket for a particular service,
from the Kerberos ticket-granting server (TGS). The TGS-REQ message and the TGS-REP message are
the request and the reply message respectively between the client and the TGS.
- The Client/Server Authentication Protocol (AP) Exchange The client then makes a request with an AP-
REQ message, consisting of a service ticket and an authenticator that certifies the client's possession of
the ticket session key. The server may optionally reply with an AP-REP message. AP exchanges typically
negotiate session-specific symmetric keys.
Usually, the AS and TGS are integrated in a single device also known as the KDC.
+--------------+
+--------->| KDC |
AS-REQ / +-------| |
/ / +--------------+
//^|
/ |AS-REP / |
| | / TGS-REQ + TGS-REP
||//
||//
| | / +---------+
||//
||//
||//
|v/v
++-------+------+ +-----------------+
| Client +------------>| Application |
| | AP-REQ | Server |
| |<------------| |
+---------------+ AP-REP +-----------------+
In the AS exchange, the KDC reply contains the ticket session key, among other items, that is encrypted
using a key (the AS reply key) shared between the client and the KDC. The AS reply key is typically
derived from the client's password for human users. Therefore, for human users, the attack resistance
strength of the Kerberos protocol is no stronger than the strength of their passwords.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, John Wiley & Sons, 2001, Chapter 2: Access control systems (page 40).
And
HARRIS, Shon, All-In-One CISSP Certification Exam Guide, McGraw-Hill/Osborne, 2002, chapter 4:
Access Control (pages 147-151).
and
http://www.ietf.org/rfc/rfc4556txt
QUESTION 145
Which access control model would a lattice-based access control model be an example of?
Correct Answer: A
Explanation
Explanation/Reference:
In a lattice model, there are pairs of elements that have the least upper bound of values and greatest lower
bound of values. In a Mandatory Access Control (MAC) model, users and data owners do not have as
much freedom to determine who can access files.
A lattice is simply an access control tool usually used to implement Mandatory Access Control (MAC) and
it could also be used to implement RBAC but this is not as common. The lattice model can be used for
Integrity level or file permissions as well. The lattice has a least upper bound and greatest lower bound. It
makes use of pair of elements such as the subject security clearance pairing with the object sensitivity
label.
Let's get into Discretionary Access Control: It is an access control method where the owner (read the
creator of the object) will decide who has access at his own discretion. As we all know, users are
sometimes insane. They will share their files with other users based on their identity but nothing prevent
the user from further sharing it with other users on the network. Very quickly you loose control on the flow
of information and who has access to what. It is used in small and friendly environment where a low level
of security is all that is required.
Mandatory Access control (MAC) (Implemented using the lattice) You must remember that MAC makes
use of Security Clearance for the subject and also Labels will be assigned to the objects. The clearance of
the Subject must dominate (be equal or higher) the clearance of the Object being accessed. The label
attached to the object will indicate the sensitivity leval and the categories the object belongs to. The
categories are used to implement the Need to Know.
The official ISC2 book says that RBAC (synonymous with Non Discretionary Access Control) is a form of
DAC but they are simply wrong. RBAC is a form of Non Discretionary Access Control. Non Discretionary
DOES NOT equal mandatory access control as there is no labels and clearance involved.
I hope this clarifies the whole drama related to what is what in the world of access control.
In the same line of taught, you should be familiar with the difference between Explicit permission (the user
has his own profile) versus Implicit (the user inherit permissions by being a member of a role for example).
Discretionary access control. Is incorrect because in a Discretionary Access Control (DAC) model, access
is restricted based on the authorization granted to the users. It is identity based access control only. It does
not make use of a lattice.
Non-discretionary access control. Is incorrect because Non-discretionary Access Control (NDAC) uses the
role-based access control method to determine access rights and permissions. It is often times used as a
synonym to RBAC which is Role Based Access Control. The user inherit permission from the role when
they are assigned into the role. This type of access could make use of a lattice but could also be
implemented without the use of a lattice in some case. Mandatory Access Control was a better choice than
this one, but RBAC could also make use of a lattice. The BEST answer was MAC.
References:
AIOv3 Access Control (pages 161 - 168)
AIOv3 Security Models and Architecture (pages 291 - 293)
QUESTION 146
Which of the following is an example of discretionary access control?
Explanation/Reference:
An identity-based access control is an example of discretionary access control that is based on an
individual's identity. Identity-based access control (IBAC) is access control based on the identity of the user
(typically relayed as a characteristic of the process acting on behalf of that user) where access
authorizations to specific objects are assigned based on user identity.
Rule Based Access Control (RuBAC) and Role Based Access Control (RBAC) are examples of non-
discretionary access controls.
Rule-based access control is a type of non-discretionary access control because this access is determined
by rules and the subject does not decide what those rules will be, the rules are uniformly applied to ALL of
the users or subjects.
In general, all access control policies other than DAC are grouped in the category of non- discretionary
access control (NDAC). As the name implies, policies in this category have rules that are not established at
the discretion of the user. Non-discretionary policies establish controls that cannot be changed by users,
but only through administrative action. Both Role Based Access Control (RBAC) and Rule Based Access
Control (RuBAC) fall within Non Discretionary Access Control (NDAC). If it is not DAC or MAC then it is
most likely NDAC.
Under a mandatory access control environment, the system or security administrator will define what
permissions subjects have on objects. The administrator does not dictate user's access but simply
configure the proper level of access as dictated by the Data Owner. The MAC system will look at the
Security Clearance of the subject and compare it with the object sensitivity level or classification level. This
is what is called the dominance relationship. The subject must DOMINATE the object sensitivity level.
Which means that the subject must have a security clearance equal or higher than the object he is
attempting to access. MAC also introduce the concept of labels. Every objects will have a label attached to
them indicating the classification of the object as well as categories that are used to impose the need to
know (NTK) principle. Even thou a user has a security clearance of Secret it does not mean he would be
able to access any Secret documents within the system. He would be allowed to access only Secret
document for which he has a Need To Know, formal approval, and object where the user belong to one of
the categories attached to the object.
Many of the other models can mimic MAC but none of them have labels and a dominance relationship so
they are NOT in the MAC category.
The owner of an object is define as the person who created the object. As such the owner has the
discretion to grant access to other users on the network. Access will be granted based solely on the
identity of those users.
Such system is good for low level of security. One of the major problem is the fact that a user who has
access to someone's else file can further share the file with other users without the knowledge or
permission of the owner of the file. Very quickly this could become the wild wild west as there is no control
on the dissimination of the information.
Role Based access control usually maps directly with the different types of jobs performed by employees
within a company.
For example there might be 5 security administrator within your company. Instead of creating each of their
profile one by one, you would simply create a role and assign the administrators to the role. Once an
administrator has been assigned to a role, he will IMPLICITLY inherit the permissions of that role.
RBAC is great tool for environment where there is a a large rotation of employees on a daily basis such as
a very large help desk for example.
A good example of a Rule Based access control device would be a Firewall. A single set of rules is
imposed to all users attempting to connect through the firewall.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 33
and
NISTIR-7316 at http://csrc.nist.gov/publications/nistir/7316/NISTIR-7316pdf and
http://itlaw.wikia.com/wiki/Identity-based_access_control
QUESTION 147
Which of the following would be used to implement Mandatory Access Control (MAC)?
Correct Answer: C
Explanation
Explanation/Reference:
The lattice is a mechanism use to implement Mandatory Access Control (MAC)
The Lattice Based Access Control is a type of access control used to implement other access control
method. A lattice is an ordered list of elements that has a least upper bound and a most lower bound. The
lattice can be used for MAC, DAC, Integrity level, File Permission, and more
For example in the case of MAC, if we look at common government classifications, we have the following:
TOP SECRET
SECRET -----------------------I am the user at secret
CONFIDENTIAL
SENSITIVE BUT UNCLASSIFIED
UNCLASSIFIED
If you look at the diagram above where I am a user at SECRET it means that I can access document at
lower classification but not document at TOP SECRET. The lattice is a list of ORDERED ELEMENT, in this
case the ordered elements are classification levels. My least upper bound is SECRET and my most lower
bound is UNCLASSIFIED.
However the lattice could also be used for Integrity Levels such as:
VERY HIGH
HIGH
MEDIUM ----------I am a user, process, application at the medium level LOW
VERY LOW
In the case of Integrity levels you have to think about TRUST. Of course if I take for example the VISTA
operating system which is based on Biba then Integrity Levels would be used. As a user having access to
the system I cannot tell a process running with administrative privilege what to do. Else any users on the
system could take control of the system by getting highly privilege process to do things on their behalf. So
no read down would be allowed in this case and this is an example of the Biba model.
Last but not least the lattice could be use for file permissions:
RWX
RW ---------User at this level
R
If I am a user with READ and WRITE (RW) access privilege then I cannot execute the file because I do not
have execute permission which is the X under Linux and UNIX. Many people confuse the Lattice Model
and many books says MAC = LATTICE, however the lattice can be use for other purposes.
There is also Role Based Access Control (RBAC) that exists out there. It COULD be used to simulate MAC
but it is not MAC as it does not make use of Label on objects indicating sensitivity and categories. MAC
also require a clearance that dominates the object.
Also note that many book uses the same acronym for Role Based Access Control and Rule Based Access
Control which is RBAC, this can be confusing.
The proper way of writing the acronym for Rule Based Access Control is RuBAC, unfortunately it is not
commonly used.
References:
There is a great article on technet that talks about the lattice in VISTA:
http://blogs.technet.com/b/steriley/archive/2006/07/21/442870aspx
also see:
KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer
Security, John Wiley & Sons, 2001, Chapter 2: Access control systems (page 33).
and
http://www.microsoft-watch.com/content/vista/gaging_vistas_integrity.html
QUESTION 148
What does the Clark-Wilson security model focus on?
A. Confidentiality
B. Integrity
C. Accountability
D. Availability
Correct Answer: B
Explanation
Explanation/Reference:
The Clark-Wilson model addresses integrity. It incorporates mechanisms to enforce internal and external
consistency, a separation of duty, and a mandatory integrity policy. Source: KRUTZ, Ronald L. & VINES,
Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons,
2001, Chapter 5: Security Architectures and Models (page 205).
QUESTION 149
What does the simple security (ss) property mean in the Bell-LaPadula model?
A. No read up
B. No write down
C. No read down
D. No write up
Correct Answer: A
Explanation
Explanation/Reference:
The ss (simple security) property of the Bell-LaPadula access control model states that reading of
information by a subject at a lower sensitivity level from an object at a higher sensitivity level is not
permitted (no read up).
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, John Wiley & Sons, 2001, Chapter 5: Security Architectures and Models (page 202).
QUESTION 150
What does the * (star) property mean in the Bell-LaPadula model?
A. No write up
B. No read up
C. No write down
D. No read down
Correct Answer: C
Explanation
Explanation/Reference:
The *- (star) property of the Bell-LaPadula access control model states that writing of information by a
subject at a higher level of sensitivity to an object at a lower level of sensitivity is not permitted (no write
down).
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, John Wiley & Sons, 2001, Chapter 5: Security Architectures and Models (page 202).
Also check out: HARRIS, Shon, All-In-One CISSP Certification Exam Guide, McGraw- Hill/Osborne, 2002,
Chapter 5: Security Models and Architecture (page 242, 243).
QUESTION 151
What does the * (star) integrity axiom mean in the Biba model?
A. No read up
B. No write down
C. No read down
D. No write up
Correct Answer: D
Explanation
Explanation/Reference:
The *- (star) integrity axiom of the Biba access control model states that an object at one level of integrity is
not permitted to modify an object of a higher level of integrity (no write up).
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, John Wiley & Sons, 2001, Chapter 5: Security Architectures and Models (page 205).
QUESTION 152
What is the Biba security model concerned with?
A. Confidentiality
B. Reliability
C. Availability
D. Integrity
Correct Answer: D
Explanation
Explanation/Reference:
The Biba security model addresses the integrity of data being threatened when subjects at lower security
levels are able to write to objects at higher security levels and when subjects can read data at lower levels.
Source: HARRIS, Shon, All-In-One CISSP Certification Exam Guide, McGraw-Hill/Osborne, 2002, Chapter
5: Security Models and Architecture (Page 244).
QUESTION 153
Which security model uses division of operations into different parts and requires different users to perform
each part?
A. Bell-LaPadula model
B. Biba model
C. Clark-Wilson model
D. Non-interference model
Correct Answer: C
Explanation
Explanation/Reference:
The Clark-Wilson model uses separation of duties, which divides an operation into different parts and
requires different users to perform each part. This prevents authorized users from making unauthorized
modifications to data, thereby protecting its integrity.
The Clark-Wilson integrity model provides a foundation for specifying and analyzing an integrity policy for a
computing system.
The model is primarily concerned with formalizing the notion of information integrity. Information integrity is
maintained by preventing corruption of data items in a system due to either error or malicious intent. An
integrity policy describes how the data items in the system should be kept valid from one state of the
system to the next and specifies the capabilities of various principals in the system. The model defines
enforcement rules and certification rules. The model's enforcement and certification rules define data items
and processes that provide the basis for an integrity policy. The core of the model is based on the notion of
a transaction.
A well-formed transaction is a series of operations that transition a system from one consistent state to
another consistent state.
In this model the integrity policy addresses the integrity of the transactions. The principle of separation of
duty requires that the certifier of a transaction and the implementer be different entities.
The model contains a number of basic constructs that represent both data items and processes that
operate on those data items. The key data type in the Clark-Wilson model is a Constrained Data Item
(CDI). An Integrity Verification Procedure (IVP) ensures that all CDIs in the system are valid at a certain
state. Transactions that enforce the integrity policy are represented by Transformation Procedures (TPs). A
TP takes as input a CDI or Unconstrained Data Item (UDI) and produces a CDI. A TP must transition the
system from one valid state to another valid state. UDIs represent system input (such as that provided by a
user or adversary). A TP must guarantee (via certification) that it transforms all possible values of a UDI to
a "safe" CDI.
Clark-Wilson addresses all three rules but BIBA addresses only the first rule of intergrity.
References:
QUESTION 154
Which type of control is concerned with avoiding occurrences of risks?
A. Deterrent controls
B. Detective controls
C. Preventive controls
D. Compensating controls
Correct Answer: C
Explanation
Explanation/Reference:
Preventive controls are concerned with avoiding occurrences of risks while deterrent controls are
concerned with discouraging violations. Detecting controls identify occurrences and compensating controls
are alternative controls, used to compensate weaknesses in other controls.
Supervision is an example of compensating control.
Source: TIPTON, Hal, (ISC)2, Introduction to the CISSP Exam presentation.
QUESTION 155
Which type of control is concerned with restoring controls?
A. Compensating controls
B. Corrective controls
C. Detective controls
D. Preventive controls
Correct Answer: B
Explanation
Explanation/Reference:
Corrective controls are concerned with remedying circumstances and restoring controls. Detective controls
are concerned with investigating what happen after the fact such as logs and video surveillance tapes for
example.
Compensating controls are alternative controls, used to compensate weaknesses in other controls.
Preventive controls are concerned with avoiding occurrences of risks. Source: TIPTON, Hal, (ISC)2,
Introduction to the CISSP Exam presentation.
QUESTION 156
Which of the following biometric parameters are better suited for authentication use over a long period of
time?
A. Iris pattern
B. Voice pattern
C. Signature dynamics
D. Retina pattern
Correct Answer: A
Explanation
Explanation/Reference:
The iris pattern is considered lifelong. Unique features of the iris are: freckles, rings, rifts, pits, striations,
fibers, filaments, furrows, vasculature and coronas. Voice, signature and retina patterns are more likely to
change over time, thus are not as suitable for authentication over a long period of time without needing re-
enrollment.
Source: FERREL, Robert G, Questions and Answers for the CISSP Exam, domain 1 (derived from the
Information Security Management Handbook, 4th Ed., by Tipton & Krause).
QUESTION 157
Which of the following is required in order to provide accountability?
A. Authentication
B. Integrity
C. Confidentiality
D. Audit trails
Correct Answer: D
Explanation
Explanation/Reference:
Accountability can actually be seen in two different ways:
1) Although audit trails are also needed for accountability, no user can be accountable for their actions
unless properly authenticated.
2) Accountability is another facet of access control. Individuals on a system are responsible for their
actions. This accountability property enables system activities to be traced to the proper individuals.
Accountability is supported by audit trails that record events on the system and network. Audit trails can be
used for intrusion detection and for the reconstruction of past events. Monitoring individual activities, such
as keystroke monitoring, should be accomplished in accordance with the company policy and appropriate
laws. Banners at the log-on time should notify the user of any monitoring that is being conducted. The point
is that unless you employ an appropriate auditing mechanism, you don't have accountability. Authorization
only gives a user certain permissions on the network. Accountability is far more complex because it also
includes intrusion detection, unauthorized actions by both unauthorized users and authorized users, and
system faults. The audit trail provides the proof that unauthorized modifications by both authorized and
unauthorized users took place. No proof, No accountability.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, John Wiley & Sons, 2001, Page 50
The Shon Harris AIO book, 4th Edition, on Page 243 also states:
Auditing Capabilities ensures users are accountable for their actions, verify that the secutiy policies are
enforced,
and can be used as investigation tools. Accountability is tracked by recording user, system, and application
activities.
This recording is done through auditing functions and mechanisms within an operating sytem or
application.
Audit trail contain information about operating System activities, application events, and user actions.
QUESTION 158
Which of the following access control techniques best gives the security officers the ability to specify and
enforce enterprise-specific security policies in a way that maps naturally to an organization's structure?
Correct Answer: C
Explanation
Explanation/Reference:
Role-based access control (RBAC) gives the security officers the ability to specify and enforce enterprise-
specific security policies in a way that maps naturally to an organization's structure. Each user is assigned
one or more roles, and each role is assigned one or more privileges that are given to users in that role. An
access control list (ACL) is a table that tells a system which access rights each user has to a particular
system object. With discretionary access control, administration is decentralized and owners of resources
control other users' access. Non- mandatory access control is not a defined access control technique.
Source: ANDRESS, Mandy, Exam Cram CISSP, Coriolis, 2001, Chapter 2: Access Control Systems and
Methodology (page 9).
QUESTION 159
Which access control model was proposed for enforcing access control in government and military
applications?
A. Bell-LaPadula model
B. Biba model
C. Sutherland model
D. Brewer-Nash model
Correct Answer: A
Explanation
Explanation/Reference:
The Bell-LaPadula model, mostly concerned with confidentiality, was proposed for enforcing access
control in government and military applications. It supports mandatory access control by determining the
access rights from the security levels associated with subjects and objects. It also supports discretionary
access control by checking access rights from an access matrix. The Biba model, introduced in 1977, the
Sutherland model, published in 1986, and the Brewer-Nash model, published in 1989, are concerned with
integrity. Source: ANDRESS, Mandy, Exam Cram CISSP, Coriolis, 2001, Chapter 2: Access Control
Systems and Methodology (page 11).
QUESTION 160
Which access control model achieves data integrity through well-formed transactions and separation of
duties?
A. Clark-Wilson model
B. Biba model
C. Non-interference model
D. Sutherland model
Correct Answer: A
Explanation
Explanation/Reference:
The Clark-Wilson model differs from other models that are subject- and object- oriented by introducing a
third access element programs resulting in what is called an access triple, which prevents unauthorized
users from modifying data or programs. The Biba model uses objects and subjects and addresses integrity
based on a hierarchical lattice of integrity levels. The non- interference model is related to the information
flow model with restrictions on the information flow. The Sutherland model approaches integrity by focusing
on the problem of inference. Source: ANDRESS, Mandy, Exam Cram CISSP, Coriolis, 2001, Chapter 2:
Access Control Systems and Methodology (page 12).
And: KRAUSE, Micki & TIPTON, Harold F., Handbook of Information Security Management, CRC Press,
1997, Domain 1: Access Control.
QUESTION 161
This is a common security issue that is extremely hard to control in large environments. It occurs when a
user has more computer rights, permissions, and access than what is required for the tasks the user needs
to fulfill. What best describes this scenario?
A. Excessive Rights
B. Excessive Access
C. Excessive Permissions
D. Excessive Privileges
Correct Answer: D
Explanation
Explanation/Reference:
Even thou all 4 terms are very close to each other, the best choice is Excessive Privileges which would
include the other three choices presented.
QUESTION 162
Which of the following are additional access control objectives?
Correct Answer: B
Explanation
Explanation/Reference:
Availability assures that a system's authorized users have timely and uninterrupted access to the
information in the system. The additional access control objectives are reliability and utility. These and
other related objectives flow from the organizational security policy. This policy is a high-level statement of
management intent regarding the control of access to information and the personnel who are authorized to
receive that information. Three things that must be considered for the planning and implementation of
access control mechanisms are the threats to the system, the system's vulnerability to these threats, and
the risk that the threat may materialize
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 32
QUESTION 163
Controls are implemented to:
Correct Answer: C
Explanation
Explanation/Reference:
Controls are implemented to mitigate risk and reduce the potential for loss. Preventive controls are put in
place to inhibit harmful occurrences; detective controls are established to discover harmful occurrences;
corrective controls are used to restore systems that are victims of harmful attacks.
It is not feasible and possible to eliminate all risks and the potential for loss as risk/threats are constantly
changing.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 32
QUESTION 164
Logical or technical controls involve the restriction of access to systems and the protection of information.
Which of the following statements pertaining to these types of controls is correct?
A. Examples of these types of controls include policies and procedures, security awareness training,
background checks, work habit checks but do not include a review of vacation history, and also do not
include increased supervision.
B. Examples of these types of controls do not include encryption, smart cards, access lists, and
transmission protocols.
C. Examples of these types of controls are encryption, smart cards, access lists, and transmission
protocols.
D. Examples of these types of controls include policies and procedures, security awareness training,
background checks, work habit checks, a review of vacation history, and increased supervision.
Correct Answer: C
Explanation
Explanation/Reference:
Logical or technical controls involve the restriction of access to systems and the protection of information.
Examples of these types of controls are encryption, smart cards, access lists, and transmission protocols.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 33
QUESTION 165
Controls provide accountability for individuals who are accessing sensitive information. This accountability
is accomplished:
A. through access control mechanisms that require identification and authentication and through the audit
function.
B. through logical or technical controls involving the restriction of access to systems and the protection of
information.
C. through logical or technical controls but not involving the restriction of access to systems and the
protection of information.
D. through access control mechanisms that do not require identification and authentication and do not
operate through the audit function.
Correct Answer: A
Explanation
Explanation/Reference:
Controls provide accountability for individuals who are accessing sensitive information. This accountability
is accomplished through access control mechanisms that require identification and authentication and
through the audit function. These controls must be in accordance with and accurately represent the
organization's security policy. Assurance procedures ensure that the control mechanisms correctly
implement the security policy for the entire life cycle of an information system.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 33
QUESTION 166
In non-discretionary access control using Role Based Access Control (RBAC), a central authority
determines what subjects can have access to certain objects based on the organizational security policy.
The access controls may be based on:
Correct Answer: B
Explanation
Explanation/Reference:
In Non-Discretionary Access Control, when Role Based Access Control is being used, a central authority
determines what subjects can have access to certain objects based on the organizational security policy.
The access controls may be based on the individual's role in the organization.
QUESTION 167
In an organization where there are frequent personnel changes, non-discretionary access control using
Role Based Access Control (RBAC) is useful because:
Correct Answer: B
Explanation
Explanation/Reference:
In an organization where there are frequent personnel changes, non-discretionary access control (also
called Role Based Access Control) is useful because the access controls are based on the individual's role
or title within the organization. You can easily configure a new employee acces by assigning the user to a
role that has been predefine. The user will implicitly inherit the permissions of the role by being a member
of that role. These access permissions defined within the role do not need to be changed whenever a new
person takes over the role.
Another type of non-discretionary access control model is the Rule Based Access Control (RBAC or
RuBAC) where a global set of rule is uniformly applied to all subjects accessing the resources. A good
example of RuBAC would be a firewall. This question is a sneaky one, one of the choice has only one
added word to it which is often. Reading questions and their choices very carefully is a must for the real
exam. Reading it twice if needed is recommended.
Shon Harris in her book list the following ways of managing RBAC:
Role-based access control can be managed in the following ways:
Non-RBAC Users are mapped directly to applications and no roles are used. (No roles being used)
Limited RBAC Users are mapped to multiple roles and mapped directly to other types of applications
that do not have role-based access functionality. (A mix of roles for applications that supports roles and
explicit access control would be used for applications that do not support roles)
Hybrid RBAC Users are mapped to multiapplication roles with only selected rights assigned to those
roles.
Full RBAC Users are mapped to enterprise roles. (Roles are used for all access being granted)
Security administration can be costly and prone to error because administrators usually specify access
control lists for each user on the system individually. With RBAC, security is managed at a level that
corresponds closely to the organization's structure. Each user is assigned one or more roles, and each
role is assigned one or more privileges that are permitted to users in that role. Security administration with
RBAC consists of determining the operations that must be executed by persons in particular jobs, and
assigning employees to the proper roles. Complexities introduced by mutually exclusive roles or role
hierarchies are handled by the RBAC software, making security administration easier.
KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer
Security, 2001, John Wiley & Sons, Page 32
and
Harris, Shon (2012-10-25). CISSP All-in-One Exam Guide, 6th Edition McGraw-Hill.
and
http://csrc.nist.gov/groups/SNS/rbac/
QUESTION 168
Another type of access control is lattice-based access control. In this type of control a lattice model is
applied. How is this type of access control concept applied?
A. The pair of elements is the subject and object, and the subject has an upper bound equal or higher
than the upper bound of the object being accessed.
B. The pair of elements is the subject and object, and the subject has an upper bound lower then the
upper bound of the object being accessed.
C. The pair of elements is the subject and object, and the subject has no special upper or lower bound
needed within the lattice.
D. The pair of elements is the subject and object, and the subject has no access rights in relation to an
object.
Correct Answer: A
Explanation
Explanation/Reference:
In this type of control, a lattice model is applied.
To apply this concept to access control, the pair of elements is the subject and object, and the subject has
to have an upper bound equal or higher than the object being accessed.
In computer security, lattice-based access control (LBAC) is a complex access control based on the
interaction between any combination of objects (such as resources, computers, and applications) and
subjects (such as individuals, groups or organizations). In this type of label-based mandatory access
control model, a lattice is used to define the levels of security that an object may have and that a subject
may have access to. The subject is only allowed to access an object if the security level of the subject is
greater than or equal to that of the object.
QUESTION 169
Detective/Technical measures:
A. include intrusion detection systems and automatically-generated violation reports from audit trail
information.
B. do not include intrusion detection systems and automatically-generated violation reports from audit trail
information.
C. include intrusion detection systems but do not include automatically-generated violation reports from
audit trail information.
D. include intrusion detection systems and customised-generated violation reports from audit trail
information.
Correct Answer: A
Explanation
Explanation/Reference:
Detective/Technical measures include intrusion detection systems and automatically-generated violation
reports from audit trail information. These reports can indicate variations from "normal" operation or detect
known signatures of unauthorized access episodes. In order to limit the amount of audit information
flagged and reported by automated violation analysis and reporting mechanisms, clipping levels can be
set.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 35
QUESTION 170
Passwords can be required to change monthly, quarterly, or at other intervals:
Correct Answer: B
Explanation
Explanation/Reference:
Passwords can be compromised and must be protected. In the ideal case, a password should only be
used once. The changing of passwords can also fall between these two extremes. Passwords can be
required to change monthly, quarterly, or at other intervals, depending on the criticality of the information
needing protection and the password's frequency of use. Obviously, the more times a password is used,
the more chance there is of it being compromised. Source: KRUTZ, Ronald L. & VINES, Russel D., The
CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 36
& 37
QUESTION 171
When submitting a passphrase for authentication, the passphrase is converted into ...
Correct Answer: A
Explanation
Explanation/Reference:
Passwords can be compromised and must be protected. In the ideal case, a password should only be
used once. The changing of passwords can also fall between these two extremes. Passwords can be
required to change monthly, quarterly, or at other intervals, depending on the criticality of the information
needing protection and the password's frequency of use. Obviously, the more times a password is used,
the more chance there is of it being compromised. It is recommended to use a passphrase instead of a
password. A passphrase is more resistant to attacks. The passphrase is converted into a virtual password
by the system. Often time the passphrase will exceed the maximum length supported by the system and it
must be trucated into a Virtual Password.
QUESTION 172
In the context of Biometric authentication, what is a quick way to compare the accuracy of devices. In
general, the device that have the lowest value would be the most accurate. Which of the following would
be used to compare accuracy of devices?
Correct Answer: A
Explanation
Explanation/Reference:
equal error rate or crossover error rate (EER or CER): the rate at which both accept and reject errors are
equal. The value of the EER can be easily obtained from the ROC curve. The EER is a quick way to
compare the accuracy of devices with different ROC curves. In general, the device with the lowest EER is
most accurate.
In the context of Biometric Authentication almost all types of detection permit a system's sensitivity to be
increased or decreased during an inspection process. If the system's sensitivity is increased, such as in an
airport metal detector, the system becomes increasingly selective and has a higher False Reject Rate
(FRR).
Conversely, if the sensitivity is decreased, the False Acceptance Rate (FAR) will increase. Thus, to have a
valid measure of the system performance, the CrossOver Error Rate (CER) is used.
false accept rate or false match rate (FAR or FMR): the probability that the system incorrectly matches the
input pattern to a non-matching template in the database. It measures the percent of invalid inputs which
are incorrectly accepted. In case of similarity scale, if the person is imposter in real, but the matching score
is higher than the threshold, then he is treated as genuine that increase the FAR and hence performance
also depends upon the selection of threshold value. false reject rate or false non-match rate (FRR or
FNMR): the probability that the system fails to detect a match between the input pattern and a matching
template in the database. It measures the percent of valid inputs which are incorrectly rejected.
failure to enroll rate (FTE or FER): the rate at which attempts to create a template from an input is
unsuccessful. This is most commonly caused by low quality inputs. failure to capture rate (FTC): Within
automatic systems, the probability that the system fails to detect a biometric input when presented
correctly.
template capacity: the maximum number of sets of data which can be stored in the system.
Reference(s) used for this question:
KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer
Security, 2001, John Wiley & Sons, Page 37
and
Wikipedia at: https://en.wikipedia.org/wiki/Biometrics
QUESTION 173
The throughput rate is the rate at which individuals, once enrolled, can be processed and identified or
authenticated by a biometric system. Acceptable throughput rates are in the range
of:
Correct Answer: C
Explanation
Explanation/Reference:
The throughput rate is the rate at which individuals, once enrolled, can be processed and identified or
authenticated by a biometric system.
Acceptable throughput rates are in the range of 10 subjects per minute. Things that may impact the
throughput rate for some types of biometric systems may include:
A concern with retina scanning systems may be the exchange of body fluids on the eyepiece. Another
concern would be the retinal pattern that could reveal changes in a person's health, such as diabetes or
high blood pressure.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 38
QUESTION 174
Which of the following biometric devices has the lowest user acceptance level?
A. Retina Scan
B. Fingerprint scan
C. Hand geometry
D. Signature recognition
Correct Answer: A
Explanation
Explanation/Reference:
According to the cited reference, of the given options, the Retina scan has the lowest user acceptance
level as it is needed for the user to get his eye close to a device and it is not user friendly and very
intrusive.
However, retina scan is the most precise with about one error per 10 millions usage. Look at the 2 tables
below. If necessary right click on the image and save it on your desktop for a larger view or visit the web
site directly at
https://sites.google.com/site/biometricsecuritysolutions/crossover-accuracy .
QUESTION 175
Which of the following would be an example of the best password?
A. golf001
B. Elizabeth
C. T1me4g0lF
D. password
Correct Answer: C
Explanation
Explanation/Reference:
The best passwords are those that are both easy to remember and hard to crack using a dictionary attack.
The best way to create passwords that fulfil both criteria is to use two small unrelated words or phonemes,
ideally with upper and lower case characters, a special character, and/or a number. Shouldn't be used:
common names, DOB, spouse, phone numbers, words found in dictionaries or system defaults.
Source: ROTHKE, Ben, CISSP CBK Review presentation on domain 1
QUESTION 176
Which of the following tools is less likely to be used by a hacker?
A. l0phtcrack
B. Tripwire
C. OphCrack
D. John the Ripper
Correct Answer: B
Explanation
Explanation/Reference:
Tripwire is an integrity checking product, triggering alarms when important files (e.g. system or
configuration files) are modified.
This is a tool that is not likely to be used by hackers, other than for studying its workings in order to
circumvent it.
Other programs are password-cracking programs and are likely to be used by security administrators as
well as by hackers. More info regarding Tripwire available on the Tripwire, Inc. Web Site.
NOTE:
The biggest competitor to the commercial version of Tripwire is the freeware version of Tripwire. You can
get the Open Source version of Tripwire at the following URL:
http://sourceforge.net/projects/tripwire/
QUESTION 177
What is an error called that causes a system to be vulnerable because of the environment in which it is
installed?
A. Configuration error
B. Environmental error
C. Access validation error
D. Exceptional condition handling error
Correct Answer: B
Explanation
Explanation/Reference:
In an environmental error, the environment in which a system is installed somehow causes the system to
be vulnerable. This may be due, for example, to an unexpected interaction between an application and the
operating system or between two applications on the same host. A configuration error occurs when user
controllable settings in a system are set such that the system is vulnerable. In an access validation error,
the system is vulnerable because the access control mechanism is faulty. In an exceptional condition
handling error, the system somehow becomes vulnerable due to an exceptional condition that has arisen.
Source: DUPUIS, Clement, Access Control Systems and Methodology CISSP Open Study Guide, version
10, march 2002 (page 106).
QUESTION 178
A network-based vulnerability assessment is a type of test also referred to as:
Correct Answer: A
Explanation
Explanation/Reference:
A network-based vulnerability assessment tool/system either re-enacts system attacks, noting and
recording responses to the attacks, or probes different targets to infer weaknesses from their responses.
Since the assessment is actively attacking or scanning targeted systems, network-based vulnerability
assessment systems are also called active vulnerability systems.
ACTIVE: You do send packets to your target, you attempt to stimulate response which will help you in
gathering information about hosts that are alive, services runnings, port state, and more.
IMPORTANT NOTE:
On the commercial vendors will sometimes use different names for different types of scans. However, the
exam is product agnostic. They do not use vendor terms but general terms. Experience could trick you into
selecting the wrong choice sometimes. See feedback from Jason below:
"I am a system security analyst. It is my daily duty to perform system vulnerability analysis. We use Nessus
and Retina (among other tools) to perform our network based vulnerability scanning. Both commercially
available tools refer to a network based vulnerability scan as a "credentialed" scan. Without credentials,
the scan tool cannot login to the system being scanned, and as such will only receive a port scan to see
what ports are open and exploitable"
QUESTION 179
Why would anomaly detection IDSs often generate a large number of false positives?
A. Because they can only identify correctly attacks they already know about.
B. Because they are application-based are more subject to attacks.
C. Because they can't identify abnormal behavior.
D. Because normal patterns of user and system behavior can vary wildly.
Correct Answer: D
Explanation
Explanation/Reference:
Unfortunately, anomaly detectors and the Intrusion Detection Systems (IDS) based on them often produce
a large number of false alarms, as normal patterns of user and system behavior can vary wildly. Being only
able to identify correctly attacks they already know about is a characteristic of misuse detection (signature-
based) IDSs. Application-based IDSs are a special subset of host- based IDSs that analyze the events
transpiring within a software application. They are more vulnerable to attacks than host-based IDSs. Not
being able to identify abnormal behavior would not cause false positives, since they are not identified.
Source: DUPUIS, Cl?ment, Access Control Systems and Methodology CISSP Open Study Guide, version
10, march 2002 (page 92).
QUESTION 180
Ensuring least privilege does not require:
Correct Answer: B
Explanation
Explanation/Reference:
Ensuring that the user alone does not have sufficient rights to subvert an important process is a concern of
the separation of duties principle and it does not concern the least privilege principle. Source: DUPUIS,
Clément, Access Control Systems and Methodology CISSP Open Study Guide, version 10, march 2002
(page 33).
QUESTION 181
Which of the following is NOT a form of detective technical control?
A. Audit trails
B. Access control software
C. Honeypot
D. Intrusion detection system
Correct Answer: B
Explanation
Explanation/Reference:
Detective technical controls warn of technical access control violations. Access control software is a rather
an example of a preventive technical control. Other choices represent detective technical controls.
Source: DUPUIS, Cl?ment, Access Control Systems and Methodology CISSP Open Study Guide, version
10 (march 2002).
QUESTION 182
Which of the following does not apply to system-generated passwords?
Correct Answer: C
Explanation
Explanation/Reference:
Users tend to choose easier to remember passwords. System-generated passwords can provide stronger,
harder to guess passwords. Since they are based on rules provided by the administrator, they can include
combinations of uppercase/lowercase letters, numbers and special characters, making them less
vulnerable to brute force and dictionary attacks. One danger is that they are also harder to remember for
users, who will tend to write them down, making them more vulnerable to anyone having access to the
user's desk. Another danger with system-generated passwords is that if the password-generating algorithm
gets to be known, the entire system is in jeopardy.
Source: RUSSEL, Deborah & GANGEMI, G.T. Sr., Computer Security Basics, O'Reilly, July 1992 (page
64).
QUESTION 183
Which of the following is not a preventive login control?
Correct Answer: A
Explanation
Explanation/Reference:
The last login message displays the last login date and time, allowing a user to discover if their account
was used by someone else. Hence, this is rather a detective control. Source: RUSSEL, Deborah &
GANGEMI, G.T. Sr., Computer Security Basics, O'Reilly, July 1992 (page 63).
QUESTION 184
What is the most critical characteristic of a biometric identifying system?
A. Perceived intrusiveness
B. Storage requirements
C. Accuracy
D. Scalability
Correct Answer: C
Explanation
Explanation/Reference:
Accuracy is the most critical characteristic of a biometric identifying verification system. Accuracy is
measured in terms of false rejection rate (FRR, or type I errors) and false acceptance rate (FAR or type II
errors).
The Crossover Error Rate (CER) is the point at which the FRR equals the FAR and has become the most
important measure of biometric system accuracy. Source: TIPTON, Harold F. & KRAUSE, Micki,
Information Security Management Handbook, 4th edition (volume 1), 2000, CRC Press, Chapter 1,
Biometric Identification (page 9).
QUESTION 185
What is considered the most important type of error to avoid for a biometric access control system?
A. Type I Error
B. Type II Error
C. Combined Error Rate
D. Crossover Error Rate
Correct Answer: B
Explanation
Explanation/Reference:
When a biometric system is used for access control, the most important error is the false accept or false
acceptance rate, or Type II error, where the system would accept an impostor. A Type I error is known as
the false reject or false rejection rate and is not as important in the security context as a type II error rate. A
type one is when a valid company employee is rejected by the system and he cannot get access even thou
it is a valid user. The Crossover Error Rate (CER) is the point at which the false rejection rate equals the
false acceptance rate if your would create a graph of Type I and Type II errors. The lower the CER the
better the device would be.
The Combined Error Rate is a distracter and does not exist.
Source: TIPTON, Harold F. & KRAUSE, Micki, Information Security Management Handbook, 4th edition
(volume 1), 2000, CRC Press, Chapter 1, Biometric Identification (page 10).
QUESTION 186
How can an individual/person best be identified or authenticated to prevent local masquerading attacks?
Correct Answer: D
Explanation
Explanation/Reference:
The only way to be truly positive in authenticating identity for access is to base the authentication on the
physical attributes of the persons themselves (i.e., biometric identification). Physical attributes cannot be
shared, borrowed, or duplicated. They ensure that you do identify the person, however they are not perfect
and they would have to be supplemented by another factor.
Some people are getting thrown off by the term Masquarade. In general, a masquerade is a disguise. In
terms of communications security issues, a masquerade is a type of attack where the attacker pretends to
be an authorized user of a system in order to gain access to it or to gain greater privileges than they are
authorized for. A masquerade may be attempted through the use of stolen logon IDs and passwords,
through finding security gaps in programs, or through bypassing the authentication mechanism. Spoofing
is another term used to describe this type of attack as well.
A UserId only provides for identification.
A password is a weak authentication mechanism since passwords can be disclosed, shared, written down,
and more.
A smart card can be stolen and its corresponding PIN code can be guessed by an intruder. A smartcard
can be borrowed by a friend of yours and you would have no clue as to who is really logging in using that
smart card.
Any form of two-factor authentication not involving biometrics cannot be as reliable as a biometric system
to identify the person.
See an extract below from the HISM book volume 1 Biometric identifying verification systems control
people. If the person with the correct hand, eye, face, signature, or voice is not present, the identification
and verification cannot take place and the desired action (i.e., portal passage, data, or resource access)
does not occur.
As has been demonstrated many times, adversaries and criminals obtain and successfully use access
cards, even those that require the addition of a PIN. This is because these systems control only pieces of
plastic (and sometimes information), rather than people. Real asset and resource protection can only be
accomplished by people, not cards and information, because unauthorized persons can (and do) obtain
the cards and information. Further, life-cycle costs are significantly reduced because no card or PIN
administration system or personnel are required. The authorized person does not lose physical
characteristics (i.e., hands, face, eyes, signature, or voice), but cards and PINs are continuously lost,
stolen, or forgotten. This is why card access systems require systems and people to administer, control,
record, and issue (new) cards and PINs. Moreover, the cards are an expensive and recurring cost.
This question has been generating lots of interest. The keyword in the question is: Individual (the person)
and also the authenticated portion as well.
I totally agree with you that Two Factors or Strong Authentication would be the strongest means of
authentication. However the question is not asking what is the strongest mean of authentication, it is
asking what is the best way to identify the user (individual) behind the technology. When answering
questions do not make assumptions to facts not presented in the question or answers.
Nothing can beat Biometrics in such case. You cannot lend your fingerprint and pin to someone else, you
cannot borrow one of my eye balls to defeat the Iris or Retina scan. This is why it is the best method to
authenticate the user.
I think the reference is playing with semantics and that makes it a bit confusing. I have improved the
question to make it a lot clearer and I have also improve the explanations attached with the question.
The reference mentioned above refers to authenticating the identity for access. So the distinction is being
made that there is identity and there is authentication. In the case of physical security the enrollment
process is where the identity of the user would be validated and then the biometrics features provided by
the user would authenticate the user on a one to one matching basis (for authentication) with the reference
contained in the database of biometrics templates. In the case of system access, the user might have to
provide a username, a pin, a passphrase, a smart card, and then provide his biometric attributes.
Biometric can also be used for Identification purpose where you do a one to many match. You take a facial
scan of someone within an airport and you attempt to match it with a large database of known criminal and
terrorists. This is how you could use biometric for Identification.
QUESTION 187
Which authentication technique best protects against hijacking?
A. Static authentication
B. Continuous authentication
C. Robust authentication
D. Strong authentication
Correct Answer: B
Explanation
Explanation/Reference:
A continuous authentication provides protection against impostors who can see, alter, and insert
information passed between the claimant and verifier even after the claimant/verifier authentication is
complete. This is the best protection against hijacking. Static authentication is the type of authentication
provided by traditional password schemes and the strength of the authentication is highly dependent on
the difficulty of guessing passwords. The robust authentication mechanism relies on dynamic
authentication data that changes with each authenticated session between a claimant and a verifier, and it
does not protect against hijacking. Strong authentication refers to a two-factor authentication (like
something a user knows and something a user is).
Source: TIPTON, Harold F. & KRAUSE, Micki, Information Security Management Handbook, 4th edition
(volume 1), 2000, CRC Press, Chapter 3: Secured Connections to External Networks (page 51).
QUESTION 188
Which of the following is not a security goal for remote access?
Correct Answer: D
Explanation
Explanation/Reference:
An automated login function for remote users would imply a weak authentication, thus certainly not a
security goal.
Source: TIPTON, Harold F. & KRAUSE, Micki, Information Security Management Handbook, 4th edition,
volume 2, 2001, CRC Press, Chapter 5: An Introduction to Secure Remote Access (page 100).
QUESTION 189
Which of the following is most concerned with personnel security?
A. Management controls
B. Operational controls
C. Technical controls
D. Human resources controls
Correct Answer: B
Explanation
Explanation/Reference:
Many important issues in computer security involve human users, designers, implementers, and
managers.
A broad range of security issues relates to how these individuals interact with computers and the access
and authorities they need to do their jobs. Since operational controls address security methods focusing on
mechanisms primarily implemented and executed by people (as opposed to systems), personnel security
is considered a form of operational control. Operational controls are put in place to improve security of a
particular system (or group of systems). They often require specialized expertise and often rely upon
management activities as well as technical controls. Implementing dual control and making sure that you
have more than one person that can perform a task would fall into this category as well. Management
controls focus on the management of the IT security system and the management of risk for a system.
They are techniques and concerns that are normally addressed by management. Technical controls focus
on security controls that the computer system executes. The controls can provide automated protection for
unauthorized access of misuse, facilitate detection of security violations, and support security requirements
for applications and data.
QUESTION 190
Which of the following questions is less likely to help in assessing identification and authentication
controls?
A. Is a current list maintained and approved of authorized users and their access?
B. Are passwords changed at least every ninety days or earlier if needed?
C. Are inactive user identifications disabled after a specified period of time?
D. Is there a process for reporting incidents?
Correct Answer: D
Explanation
Explanation/Reference:
Identification and authentication is a technical measure that prevents unauthorized people (or unauthorized
processes) from entering an IT system. Access control usually requires that the system be able to identify
and differentiate among users. Reporting incidents is more related to incident response capability
(operational control) than to identification and authentication (technical control).
Source: SWANSON, Marianne, NIST Special Publication 800-26, Security Self-Assessment Guide for
Information Technology Systems, November 2001 (Pages A-30 to A-32).
QUESTION 191
How would nonrepudiation be best classified as?
A. A preventive control
B. A logical control
C. A corrective control
D. A compensating control
Correct Answer: A
Explanation
Explanation/Reference:
Systems accountability depends on the ability to ensure that senders cannot deny sending information and
that receivers cannot deny receiving it. Because the mechanisms implemented in nonrepudiation prevent
the ability to successfully repudiate an action, it can be considered as a preventive control.
Source: STONEBURNER, Gary, NIST Special Publication 800-33: Underlying Technical Models for
Information Technology Security, National Institute of Standards and Technology, December 2001, page 7
QUESTION 192
What are cognitive passwords?
Correct Answer: B
Explanation
Explanation/Reference:
Cognitive passwords are fact or opinion-based information used to verify an individual's identity.
Passwords that can be used only once are one-time or dynamic passwords. Password generators that use
a challenge response scheme refer to token devices. A passphrase is a sequence of characters that is
longer than a password and is transformed into a virtual password.
Source: WALLHOFF, John, CISSP Summary 2002, April 2002, CBK#1 Access Control System &
Methodology (page 2), /Documents/CISSP_Summary_2002/index.html.
QUESTION 193
Which of the following Kerberos components holds all users' and services' cryptographic keys?
Correct Answer: C
Explanation
Explanation/Reference:
The Key Distribution Center (KDC) holds all users' and services' cryptographic keys. It provides
authentication services, as well as key distribution functionality. The Authentication Service is the part of
the KDC that authenticates a principal. The Key Distribution Service and Key Granting Service are
distracters and are not defined Kerberos components. Source: WALLHOFF, John, CISSP Summary 2002,
April 2002, CBK#1 Access Control System & Methodology (page 3), /Documents/CISSP_Summary_2002/
index.html.
QUESTION 194
Most access violations are:
A. Accidental
B. Caused by internal hackers
C. Caused by external hackers
D. Related to Internet
Correct Answer: A
Explanation
Explanation/Reference:
The most likely source of exposure is from the uninformed, accidental or unknowing person, although the
greatest impact may be from those with malicious or fraudulent intent. Source: Information Systems Audit
and Control Association, Certified Information Systems Auditor 2002 review manual, Chapter 4: Protection
of Information Assets (page 192).
QUESTION 195
Which of the following biometrics devices has the highest Crossover Error Rate (CER)?
A. Iris scan
B. Hand geometry
C. Voice pattern
D. Fingerprints
Correct Answer: C
Explanation
Explanation/Reference:
The Crossover Error Rate (CER) is the point where false rejection rate (type I error) equals the false
acceptance rate (type II error). The lower the CER, the better the accuracy of the device. At the time if this
writing, response times and accuracy of some devices are:
System type Response time Accuracy (CER)
Fingerprints 5-7 secs. 5%
Hand Geometry 3-5 secs. 2%
Voice Pattern 10-14 secs. 10%
Retina Scan 4-7 secs. 15%
Iris Scan 25-4 secs. 05%
The term EER which means Equal Error Rate is sometimes use instead of the term CER. It has the same
meaning.
Source: Chris Hare's CISSP Study Notes on Physical Security, based on ISC2 CBK document.
Available at http://www.ccure.org.
QUESTION 196
Which of following is not a service provided by AAA servers (Radius, TACACS and DIAMETER)?
A. Authentication
B. Administration
C. Accounting
D. Authorization
Correct Answer: B
Explanation
Explanation/Reference:
Radius, TACACS and DIAMETER are classified as authentication, authorization, and accounting (AAA)
servers.
Source: TIPTON, Harold F. & KRAUSE, MICKI, Information Security Management Handbook, 4th Edition,
Volume 2, 2001, CRC Press, NY, Page 33
also see:
The term "AAA" is often used, describing cornerstone concepts [of the AIC triad] Authentication,
Authorization, and Accountability. Left out of the AAA acronym is Identification which is required before the
three "A's" can follow. Identity is a claim, Authentication proves an identity, Authorization describes the
action you can perform on a system once you have been identified and authenticated, and accountability
holds users accountable for their actions.
Reference: CISSP Study Guide, Conrad Misenar, Feldman p. 10-11, (c) 2010 Elsevier.
QUESTION 197
Which of the following protocol was used by the INITIAL version of the Terminal Access Controller Access
Control System TACACS for communication between clients and servers?
A. TCP
B. SSL
C. UDP
D. SSH
Correct Answer: C
Explanation
Explanation/Reference:
The original TACACS, developed in the early ARPANet days, had very limited functionality and used the
UDP transport. In the early 1990s, the protocol was extended to include additional functionality and the
transport changed to TCP.
TACACS is defined in RFC 1492, and uses (either TCP or UDP) port 49 by default. TACACS allows a
client to accept a username and password and send a query to a TACACS authentication server,
sometimes called a TACACS daemon or simply TACACSD. TACACSD uses TCP and usually runs on port
49 It would determine whether to accept or deny the authentication request and send a response back.
TACACS+
TACACS+ and RADIUS have generally replaced TACACS and XTACACS in more recently built or
updated networks. TACACS+ is an entirely new protocol and is not compatible with TACACS or
XTACACS. TACACS+ uses the Transmission Control Protocol (TCP) and RADIUS uses the User
Datagram Protocol (UDP). Since TCP is connection oriented protocol, TACACS+ does not have to
implement transmission control. RADIUS, however, does have to detect and correct transmission errors
like packet loss, timeout etc. since it rides on UDP which is connectionless.
RADIUS encrypts only the users' password as it travels from the RADIUS client to RADIUS server. All
other information such as the username, authorization, accounting are transmitted in clear text. Therefore it
is vulnerable to different types of attacks. TACACS+ encrypts all the information mentioned above and
therefore does not have the vulnerabilities present in the RADIUS protocol.
RADIUS and TACACS + are client/ server protocols, which means the server portion cannot send
unsolicited commands to the client portion. The server portion can only speak when spoken to. Diameter is
a peer-based protocol that allows either end to initiate communication. This functionality allows the
Diameter server to send a message to the access server to request the user to provide another
authentication credential if she is attempting to access a secure resource.
QUESTION 198
Which of the following can best eliminate dial-up access through a Remote Access Server as a hacking
vector?
Correct Answer: B
Explanation
Explanation/Reference:
Containing the dial-up problem is conceptually easy: by installing the Remote Access Server outside the
firewall and forcing legitimate users to authenticate to the firewall, any access to internal resources through
the RAS can be filtered as would any other connection coming from the Internet.
The use of a TACACS+ Server by itself cannot eliminate hacking. Setting a modem ring count to 5 may
help in defeating war-dialing hackers who look for modem by dialing long series of numbers.
Attaching modems only to non-networked hosts is not practical and would not prevent these hosts from
being hacked.
Source: STREBE, Matthew and PERKINS, Charles, Firewalls 24seven, Sybex 2000, Chapter 2:
Hackers.
QUESTION 199
In the Bell-LaPadula model, the Star-property is also called:
Correct Answer: C
Explanation
Explanation/Reference:
The Bell-LaPadula model focuses on data confidentiality and access to classified information, in contrast to
the Biba Integrity Model which describes rules for the protection of data integrity. In this formal model, the
entities in an information system are divided into subjects and objects. The notion of a "secure state" is
defined, and it is proven that each state transition preserves security by moving from secure state to
secure state, thereby proving that the system satisfies the security objectives of the model.
The Bell-LaPadula model is built on the concept of a state machine with a set of allowable states in a
system. The transition from one state to another state is defined by transition functions. A system state is
defined to be "secure" if the only permitted access modes of subjects to objects are in accordance with a
security policy.
To determine whether a specific access mode is allowed, the clearance of a subject is compared to the
classification of the object (more precisely, to the combination of classification and set of compartments,
making up the security level) to determine if the subject is authorized for the specific access mode.
The clearance/classification scheme is expressed in terms of a lattice. The model defines two mandatory
access control (MAC) rules and one discretionary access control (DAC) rule with three security properties:
The Simple Security Property - a subject at a given security level may not read an object at a higher
security level (no read-up).
The *-property (read "star"-property) - a subject at a given security level must not write to any object at a
lower security level (no write-down). The *-property is also known as the Confinement property.
The Discretionary Security Property - use an access control matrix to specify the discretionary access
control.
The transfer of information from a high-sensitivity document to a lower-sensitivity document may happen in
the Bell-LaPadula model via the concept of trusted subjects. Trusted Subjects are not restricted by the *-
property. Untrusted subjects are. Trusted Subjects must be shown to be trustworthy with regard to the
security policy. This security model is directed toward access control and is characterized by the phrase:
"no read up, no write down." Compare the Biba model, the Clark-Wilson model and the Chinese Wall.
With Bell-LaPadula, users can create content only at or above their own security level (i.e. secret
researchers can create secret or top-secret files but may not create public files; no write-down).
Conversely, users can view content only at or below their own security level (i.e. secret researchers can
view public or secret files, but may not view top-secret files; no read-up).
Strong * Property
The Strong * Property is an alternative to the *-Property in which subjects may write to objects with only a
matching security level. Thus, the write-up operation permitted in the usual *- Property is not present, only
a write-to-same level operation. The Strong * Property is usually discussed in the context of multilevel
database management systems and is motivated by integrity concerns.
Tranquility principle
The tranquility principle of the Bell-LaPadula model states that the classification of a subject or object does
not change while it is being referenced. There are two forms to the tranquility principle: the "principle of
strong tranquility" states that security levels do not change during the normal operation of the system and
the "principle of weak tranquility" states that security levels do not change in a way that violates the rules of
a given security policy. Another interpretation of the tranquility principles is that they both apply only to the
period of time during which an operation involving an object or subject is occurring. That is, the strong
tranquility principle means that an object's security level/label will not change during an operation (such as
read or write); the weak tranquility principle means that an object's security level/label may change in a
way that does not violate the security policy during an operation.
Reference(s) used for this question:
http://en.wikipedia.org/wiki/Biba_Model
http://en.wikipedia.org/wiki/Mandatory_access_control
http://en.wikipedia.org/wiki/Discretionary_access_control http://en.wikipedia.org/wiki/Clark-Wilson_model
http://en.wikipedia.org/wiki/Brewer_and_Nash_model
QUESTION 200
An attack initiated by an entity that is authorized to access system resources but uses them in a way not
approved by those who granted the authorization is known as a(n):
A. active attack.
B. outside attack.
C. inside attack.
D. passive attack.
Correct Answer: C
Explanation
Explanation/Reference:
An inside attack is an attack initiated by an entity inside the security perimeter, an entity that is authorized
to access system resources but uses them in a way not approved by those who granted the authorization
whereas an outside attack is initiated from outside the perimeter, by an unauthorized or illegitimate user of
the system. An active attack attempts to alter system resources to affect their operation and a passive
attack attempts to learn or make use of the information from the system but does not affect system
resources. Source: SHIREY, Robert W., RFC2828: Internet Security Glossary, may 2000
QUESTION 201
Which of the following can be defined as a framework that supports multiple, optional authentication
mechanisms for PPP, including cleartext passwords, challenge-response, and arbitrary dialog sequences?
Correct Answer: A
Explanation
Explanation/Reference:
RFC 2828 (Internet Security Glossary) defines the Extensible Authentication Protocol as a framework that
supports multiple, optional authentication mechanisms for PPP, including cleartext passwords, challenge-
response, and arbitrary dialog sequences. It is intended for use primarily by a host or router that connects
to a PPP network server via switched circuits or dial- up lines. The Remote Authentication Dial-In User
Service (RADIUS) is defined as an Internet protocol for carrying dial-in user's authentication information
and configuration information between a shared, centralized authentication server and a network access
server that needs to authenticate the users of its network access ports. The other option is a distracter.
Source: SHIREY, Robert W., RFC2828: Internet Security Glossary, may 2000
QUESTION 202
What is the name of the first mathematical model of a multi-level security policy used to define the concept
of a secure state, the modes of access, and rules for granting access?
Correct Answer: D
Explanation
Explanation/Reference:
Source: TIPTON, Hal, (ISC)2, Introduction to the CISSP Exam presentation.
QUESTION 203
What is the PRIMARY use of a password?
Correct Answer: C
Explanation
Explanation/Reference:
Source: TIPTON, Hal, (ISC)2, Introduction to the CISSP Exam presentation.
QUESTION 204
The three classic ways of authenticating yourself to the computer security software are:
something you know, something you have, and something:
A. you need.
B. you read.
C. you are.
D. you do.
Correct Answer: C
Explanation
Explanation/Reference:
Source: TIPTON, Hal, (ISC)2, Introduction to the CISSP Exam presentation.
QUESTION 205
An access system that grants users only those rights necessary for them to perform their work is operating
on which security principle?
A. Discretionary Access
B. Least Privilege
C. Mandatory Access
D. Separation of Duties
Correct Answer: B
Explanation
Explanation/Reference:
Source: TIPTON, Hal, (ISC)2, Introduction to the CISSP Exam presentation.
QUESTION 206
Pin, Password, Passphrases, Tokens, smart cards, and biometric devices are all items that can be used
for Authentication. When one of these item listed above in conjunction with a second factor to validate
authentication, it provides robust authentication of the individual by practicing which of the following?
A. Multi-party authentication
B. Two-factor authentication
C. Mandatory authentication
D. Discretionary authentication
Correct Answer: B
Explanation
Explanation/Reference:
Once an identity is established it must be authenticated. There exist numerous technologies and
implementation of authentication methods however they almost all fall under three major areas.
Logical controls related to these types are called "factors." Something you know can be a password or PIN,
something you have can be a token fob or smart card, and something you are is usually some form of
biometrics. Single-factor authentication is the employment of one of these factors, two-factor authentication
is using two of the three factors, and three-factor authentication is the combination of all three factors.
The general term for the use of more than one factor during authentication is multifactor authentication or
strong authentication.
QUESTION 207
What would you call a network security control deployed in line to detects, alerts, and takes action when a
possible intrusion is detected.
Correct Answer: C
Explanation
Explanation/Reference:
IPS is a preventive and proactive mechanism whereas an IDS is detective and after the fact technology.
QUESTION 208
What is a security policy?
A. High level statements on management's expectations that must be met in regards to security
B. A policy that defines authentication to the network.
C. A policy that focuses on ensuring a secure posture and expresses management approval. It explains in
detail how to implement the requirements.
D. A statement that focuses on the authorization process for a system
Correct Answer: A
Explanation
Explanation/Reference:
A statement on the expectations that must be met to be considered compliant. This is because a policy is a
broad statement that management has approved of and stands behind to express the security
expectations for the organization.
QUESTION 209
Legacy single sign on (SSO) is:
A. Technology to allow users to authenticate to every application by entering the same user ID and
password each time, thus having to remember only a single password.
B. Technology to manage passwords consistently across multiple platforms, enforcing policies such as
password change intervals.
C. A mechanism where users can authenticate themselves once, and then a central repository of their
credentials is used to launch various legacy applications.
D. Another way of referring to SESAME and KryptoKnight, now that Kerberos is the de-facto industry
standard single sign on mechanism.
Correct Answer: C
Explanation
Explanation/Reference:
A mechanism where users can authenticate themselves once, and then a central repository of their
credentials is used to launch various legacy applications.
QUESTION 210
Identity Management solutions include such technologies as Directories services, Single Sign-On and Web
Access management. There are many reasons for management to choose an identity management
solution.
Which of the following is a key management challenge regarding identity management solutions?
Correct Answer: D
Explanation
Explanation/Reference:
Any identity management system used in an environment where there are tens of thousands of users must
be able to scale to support the volumes of data and peak transaction rates.
Users will no longer be able to "recycle" their password for different applications. This is actually a function
of an effective password management system. Consistency and efficiency are maintained by minimizing
unique user authentication requirements. Costs increase as identity management technologies require
significant resources. On the contrary, "When users access multiple systems, they may be presented with
multiple log- in IDs, multiple passwords, and multiple sign-on screens. This complexity is burdensome to
users, who consequently have problems accessing systems and incur productivity and support costs
QUESTION 211
Which of the following describes the sequence of steps required for a Kerberos session to be established
between a user (Principal P1), and an application server (Principal P2)?
Correct Answer: C
Explanation
Explanation/Reference:
Principles P1 and P2 authenticate to the Key Distribution Center (KDC), principle P1 receives a Ticket
Granting Ticket (TGT), and principle P2 requests a service ticket from the KDC. The principle P2 does not
request a service ticket. P1 would request a service ticket. Principles P1 and P2 authenticate to the Key
Distribution Center (KDC), principle P1 requests a Ticket Granting Ticket (TGT) from the authentication
server, and application server P2 requests a service ticket from P1
A request by P1 to access P2 will fail without a service ticket, but this is not the best answer. Principle P1
authenticates to the Key Distribution Center (KDC), principle P1 requests a Ticket Granting Ticket (TGT)
from the authentication server, and principle P1 requests a service ticket from the application server P2
The request for a service ticket is made to the KDC, not to P2 P2 does not proxy authentication requests
for the principle P1
"1) The client sends its TGT back to Ticket Granting Service (TGS) on the KDC with request for access to
a server or service"
"3) A service ticket (ST) is granted and sent to the client. The service ticket includes a session key
encrypted with the client symmetric key and also encrypted with the service or server symmetric key"
"4) The client sends the ST to the server or service host."
QUESTION 212
Which type of security control is also known as "Logical" control?
A. Physical
B. Technical
C. Administrative
D. Risk
Correct Answer: B
Explanation
Explanation/Reference:
Physcial: This is a type of security control, but does not have an alternate name. Administrative: This is a
type of security control, but doe not have an alternate name.
Risk:This is not a type of security control.
The following reference(s) were/was used to create this question:
Shon Harris AIO 4th Edition, Chapter 3, Page 57
QUESTION 213
Which of the following term best describes a weakness that could potentially be exploited?
A. Vulnerability
B. Risk
C. Threat
D. Target of evaluation (TOE)
Correct Answer: A
Explanation
Explanation/Reference:
A vulnerability is mostly a weakness, it could be a weakness in a piece of sotware, it could be a weakness
in your physical security, it could take many forms. It is a weakness that could be exploited by a Threat.
For example an open firewall port, a password that is never changed, or a flammable carpet. A missing
Control is also considered to be a Vulnerability.
Target of evaluation:
The term Target of evaluation is a term used under the common criteria evaluation scheme. It defines the
product being evaluated. It was only a detractor in this case and it is not directly related to risk
management.
QUESTION 214
Which of the following best describes an exploit?
Correct Answer: B
Explanation
Explanation/Reference:
The following answers are incorrect:
An intentional hidden message or feature in an object such as a piece of software or a movie. This is the
definition of an "Easter Egg" which is code within code. A good example of this was a small flight simulator
that was hidden within Microsoft Excel. If you know which cell to go to on your spreadsheet and the special
code to type in that cell, you were able to run the flight simulator.
An anomalous condition where a process attempts to store data beyond the boundaries of a fixed- length
buffer
This is the definition of a "Buffer Overflow". Many pieces of exploit code may contain some buffer overflow
code but considering all the choices presented this was not the best choice. It is one of the vulnerability
that the exploit would take care of if no data input validation is taking place within the software that you are
targeting.
A condition where a program (either an application or part of the operating system) stops performing its
expected function and also stops responding to other parts of the system This is the definition of a "System
Crash". Such behavior might be the result of exploit code being launched against the target.
QUESTION 215
A smart Card that has two chips with the Capability of utilizing both Contact and Contactless formats is
called:
Correct Answer: C
Explanation
Explanation/Reference:
This is a contactless smart card that has two chips with the capability of utilizing both contact and
contactless formats.
Two additional categories of cards are dual-interface cards and hybrid cards which is mentioned above.
Hybrid Card
A hybrid card has two chips, one with a contact interface and one with a contactless interface.
The two chips are not interconnected.
Dual-Interface card
Do not confuse this card with the Hybrid Card. This one has only one chip. A dual-interface card has a
single chip with both contact and contactless interfaces. With dual-interface cards, it is possible to access
the same chip using either a contact or contactless interface with a very high level of security.
Application dynamics
Prevailing market infrastructure
Economics of the business model
Strategy for shared application cards
Combi Card
Are similar to Hybrid cards only they contain only one set of circuitry as apposed to two.
QUESTION 216
An employee ensures all cables are shielded, builds concrete walls that extend from the true floor to the
true ceiling and installs a white noise generator. What attack is the employee trying to protect against?
A. Emanation Attacks
B. Social Engineering
C. Object reuse
D. Wiretaping
Correct Answer: A
Explanation
Explanation/Reference:
Explanation :
Emanation attacks are the act of intercepting electrical signals that radiate from computing equipment.
There are several countermeasures including shielding cabling, white noise, control zones, and TEMPEST
equipment (this is a Faraday cage around the equipment)
QUESTION 217
The best technique to authenticate to a system is to:
Correct Answer: B
Explanation
Explanation/Reference:
Something you know and something you have is two authentication factors and is better than a single
authentication factor. Strong Authentication or Two Factor Authentication is widely accepted as the best
practice for authentication.
Whenever two of the three types of factors are used together, this is called strong authentication or two
factors authentication
This is a single factor authentication and it could be weaker than two factors, in most cases it is . Biometric
devices can be tricked or circumvented in some cases, this is why they MUST be supplemented with a
second factor of authentication. Multiple attacks have been done on different types of biometric devices.
Two factors is always the best to authenticate a user.
Maintain correct and accurate ACLs (access control lists) to allow access to applications:
ACL are attached to objects. They are used within the access control matrix to define what level of access
each of the subjects have on the object. It is a column within the Access Control matrix. This is related to
authorization and not authentication.
QUESTION 218
Business Impact Analysis (BIA) is about
A. Technology
B. Supporting the mission of the organization
C. Due Care
D. Risk Assessment
Correct Answer: B
Explanation
Explanation/Reference:
Business impact analysis is not about technology ; it is about supporting the mission of the organization.
QUESTION 219
You wish to make use of "port knocking" technologies. How can you BEST explain this?
A. Port knocking is where the client will attempt to connect to a predefined set of ports to identify him as
an authorized client.
B. Port knocking is where the user calls the server operator to have him start the service he wants to
connect to.
C. This is where all the ports are open on the server and the connecting client scans the open port to
which he wants to connect to see if it's open and running.
D. Port knocking is where the port sequence is encrypted with 3DES and only the server has the other key
to decrypt the port sequence.
Correct Answer: A
Explanation
Explanation/Reference:
The other answers are incorrect
The following reference(s) were/was used to create this question:
http://www.portknocking.org/
QUESTION 220
Tim is a network administrator of Acme inc. He is responsible for configuring the network devices. John the
new security manager reviews the configuration of the Firewall configured by Tim and identifies an issue.
This specific firewall is configured in failover mode with another firewall. A sniffer on a PC connected to the
same switch as the firewalls can decipher the credentials, used by Tim while configuring the firewalls.
Which of the following should be used by Tim to ensure a that no one can eavesdrop on the
communication?
A. SSH
B. SFTP
C. SCP
D. RSH
Correct Answer: A
Explanation
Explanation/Reference:
The SSH protocol provides an encrypted terminal session to the remote firewalls. By encrypting the data, it
prevents sniffing attacks using a protocol analyzer also called a sniffer. With more and more computers
installed in networked environments, it often becomes necessary to access hosts from a remote location.
This normally means that a user sends login and password strings for authentication purposes. As long as
these strings are transmitted as plain text, they could be intercepted and misused to gain access to that
user account without the authorized user even knowing about it.
Apart from the fact that this would open all the user's files to an attacker, the illegal account could be used
to obtain administrator or root access or to penetrate other systems. In the past, remote connections were
established with telnet, which offers no guards against eavesdropping in the form of encryption or other
security mechanisms. There are other unprotected communication channels, like the traditional FTP
protocol and some remote copying programs. The SSH suite provides the necessary protection by
encrypting the authentication strings (usually a login name and a password) and all the other data
exchanged between the hosts. With SSH, the data flow could still be recorded by a third party, but the
contents are encrypted and cannot be reverted to plain text unless the encryption key is known. So SSH
enables secure communications over insecure networks such as the Internet.
RSH
RSH© allows a user to execute commands on a remote system without having to log in to the system. For
example, RSH can be used to remotely examine the status of a number of access servers without
connecting to each communication server, executing the command, and then disconnecting from the
communication server.
As described in the rlogin article, the rsh protocol is not secure for network use, because it sends
unencrypted information over the network, among other things. Some implementations also authenticate
by sending unencrypted passwords over the network. rsh has largely been replaced by the very similar
SSH (secure shell) program on untrusted networks like the internet. As an example of RSH use, the
following executes the command mkdir testdir as user remote user on the computer remote computer:
rsh -l remote user remote computer "mkdir testdir"
After the command has finished RSH terminates. If no command is specified then rsh will log in on the
remote system using rlogin.
The following reference(s) were/was used to create this question:
http://www.novell.com/documentation/suse91/suselinux-adminguide/html/ch19s02html and
http://en.wikipedia.org/wiki/Remote_Shell
and
http://en.wikipedia.org/wiki/Secure_copy
QUESTION 221
Tim's day to day responsibilities include monitoring health of devices on the network. He uses a Network
Monitoring System supporting SNMP to monitor the devices for any anomalies or high traffic passing
through the interfaces. Which of the protocols would be BEST to use if some of the requirements are to
prevent easy disclosure of the SNMP strings and authentication of the source of the packets?
A. UDP
B. SNMP V1
C. SNMP V3
D. SNMP V2
Correct Answer: C
Explanation
Explanation/Reference:
Simple Network Management Protocol (SNMP) is an Internet-standard protocol for managing devices on
IP networks. Devices that typically support SNMP include routers, switches, servers, workstations, printers,
modem racks, and more. It is used mostly in network management systems to monitor network-attached
devices for conditions that warrant administrative attention. SNMP is a component of the Internet Protocol
Suite as defined by the Internet Engineering Task Force (IETF).
SNMP V3
Although SNMPv3 makes no changes to the protocol aside from the addition of cryptographic security, it
looks much different due to new textual conventions, concepts, and terminology. SNMPv3 primarily added
security and remote configuration enhancements to SNMP. Security has been the biggest weakness of
SNMP since the beginning. Authentication in SNMP Versions 1 and 2 amounts to nothing more than a
password (community string) sent in clear text between a manager and agent. Each SNMPv3 message
contains security parameters which are encoded as an octet string. The meaning of these security
parameters depends on the security model being used.
UDP
SNMP can make use of the User Datagram Protocol (UDP) protocol but the UDP protocol by itself is not
use for network monitoring.
SNMP V1
SNMP version 1 (SNMPv1) is the initial implementation of the SNMP protocol. SNMPv1 operates over
protocols such as User Datagram Protocol (UDP), Internet Protocol (IP), OSI Connectionless Network
Service (CLNS), AppleTalk Datagram-Delivery Protocol (DDP), and Novell Internet Packet Exchange
(IPX). SNMPv1 is widely used and is the de facto network- management protocol in the Internet
community.
SNMP V2
SNMPv2 (RFC 1441RFC 1452), revises version 1 and includes improvements in the areas of
performance, security, confidentiality, and manager-to-manager communications. It introduced
GetBulkRequest, an alternative to iterative GetNextRequests for retrieving large amounts of management
data in a single request. However, the new party-based security system in SNMPv2, viewed by many as
overly complex, was not widely accepted.
QUESTION 222
You have been approached by one of your clients . They are interested in doing some security re-
engineering . The client is looking at various information security models. It is a highly secure environment
where data at high classifications cannot be leaked to subjects at lower classifications . Of primary concern
to them, is the identification of potential covert channel. As an Information Security Professional , which
model would you recommend to the client?
Correct Answer: A
Explanation
Explanation/Reference:
Securing the data manipulated by computing systems has been a challenge in the past years. Several
methods to limit the information disclosure exist today, such as access control lists, firewalls, and
cryptography. However, although these methods do impose limits on the information that is released by a
system, they provide no guarantees about information propagation. For example, access control lists of file
systems prevent unauthorized file access, but they do not control how the data is used afterwards.
Similarly, cryptography provides a means to exchange information privately across a non-secure channel,
but no guarantees about the confidentiality of the data are given once it is decrypted. In low level
information flow analysis, each variable is usually assigned a security level. The basic model comprises
two distinct levels: low and high, meaning, respectively, publicly observable information, and secret
information. To ensure confidentiality, flowing information from high to low variables should not be allowed.
On the other hand, to ensure integrity, flows to high variables should be restricted.
More generally, the security levels can be viewed as a lattice with information flowing only upwards in the
lattice.
Noninterference Models
This could have been another good answer as it would help in minimizing the damage from covert
channels.
The goal of a noninterference model is to help ensure that high-level actions (inputs) do not determine
what low-level user s can see (outputs ) . Most of the security models presented are secured by permitting
restricted flows between high- and low-level users. The noninterference model maintains activities at
different security levels to separate these levels from each other. In this way, it minimizes leakages that
may happen through covert channels, because there is complete separation (noninterference) between
security levels. Because a user at a higher security level has no way to interfere with the activities at a
lower level, the lower-level user cannot get any information from the higher leve.
The BellLaPadula model explicitly defined its scope. It did not treat the following extensively:
Covert channels. Passing information via pre-arranged actions was described briefly. Networks of
systems. Later modeling work did address this topic. Policies outside multilevel security. Work in the early
1990s showed that MLS is one version of boolean policies, as are all other published policies.
Biba
The Biba Model or Biba Integrity Model developed by Kenneth J. Biba in 1977, is a formal state transition
system of computer security policy that describes a set of access control rules designed to ensure data
integrity. Data and subjects are grouped into ordered levels of integrity. The model is designed so that
subjects may not corrupt objects in a level ranked higher than the subject, or be corrupted by objects from
a lower level than the subject. In general the model was developed to circumvent a weakness in the Bell-
LaPadula model which only addresses data confidentiality.
In general, preservation of data integrity has three goals:
Prevent data modification by unauthorized parties
Prevent unauthorized data modification by authorized parties Maintain internal and external consistency
(i.e. data reflects the real world)
Note: Biba address only the first goal of integrity while Clark-Wilson addresses all three
This security model is directed toward data integrity (rather than confidentiality) and is characterized by the
phrase: "no read down, no write up". This is in contrast to the Bell-LaPadula model which is characterized
by the phrase "no write down, no read up". In the Biba model, users can only create content at or below
their own integrity level (a monk may write a prayer book that can be read by commoners, but not one to
be read by a high priest). Conversely, users can only view content at or above their own integrity level (a
monk may read a book written by the high priest, but may not read a pamphlet written by a lowly
commoner). Another analogy to consider is that of the military chain of command. A General may write
orders to a Colonel, who can issue these orders to a Major. In this fashion, the General's original orders
are kept intact and the mission of the military is protected (thus, "no read down" integrity). Conversely, a
Private can never issue orders to his Sergeant, who may never issue orders to a Lieutenant, also
protecting the integrity of the mission ("no write up").
The Biba model defines a set of security rules similar to the Bell-LaPadula model. These rules are the
reverse of the Bell-LaPadula rules:
The Simple Integrity Axiom states that a subject at a given level of integrity must not read an object at a
lower integrity level (no read down).
The * (star) Integrity Axiom states that a subject at a given level of integrity must not write to any object at a
higher level of integrity (no write up).
Lattice Model
In computer security, lattice-based access control (LBAC) is a complex access control model based on the
interaction between any combination of objects (such as resources, computers, and applications) and
subjects (such as individuals, groups or organizations).
In this type of label-based mandatory access control model, a lattice is used to define the levels of security
that an object may have and that a subject may have access to. The subject is only allowed to access an
object if the security level of the subject is greater than or equal to that of the object.
Mathematically, the security level access may also be expressed in terms of the lattice (a partial order set)
where each object and subject have a greatest lower bound (meet) and least upper bound (join) of access
rights. For example, if two subjects A and B need access to an object, the security level is defined as the
meet of the levels of A and B. In another example, if two objects X and Y are combined, they form another
object Z, which is assigned the security level formed by the join of the levels of X and Y.
QUESTION 223
Which of the following is a reasonable response from the Intrusion Detection System (IDS) when it detects
Internet Protocol (IP) packets where the IP source address and port is the same as the destination IP
address and port?
A. Allow the packet to be processed by the network and record the event
B. Record selected information about the packets and drop the packets
C. Resolve the destination address and process the packet
D. Translate the source address and resend the packet
Correct Answer: B
Explanation
Explanation/Reference:
This question refers specificly to the LAND Attack. This question is testing your ability to recognize
common attacks such as the Land Attack and also your understanding of what would be an acceptable
action taken by your Intrusion Detection System.
You must remember what is a LAND ATTACK for the purpose of the exam. You must also remember that
an IDS is not only a passive device. In the context of the exam it is considered an active device that is
MOSTLY passive. It can take some blocking actions such as changing a rule on a router or firewall for
example.
In the case of the Land Attack and this specific question. It must be understand that most Operating
System TCP/IP stack today would not be vulnerable to such attack. Many of the common firewall could
also drop any traffic with same Source IP/Port as the Destination IP/Port as well. So there is multiple layers
where such an attack could be stopped. The downfall of IDS compared with IPS is the fact they are usually
reacting after the packets have been sent over the network. A single packet attack should as the Land
Attack could be detected but would still complete and affect the destination target. This is where IPS could
come into play and stop the attack before it completes.
Techtarget on their SearchSecurity website has the following definition for this type of attack:
A land attack is a remote denial-of-service (DOS) attack caused by sending a packet to a machine with the
source host/port the same as the destination host/port. This is a rather old attack and current patches
should stop them for most systems. This is one of the attacks you are expected to know within the CBK.
This question mention specifically what would the reaction of the IDS be? The choices presented and the
question itself DOES NOT talk about IPS, WIDS, or other monitoring tools. It only mentions IDS. Restrict
yourself to the context of the question.
MISCONCEPTIONS
Many people have the misconception that an IDS can only record events and has no ability to take active
response. This is NOT true. An IDS could reset a connection when an attack is detected. An IDS could
change a rule on the firewall to block the attacker. An IDS could change a rule on a router to block
offending traffic. IDS do have the ability to take active response and this is not reserved only for IPS.
The second misconception is that within the ISC2 CBK an IDS is always a passive only system and does
not take any blocking actions, this is not true. The IDS is a lot more limited than IPS as we are mentioning
below but they do have the ability to block some of the attacks or traffic.
Resolve the destination address and process the packet The 'correct' destination address could not be
determined by the IDS Translate the source address and resend the packet
The 'correct' source address could not be reliably determined by the IDS
QUESTION 224
What is the BEST definition of SQL injection.
Correct Answer: D
Explanation
Explanation/Reference:
SQL injection is execution of unexpected SQL in the database as a result of unsanitized user input being
accepted and used in the application code to form the SQL statement.It is a coding problem which affects
inhouse, open source and commercial software.
QUESTION 225
You are a security consultant who is required to perform penetration testing on a client's network. During
penetration testing, you are required to use a compromised system to attack other systems on the network
to avoid network restrictions like firewalls. Which method would you use in this scenario:
Explanation/Reference:
Pivoting refers to method used by penetration testers that uses compromised system to attack other
systems on the same network to avoid restrictions such as firewall configurations, which may prohibit
direct access to all machines. For example, an attacker compromises a web server on a corporate
network, the attacker can then use the compromised web server to attack other systems on the network.
These types of attacks are often called multi-layered attacks. Pivoting is also known as island hopping.
Pivoting can further be distinguished into proxy pivoting and VPN pivoting:
Proxy pivoting generally describes the practice channeling traffic through a compromised target using a
proxy payload on the machine and launching attacks from this computer.[1] This type of pivoting is
restricted to certain TCP and UDP ports that are supported by the proxy. VPN pivoting enables the
attacker to create an encrypted layer 2 tunnel into the compromised machine to route any network traffic
through that target machine, for example to run a vulnerability scan on the internal network through the
compromised machine, effectively giving the attacker full network access as if they were behind the
firewall.
Typically, the proxy or VPN applications enabling pivoting are executed on the target computer as the
payload (software) of an exploit.
QUESTION 226
Which answer best describes a computer software attack that takes advantage of a previously unpublished
vulnerability?
A. Zero-Day Attack
B. Exploit Attack
C. Vulnerability Attack
D. Software Crack
Correct Answer: A
Explanation
Explanation/Reference:
A zero-day (or zero-hour, or Oday, or day zero) attack or threat is a computer threat that tries to exploit
computer application vulnerabilities that are unknown to others or the software developer. Zero-day
exploits (actual software that uses a security hole to carry out an attack) are used or shared by attackers
before the developer of the target software knows about the vulnerability.
The term derives from the age of the exploit. A "zero day" attack occurs on or before the first or "zeroth"
day of developer awareness, meaning the developer has not had any opportunity to distribute a security fix
to users of the software.
Zero-day attacks occur during the vulnerability window that exists in the time between when a vulnerability
is first exploited and when software developers start to develop a counter to that threat.
For viruses, Trojans and other zero-day attacks, the vulnerability window follows this time line:
The developer creates software containing an unknown vulnerability The attacker finds the vulnerability
before the developer does The attacker writes and distributes an exploit while the vulnerability is not known
to the developer
The developer becomes aware of the vulnerability and starts developing a fix.
Exploit Attack
An exploit (from the verb to exploit, in the meaning of using something to one's own advantage) is a piece
of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch or
vulnerability in order to cause unintended or unanticipated behavior to occur on computer software,
hardware, or something electronic (usually computerised). This frequently includes such things as gaining
control of a computer system or allowing privilege escalation or a denial-of-service attack.
Vulnerability Attack
There is no such thing as the term Vulnerability Attack. However a vulnerability is synonyous with a
weakness, it could be bad quality of software, a weakness within your physical security, or a weakness in
your policies and procedures. An attacker will take advantage of a weakness and usually use an exploit to
gain access to your systems without proper authorization or privilege.
Software Crack
Software cracking is the modification of software to remove or disable features which are considered
undesirable by the person cracking the software, usually related to protection methods: copy protection,
trial/demo version, serial number, hardware key, date checks, CD check or software annoyances like nag
screens and adware.
A crack is the software tool used to remove the need to insert a serial number or activation key.
QUESTION 227
Data which is properly secured and can be described with terms like genuine or not corrupted from the
original refers to data that has a high level of what?
A. Authenticity
B. Authorization
C. Availability
D. Non-Repudiation
Correct Answer: A
Explanation
Explanation/Reference:
Authenticity refers to the characteristic of a communication, document or any data that ensures the quality
of being genuine or not corrupted from the original.
QUESTION 228
Which of the following is most appropriate to notify an internal user that session monitoring is being
conducted?
A. Logon Banners
B. Wall poster
C. Employee Handbook
D. Written agreement
Correct Answer: D
Explanation
Explanation/Reference:
This is a tricky question, the keyword in the question is Internal users. There are two possible answers
based on how the question is presented, this question could either apply to internal users or ANY
anonymous/external users. Internal users should always have a written agreement first, then logon
banners serve as a constant reminder.
Banners at the log-on time should be used to notify external users of any monitoring that is being
conducted. A good banner will give you a better legal stand and also makes it obvious the user was
warned about who should access the system, who is authorized and unauthorized, and if it is an
unauthorized user then he is fully aware of trespassing. Anonymous/External users, such as those logging
into a web site, ftp server or even a mail server; their only notification system is the use of a logon banner.
QUESTION 229
A Differential backup process will:
A. Backs up data labeled with archive bit 1 and leaves the data labeled as archive bit 1
B. Backs up data labeled with archive bit 1 and changes the data label to archive bit 0
C. Backs up data labeled with archive bit 0 and leaves the data labeled as archive bit 0
D. Backs up data labeled with archive bit 0 and changes the data label to archive bit 1
Correct Answer: A
Explanation
Explanation/Reference:
Archive bit 1 = On (the archive bit is set).
Archive bit 0 = Off (the archive bit is NOT set).
When the archive bit is set to ON, it indicates a file that has changed and needs to be backed up.
Differential backups backup all files changed since the last full. To do this, they don't change the archive bit
value when they backup a file. Instead the differential let's the full backup make that change. An
incremental only backs up data since the last incremental backup. Thus is does change the archive bit
from 1 (On) to 0 (Off).
QUESTION 230
When considering all the reasons that buffer overflow vulnerabilities exist what is the real reason?
A. Human error
B. The Windows Operating system
C. Insecure programming languages
D. Insecure Transport Protocols
Correct Answer: A
Explanation
Explanation/Reference:
Discussion: Since computer program code is written by humans and there are proper and improper ways
of writing software code it is clear that human errors create the conditions for buffer overflows to exist.
Unfortunately as secure as any operating system is it becomes insecure when people install insecure code
that can be host to buffer overflow attacks so it is human error that really causes these vulnerabilities.
QUESTION 231
Layer 2 of the OSI model has two sublayers. What are those sublayers, and what are two IEEE standards
that describe technologies at that layer?
Correct Answer: A
Explanation
Explanation/Reference:
The data link layer, or Layer 2, of the OSI model is responsible for adding a header and a trailer to a
packet to prepare the packet for the local area network or wide area network technology binary format for
proper line transmission.
Layer 2 is divided into two functional sublayers.
The upper sublayer is the Logical Link Control (LLC) and is defined in the IEEE 8022 specification. It
communicates with the network layer, which is immediately above the data link layer.
Below the LLC is the Media Access Control (MAC) sublayer, which specifies the interface with the protocol
requirements of the physical layer.
Thus, the specification for this layer depends on the technology of the physical layer. The IEEE MAC
specification for Ethernet is 8023, Token Ring is 8025, wireless LAN is 80211, and so on. When you see a
reference to an IEEE standard, such as 80211 or 80216, it refers to the protocol working at the MAC
sublayer of the data link layer of the protocol stack.
QUESTION 232
Which of the following is NOT part of user provisioning?
Correct Answer: B
Explanation
Explanation/Reference:
User provisioning refers to the creation, maintenance, and deactivation of user objects and attributes as
they exist in one or more systems, directories, or applications, in response to business processes.
User provisioning software may include one or more of the following components: change propagation,
self-service workflow, consolidated user administration, delegated user administration, and federated
change control.
User objects may represent employees, contractors, vendors, partners, customers, or other recipients of a
service.
Services may include electronic mail, access to a database, access to a file server or mainframe, and so
on
QUESTION 233
Which of the following answers best describes the type of penetration testing where the analyst has full
knowledge of the network on which he is going to perform his test?
A. White-Box Penetration Testing
B. Black-Box Pen Testing
C. Penetration Testing
D. Gray-Box Pen Testing
Correct Answer: A
Explanation
Explanation/Reference:
In general there are three ways a pen tester can test a target system.
- White-Box: The tester has full access and is testing from inside the system.
- Gray-Box: The tester has some knowledge of the system he's testing.
- Black-Box: The tester has no knowledge of the system. Each of these forms of testing has different
benefits and can test different aspects of the system from different approaches.
QUESTION 234
Which access control method allows the data owner (the person who created the file) to control access to
the information they own?
Correct Answer: A
Explanation
Explanation/Reference:
DAC - Discretionary Access Control is where the user controls access to the data they create or manage.
QUESTION 235
Suppose you are a domain administrator and are choosing an employee to carry out backups. Which
access control method do you think would be best for this scenario?
Correct Answer: A
Explanation
Explanation/Reference:
RBAC - Role-Based Access Control permissions would fit best for a backup job for the employee because
the permissions correlate tightly with permissions granted to a backup operator.
A role-based access control (RBAC) model, bases the access control authorizations on the roles (or
functions) that the user is assigned within an organization. The determination of what roles have access to
a resource can be governed by the owner of the data, as with DACs, or applied based on policy, as with
MACs. Access control decisions are based on job function, previously defined and governed by policy, and
each role (job function) will have its own access capabilities. Objects associated with a role will inherit
privileges assigned to that role. This is also true for groups of users, allowing administrators to simplify
access control strategies by assigning users to groups and groups to roles.
Specifically, in the Microsoft Windows world there is a security group called "Backup Operators" in which
you can place the users to carry out the duties. This way you could assign the backup privilege without the
need to grant the Restore privilege. This would prevent errors or a malicious person from overwriting the
current data with an old copy for example.
- MAC - Mandatory Access Control: This isn't the right answer. The role of Backup administrator fits
perfectly with the access control Role-Based access control.
- DAC - Discretionary Access Control: This isn't the correct answer because DAC relies on data owner/
creators to determine who has access to information.
- RBAC - Rule-Based Access Control: If you got this wrong it may be because you didn't read past the
RBAC part. Be very careful to read the entire question and answers before proceeding.
QUESTION 236
Of the seven types of Access Control Categories, which is described as such?
Designed to specify rules of acceptable behavior in the organization. Example: Policy stating that
employees may not spend time on social media websites
Correct Answer: A
Explanation
Explanation/Reference:
There are seven access control categories. Below you have the Access Control Types and Categories.
- Access Control Types:
- Administrative
- Policies, data classification and labeling and security awareness training
- Technical
- Hardare - MAC FIltering or perimeter devices like
- Software controls like account logons and encryption, file perms
- Physical
- Guard, fences and locks
All these are designed to shape employee behavior to better maintain an environment that supports the
business objectives and protects corporate assets.
The following answers are incorrect:
- Deterrent Access Control: This is not right because a deterrent access control discourages people from
violating security directives.
- Preventive Access Control: This is incorrect because a preventive access control category is used to
simply stop or block unwanted behavior. Users don't have a choice about whether to violate the behavior
rules.
- Detective Access Control: Sorry, this isn't a access control category.
QUESTION 237
Which of the following is NOT a disadvantage of Single Sign On (SSO)?
Correct Answer: D
Explanation
Explanation/Reference:
Single sign-on (SSO)is a Session/user authentication process that permits a user to enter one name and
password in order to access multiple applications. The process authenticates the user for all the
applications they have been given rights to and eliminates further prompts when they switch applications
during a particular session.
SSO Advantages include
- Multiple passwords are no longer required
- It improves an administrator's ability to manage user's accounts and authorization to all associated
systems
- It reduces administrative overhead in resetting forgotten password over multiple platforms and
applications
- It reduces time taken by users to logon into multiple application and platform
QUESTION 238
You are a manager for a large international bank and periodically move employees between positions in
your department. What is this process called?
A. Job Rotation
B. Separation of Duties
C. Mandatory Rotations
D. Dual Control
Correct Answer: A
Explanation
Explanation/Reference:
Discussion: If a single employee were permitted to stay in one critical position for an extended period of
time without close oversight he or she could carry out fraud undetected. For this reason it is important to
rotate employees between jobs. Another good reason is to get employees experienced on their colleagues'
jobs. This way, if an employee were for some reason unavailable to work, their position could be covered.
QUESTION 239
Which of the following control is intended to discourage a potential attacker?
A. Deterrent
B. Preventive
C. Corrective
D. Recovery
Correct Answer: A
Explanation
Explanation/Reference:
Deterrent Control are intended to discourage a potential attacker For your exam you should know below
information about different security controls
Deterrent Controls
Deterrent Controls are intended to discourage a potential attacker. Access controls act as a deterrent to
threats and attacks by the simple fact that the existence of the control is enough to keep some potential
attackers from attempting to circumvent the control. This is often because the effort required to circumvent
the control is far greater than the potential reward if the attacker is successful, or, conversely, the negative
implications of a failed attack (or getting caught) outweigh the benefits of success. For example, by forcing
the identification and authentication of a user, service, or application, and all that it implies, the potential for
incidents associated with the system is significantly reduced because an attacker will fear association with
the incident. If there are no controls for a given access path, the number of incidents and the potential
impact become infinite. Controls inherently reduce exposure to risk by applying oversight for a process.
This oversight acts as a deterrent, curbing an attacker's appetite in the face of probable repercussions.
The best example of a deterrent control is demonstrated by employees and their propensity to intentionally
perform unauthorized functions, leading to unwanted events. When users begin to understand that by
authenticating into a system to perform a function, their activities are logged and monitored, and it reduces
the likelihood they will attempt such an action. Many threats are based on the anonymity of the threat
agent, and any potential for identification and association with their actions is avoided at all costs. It is this
fundamental reason why access controls are the key target of circumvention by attackers. Deterrents also
take the form of potential punishment if users do something unauthorized. For example, if the organization
policy specifies that an employee installing an unauthorized wireless access point will be fired, that will
determine most employees from installing wireless access points.
Preventative Controls
Preventive controls are intended to avoid an incident from occurring. Preventative access controls keep a
user from performing some activity or function. Preventative controls differ from deterrent controls in that
the control is not optional and cannot (easily) be bypassed. Deterrent controls work on the theory that it is
easier to obey the control rather than to risk the consequences of bypassing the control. In other words,
the power for action resides with the user (or the attacker). Preventative controls place the power of action
with the system, obeying the control is not optional. The only way to bypass the control is to find a flaw in
the control's implementation.
Compensating Controls
Compensating controls are introduced when the existing capabilities of a system do not support the
requirement of a policy. Compensating controls can be technical, procedural, or managerial. Although an
existing system may not support the required controls, there may exist other technology or processes that
can supplement the existing environment, closing the gap in controls, meeting policy requirements, and
reducing overall risk. For example, the access control policy may state that the authentication process
must be encrypted when performed over the Internet. Adjusting an application to natively support
encryption for authentication purposes may be too costly. Secure Socket Layer (SSL), an encryption
protocol, can be employed and layered on top of the authentication process to support the policy
statement.
Other examples include a separation of duties environment, which offers the capability to isolate certain
tasks to compensate for technical limitations in the system and ensure the security of transactions. In
addition, management processes, such as authorization, supervision, and administration, can be used to
compensate for gaps in the access control environment.
Detective Controls
Detective controls warn when something has happened, and are the earliest point in the post- incident
timeline. Access controls are a deterrent to threats and can be aggressively utilized to prevent harmful
incidents through the application of least privilege. However, the detective nature of access controls can
provide significant visibility into the access environment and help organizations manage their access
strategy and related security risk. As mentioned previously, strongly managed access privileges provided
to an authenticated user offer the ability to reduce the risk exposure of the enterprise's assets by limiting
the capabilities that authenticated user has. However, there are few options to control what a user can
perform once privileges are provided. For example, if a user is provided write access to a file and that file is
damaged, altered, or otherwise negatively impacted (either deliberately or unintentionally), the use of
applied access controls will offer visibility into the transaction. The control environment can be established
to log activity regarding the identification, authentication, authorization, and use of privileges on a system.
This can be used to detect the occurrence of errors, the attempts to perform an unauthorized action, or to
validate when provided credentials were exercised. The logging system as a detective device provides
evidence of actions (both successful and unsuccessful) and tasks that were executed by authorized users.
Corrective Controls
When a security incident occurs, elements within the security infrastructure may require corrective actions.
Corrective controls are actions that seek to alter the security posture of an environment to correct any
deficiencies and return the environment to a secure state. A security incident signals the failure of one or
more directive, deterrent, preventative, or compensating controls. The detective controls may have
triggered an alarm or notification, but now the corrective controls must work to stop the incident in its
tracks. Corrective controls can take many forms, all depending on the particular situation at hand or the
particular security failure that needs to be dealt with.
Recovery Controls
Any changes to the access control environment, whether in the face of a security incident or to offer
temporary compensating controls, need to be accurately reinstated and returned to normal operations.
There are several situations that may affect access controls, their applicability, status, or management.
Events can include system outages, attacks, project changes, technical demands, administrative gaps,
and full-blown disaster situations. For example, if an application is not correctly installed or deployed, it
may adversely affect controls placed on system files or even have default administrative accounts
unknowingly implemented upon install. Additionally, an employee may be transferred, quit, or be on
temporary leave that may affect policy requirements regarding separation of duties. An attack on systems
may have resulted in the implantation of a Trojan horse program, potentially exposing private user
information, such as credit card information and financial data. In all of these cases, an undesirable
situation must be rectified as quickly as possible and controls returned to normal operations.
Corrective - Corrective control fixes components or systems after an incident has occurred
Recovery - Recovery controls are intended to bring the environment back to regular operations
QUESTION 240
Which of the following security control is intended to avoid an incident from occurring?
A. Deterrent
B. Preventive
C. Corrective
D. Recovery
Correct Answer: B
Explanation
Explanation/Reference:
Preventive controls are intended to avoid an incident from occurring For your exam you should know below
information about different security controls
Deterrent Controls
Deterrent Controls are intended to discourage a potential attacker. Access controls act as a deterrent to
threats and attacks by the simple fact that the existence of the control is enough to keep some potential
attackers from attempting to circumvent the control. This is often because the effort required to circumvent
the control is far greater than the potential reward if the attacker is successful, or, conversely, the negative
implications of a failed attack (or getting caught) outweigh the benefits of success. For example, by forcing
the identification and authentication of a user, service, or application, and all that it implies, the potential for
incidents associated with the system is significantly reduced because an attacker will fear association with
the incident. If there are no controls for a given access path, the number of incidents and the potential
impact become infinite. Controls inherently reduce exposure to risk by applying oversight for a process.
This oversight acts as a deterrent, curbing an attacker's appetite in the face of probable repercussions.
The best example of a deterrent control is demonstrated by employees and their propensity to intentionally
perform unauthorized functions, leading to unwanted events. When users begin to understand that by
authenticating into a system to perform a function, their activities are logged and monitored, and it reduces
the likelihood they will attempt such an action. Many threats are based on the anonymity of the threat
agent, and any potential for identification and association with their actions is avoided at all costs. It is this
fundamental reason why access controls are the key target of circumvention by attackers. Deterrents also
take the form of potential punishment if users do something unauthorized. For example, if the organization
policy specifies that an employee installing an unauthorized wireless access point will be fired, that will
determine most employees from installing wireless access points.
Preventative Controls
Preventive controls are intended to avoid an incident from occurring. Preventative access controls keep a
user from performing some activity or function. Preventative controls differ from deterrent controls in that
the control is not optional and cannot (easily) be bypassed. Deterrent controls work on the theory that it is
easier to obey the control rather than to risk the consequences of bypassing the control. In other words,
the power for action resides with the user (or the attacker). Preventative controls place the power of action
with the system, obeying the control is not optional. The only way to bypass the control is to find a flaw in
the control's implementation.
Compensating Controls
Compensating controls are introduced when the existing capabilities of a system do not support the
requirement of a policy. Compensating controls can be technical, procedural, or managerial. Although an
existing system may not support the required controls, there may exist other technology or processes that
can supplement the existing environment, closing the gap in controls, meeting policy requirements, and
reducing overall risk. For example, the access control policy may state that the authentication process
must be encrypted when performed over the Internet. Adjusting an application to natively support
encryption for authentication purposes may be too costly. Secure Socket Layer (SSL), an encryption
protocol, can be employed and layered on top of the authentication process to support the policy
statement.
Other examples include a separation of duties environment, which offers the capability to isolate certain
tasks to compensate for technical limitations in the system and ensure the security of transactions. In
addition, management processes, such as authorization, supervision, and administration, can be used to
compensate for gaps in the access control environment.
Detective Controls
Detective controls warn when something has happened, and are the earliest point in the post- incident
timeline. Access controls are a deterrent to threats and can be aggressively utilized to prevent harmful
incidents through the application of least privilege. However, the detective nature of access controls can
provide significant visibility into the access environment and help organizations manage their access
strategy and related security risk. As mentioned previously, strongly managed access privileges provided
to an authenticated user offer the ability to reduce the risk exposure of the enterprise's assets by limiting
the capabilities that authenticated user has. However, there are few options to control what a user can
perform once privileges are provided. For example, if a user is provided write access to a file and that file is
damaged, altered, or otherwise negatively impacted (either deliberately or unintentionally), the use of
applied access controls will offer visibility into the transaction. The control environment can be established
to log activity regarding the identification, authentication, authorization, and use of privileges on a system.
This can be used to detect the occurrence of errors, the attempts to perform an unauthorized action, or to
validate when provided credentials were exercised. The logging system as a detective device provides
evidence of actions (both successful and unsuccessful) and tasks that were executed by authorized users.
Corrective Controls
When a security incident occurs, elements within the security infrastructure may require corrective actions.
Corrective controls are actions that seek to alter the security posture of an environment to correct any
deficiencies and return the environment to a secure state. A security incident signals the failure of one or
more directive, deterrent, preventative, or compensating controls. The detective controls may have
triggered an alarm or notification, but now the corrective controls must work to stop the incident in its
tracks. Corrective controls can take many forms, all depending on the particular situation at hand or the
particular security failure that needs to be dealt with.
Recovery Controls
Any changes to the access control environment, whether in the face of a security incident or to offer
temporary compensating controls, need to be accurately reinstated and returned to normal operations.
There are several situations that may affect access controls, their applicability, status, or management.
Events can include system outages, attacks, project changes, technical demands, administrative gaps,
and full-blown disaster situations. For example, if an application is not correctly installed or deployed, it
may adversely affect controls placed on system files or even have default administrative accounts
unknowingly implemented upon install. Additionally, an employee may be transferred, quit, or be on
temporary leave that may affect policy requirements regarding separation of duties. An attack on systems
may have resulted in the implantation of a Trojan horse program, potentially exposing private user
information, such as credit card information and financial data. In all of these cases, an undesirable
situation must be rectified as quickly as possible and controls returned to normal operations.
Corrective - Corrective control fixes components or systems after an incident has occurred Recovery -
Recovery controls are intended to bring the environment back to regular operations
QUESTION 241
Which of the following control helps to identify an incident's activities and potentially an intruder?
A. Deterrent
B. Preventive
C. Detective
D. Compensating
Correct Answer: C
Explanation
Explanation/Reference:
Detective control helps identify an incident's activities and potentially an intruder For your exam you should
know below information about different security controls
Deterrent Controls
Deterrent Controls are intended to discourage a potential attacker. Access controls act as a deterrent to
threats and attacks by the simple fact that the existence of the control is enough to keep some potential
attackers from attempting to circumvent the control. This is often because the effort required to circumvent
the control is far greater than the potential reward if the attacker is successful, or, conversely, the negative
implications of a failed attack (or getting caught) outweigh the benefits of success. For example, by forcing
the identification and authentication of a user, service, or application, and all that it implies, the potential for
incidents associated with the system is significantly reduced because an attacker will fear association with
the incident. If there are no controls for a given access path, the number of incidents and the potential
impact become infinite. Controls inherently reduce exposure to risk by applying oversight for a process.
This oversight acts as a deterrent, curbing an attacker's appetite in the face of probable repercussions.
The best example of a deterrent control is demonstrated by employees and their propensity to intentionally
perform unauthorized functions, leading to unwanted events. When users begin to understand that by
authenticating into a system to perform a function, their activities are logged and monitored, and it reduces
the likelihood they will attempt such an action. Many threats are based on the anonymity of the threat
agent, and any potential for identification and association with their actions is avoided at all costs. It is this
fundamental reason why access controls are the key target of circumvention by attackers. Deterrents also
take the form of potential punishment if users do something unauthorized. For example, if the organization
policy specifies that an employee installing an unauthorized wireless access point will be fired, that will
determine most employees from installing wireless access points.
Preventative Controls
Preventive controls are intended to avoid an incident from occurring. Preventative access controls keep a
user from performing some activity or function. Preventative controls differ from deterrent controls in that
the control is not optional and cannot (easily) be bypassed. Deterrent controls work on the theory that it is
easier to obey the control rather than to risk the consequences of bypassing the control. In other words,
the power for action resides with the user (or the attacker). Preventative controls place the power of action
with the system, obeying the control is not optional. The only way to bypass the control is to find a flaw in
the control's implementation.
Compensating Controls
Compensating controls are introduced when the existing capabilities of a system do not support the
requirement of a policy. Compensating controls can be technical, procedural, or managerial. Although an
existing system may not support the required controls, there may exist other technology or processes that
can supplement the existing environment, closing the gap in controls, meeting policy requirements, and
reducing overall risk. For example, the access control policy may state that the authentication process
must be encrypted when performed over the Internet. Adjusting an application to natively support
encryption for authentication purposes may be too costly. Secure Socket Layer (SSL), an encryption
protocol, can be employed and layered on top of the authentication process to support the policy
statement.
Other examples include a separation of duties environment, which offers the capability to isolate certain
tasks to compensate for technical limitations in the system and ensure the security of transactions. In
addition, management processes, such as authorization, supervision, and administration, can be used to
compensate for gaps in the access control environment.
Detective Controls
Detective controls warn when something has happened, and are the earliest point in the post- incident
timeline. Access controls are a deterrent to threats and can be aggressively utilized to prevent harmful
incidents through the application of least privilege. However, the detective nature of access controls can
provide significant visibility into the access environment and help organizations manage their access
strategy and related security risk. As mentioned previously, strongly managed access privileges provided
to an authenticated user offer the ability to reduce the risk exposure of the enterprise's assets by limiting
the capabilities that authenticated user has. However, there are few options to control what a user can
perform once privileges are provided. For example, if a user is provided write access to a file and that file is
damaged, altered, or otherwise negatively impacted (either deliberately or unintentionally), the use of
applied access controls will offer visibility into the transaction. The control environment can be established
to log activity regarding the identification, authentication, authorization, and use of privileges on a system.
This can be used to detect the occurrence of errors, the attempts to perform an unauthorized action, or to
validate when provided credentials were exercised. The logging system as a detective device provides
evidence of actions (both successful and unsuccessful) and tasks that were executed by authorized users.
Corrective Controls
When a security incident occurs, elements within the security infrastructure may require corrective actions.
Corrective controls are actions that seek to alter the security posture of an environment to correct any
deficiencies and return the environment to a secure state. A security incident signals the failure of one or
more directive, deterrent, preventative, or compensating controls. The detective controls may have
triggered an alarm or notification, but now the corrective controls must work to stop the incident in its
tracks. Corrective controls can take many forms, all depending on the particular situation at hand or the
particular security failure that needs to be dealt with.
Recovery Controls
Any changes to the access control environment, whether in the face of a security incident or to offer
temporary compensating controls, need to be accurately reinstated and returned to normal operations.
There are several situations that may affect access controls, their applicability, status, or management.
Events can include system outages, attacks, project changes, technical demands, administrative gaps,
and full-blown disaster situations. For example, if an application is not correctly installed or deployed, it
may adversely affect controls placed on system files or even have default administrative accounts
unknowingly implemented upon install. Additionally, an employee may be transferred, quit, or be on
temporary leave that may affect policy requirements regarding separation of duties. An attack on systems
may have resulted in the implantation of a Trojan horse program, potentially exposing private user
information, such as credit card information and financial data. In all of these cases, an undesirable
situation must be rectified as quickly as possible and controls returned to normal operations.
The following answers are incorrect:
QUESTION 242
Which of the following is NOT an example of preventive control?
Correct Answer: D
Explanation
Explanation/Reference:
The word NOT is used as a keyword in the question. You need to find out a security control from an given
options which in not preventive. Duplicate checking of a calculation is a detective control and not a
preventive control.
For your exam you should know below information about different security controls
Deterrent Controls
Deterrent Controls are intended to discourage a potential attacker. Access controls act as a deterrent to
threats and attacks by the simple fact that the existence of the control is enough to keep some potential
attackers from attempting to circumvent the control. This is often because the effort required to circumvent
the control is far greater than the potential reward if the attacker is successful, or, conversely, the negative
implications of a failed attack (or getting caught) outweigh the benefits of success. For example, by forcing
the identification and authentication of a user, service, or application, and all that it implies, the potential for
incidents associated with the system is significantly reduced because an attacker will fear association with
the incident. If there are no controls for a given access path, the number of incidents and the potential
impact become infinite. Controls inherently reduce exposure to risk by applying oversight for a process.
This oversight acts as a deterrent, curbing an attacker's appetite in the face of probable repercussions.
The best example of a deterrent control is demonstrated by employees and their propensity to intentionally
perform unauthorized functions, leading to unwanted events. When users begin to understand that by
authenticating into a system to perform a function, their activities are logged and monitored, and it reduces
the likelihood they will attempt such an action. Many threats are based on the anonymity of the threat
agent, and any potential for identification and association with their actions is avoided at all costs. It is this
fundamental reason why access controls are the key target of circumvention by attackers. Deterrents also
take the form of potential punishment if users do something unauthorized. For example, if the organization
policy specifies that an employee installing an unauthorized wireless access point will be fired, that will
determine most employees from installing wireless access points.
Preventative Controls
Preventive controls are intended to avoid an incident from occurring. Preventative access controls keep a
user from performing some activity or function. Preventative controls differ from deterrent controls in that
the control is not optional and cannot (easily) be bypassed. Deterrent controls work on the theory that it is
easier to obey the control rather than to risk the consequences of bypassing the control. In other words,
the power for action resides with the user (or the attacker). Preventative controls place the power of action
with the system, obeying the control is not optional. The only way to bypass the control is to find a flaw in
the control's implementation.
Compensating Controls
Compensating controls are introduced when the existing capabilities of a system do not support the
requirement of a policy. Compensating controls can be technical, procedural, or managerial. Although an
existing system may not support the required controls, there may exist other technology or processes that
can supplement the existing environment, closing the gap in controls, meeting policy requirements, and
reducing overall risk. For example, the access control policy may state that the authentication process
must be encrypted when performed over the Internet. Adjusting an application to natively support
encryption for authentication purposes may be too costly. Secure Socket Layer (SSL), an encryption
protocol, can be employed and layered on top of the authentication process to support the policy
statement. Other examples include a separation of duties environment, which offers the capability to
isolate certain tasks to compensate for technical limitations in the system and ensure the security of
transactions. In addition, management processes, such as authorization, supervision, and administration,
can be used to compensate for gaps in the access control environment.
Detective Controls
Detective controls warn when something has happened, and are the earliest point in the post- incident
timeline. Access controls are a deterrent to threats and can be aggressively utilized to prevent harmful
incidents through the application of least privilege. However, the detective nature of access controls can
provide significant visibility into the access environment and help organizations manage their access
strategy and related security risk. As mentioned previously, strongly managed access privileges provided
to an authenticated user offer the ability to reduce the risk exposure of the enterprise's assets by limiting
the capabilities that authenticated user has. However, there are few options to control what a user can
perform once privileges are provided. For example, if a user is provided write access to a file and that file is
damaged, altered, or otherwise negatively impacted (either deliberately or unintentionally), the use of
applied access controls will offer visibility into the transaction. The control environment can be established
to log activity regarding the identification, authentication, authorization, and use of privileges on a system.
This can be used to detect the occurrence of errors, the attempts to perform an unauthorized action, or to
validate when provided credentials were exercised. The logging system as a detective device provides
evidence of actions (both successful and unsuccessful) and tasks that were executed by authorized users.
Corrective Controls
When a security incident occurs, elements within the security infrastructure may require corrective actions.
Corrective controls are actions that seek to alter the security posture of an environment to correct any
deficiencies and return the environment to a secure state. A security incident signals the failure of one or
more directive, deterrent, preventative, or compensating controls. The detective controls may have
triggered an alarm or notification, but now the corrective controls must work to stop the incident in its
tracks. Corrective controls can take many forms, all depending on the particular situation at hand or the
particular security failure that needs to be dealt with.
Recovery Controls
Any changes to the access control environment, whether in the face of a security incident or to offer
temporary compensating controls, need to be accurately reinstated and returned to normal operations.
There are several situations that may affect access controls, their applicability, status, or management.
Events can include system outages, attacks, project changes, technical demands, administrative gaps,
and full-blown disaster situations. For example, if an application is not correctly installed or deployed, it
may adversely affect controls placed on system files or even have default administrative accounts
unknowingly implemented upon install. Additionally, an employee may be transferred, quit, or be on
temporary leave that may affect policy requirements regarding separation of duties. An attack on systems
may have resulted in the implantation of a Trojan horse program, potentially exposing private user
information, such as credit card information and financial data. In all of these cases, an undesirable
situation must be rectified as quickly as possible and controls returned to normal operations.
For your exam you should know below information about different security controls
Deterrent Controls
Deterrent Controls are intended to discourage a potential attacker. Access controls act as a deterrent to
threats and attacks by the simple fact that the existence of the control is enough to keep some potential
attackers from attempting to circumvent the control. This is often because the effort required to circumvent
the control is far greater than the potential reward if the attacker is successful, or, conversely, the negative
implications of a failed attack (or getting caught) outweigh the benefits of success. For example, by forcing
the identification and authentication of a user, service, or application, and all that it implies, the potential for
incidents associated with the system is significantly reduced because an attacker will fear association with
the incident. If there are no controls for a given access path, the number of incidents and the potential
impact become infinite. Controls inherently reduce exposure to risk by applying oversight for a process.
This oversight acts as a deterrent, curbing an attacker's appetite in the face of probable repercussions.
The best example of a deterrent control is demonstrated by employees and their propensity to intentionally
perform unauthorized functions, leading to unwanted events. When users begin to understand that by
authenticating into a system to perform a function, their activities are logged and monitored, and it reduces
the likelihood they will attempt such an action. Many threats are based on the anonymity of the threat
agent, and any potential for identification and association with their actions is avoided at all costs. It is this
fundamental reason why access controls are the key target of circumvention by attackers. Deterrents also
take the form of potential punishment if users do something unauthorized. For example, if the organization
policy specifies that an employee installing an unauthorized wireless access point will be fired, that will
determine most employees from installing wireless access points.
Preventative Controls
Preventive controls are intended to avoid an incident from occurring. Preventative access controls keep a
user from performing some activity or function. Preventative controls differ from deterrent controls in that
the control is not optional and cannot (easily) be bypassed. Deterrent controls work on the theory that it is
easier to obey the control rather than to risk the consequences of bypassing the control. In other words,
the power for action resides with the user (or the attacker). Preventative controls place the power of action
with the system, obeying the control is not optional. The only way to bypass the control is to find a flaw in
the control's implementation.
Compensating Controls
Compensating controls are introduced when the existing capabilities of a system do not support the
requirement of a policy. Compensating controls can be technical, procedural, or managerial. Although an
existing system may not support the required controls, there may exist other technology or processes that
can supplement the existing environment, closing the gap in controls, meeting policy requirements, and
reducing overall risk.
For example, the access control policy may state that the authentication process must be encrypted when
performed over the Internet. Adjusting an application to natively support encryption for authentication
purposes may be too costly. Secure Socket Layer (SSL), an encryption protocol, can be employed and
layered on top of the authentication process to support the policy statement.
Other examples include a separation of duties environment, which offers the capability to isolate certain
tasks to compensate for technical limitations in the system and ensure the security of transactions. In
addition, management processes, such as authorization, supervision, and administration, can be used to
compensate for gaps in the access control environment.
Detective Controls
Detective controls warn when something has happened, and are the earliest point in the post- incident
timeline. Access controls are a deterrent to threats and can be aggressively utilized to prevent harmful
incidents through the application of least privilege. However, the detective nature of access controls can
provide significant visibility into the access environment and help organizations manage their access
strategy and related security risk. As mentioned previously, strongly managed access privileges provided
to an authenticated user offer the ability to reduce the risk exposure of the enterprise's assets by limiting
the capabilities that authenticated user has. However, there are few options to control what a user can
perform once privileges are provided. For example, if a user is provided write access to a file and that file is
damaged, altered, or otherwise negatively impacted (either deliberately or unintentionally), the use of
applied access controls will offer visibility into the transaction. The control environment can be established
to log activity regarding the identification, authentication, authorization, and use of privileges on a system.
This can be used to detect the occurrence of errors, the attempts to perform an unauthorized action, or to
validate when provided credentials were exercised. The logging system as a detective device provides
evidence of actions (both successful and unsuccessful) and tasks that were executed by authorized users.
Corrective Controls
When a security incident occurs, elements within the security infrastructure may require corrective actions.
Corrective controls are actions that seek to alter the security posture of an environment to correct any
deficiencies and return the environment to a secure state. A security incident signals the failure of one or
more directive, deterrent, preventative, or compensating controls. The detective controls may have
triggered an alarm or notification, but now the corrective controls must work to stop the incident in its
tracks. Corrective controls can take many forms, all depending on the particular situation at hand or the
particular security failure that needs to be dealt with.
Recovery Controls
Any changes to the access control environment, whether in the face of a security incident or to offer
temporary compensating controls, need to be accurately reinstated and returned to normal operations.
There are several situations that may affect access controls, their applicability, status, or management.
Events can include system outages, attacks, project changes, technical demands, administrative gaps,
and full-blown disaster situations. For example, if an application is not correctly installed or deployed, it
may adversely affect controls placed on system files or even have default administrative accounts
unknowingly implemented upon install. Additionally, an employee may be transferred, quit, or be on
temporary leave that may affect policy requirements regarding separation of duties. An attack on systems
may have resulted in the implantation of a Trojan horse program, potentially exposing private user
information, such as credit card information and financial data. In all of these cases, an undesirable
situation must be rectified as quickly as possible and controls returned to normal operations.
The following answers are incorrect:
The other examples are belongs to Preventive control.
QUESTION 243
Which of the following is NOT an example of corrective control?
A. OS Upgrade
B. Backup and restore
C. Contingency planning
D. System Monitoring
Correct Answer: D
Explanation
Explanation/Reference:
The word NOT is used as a keyword in the question. You need to find out a security control from an given
options which in not corrective control. System Monitoring is a detective control and not a corrective
control.
For your exam you should know below information about different security controls
Deterrent Controls
Deterrent Controls are intended to discourage a potential attacker. Access controls act as a deterrent to
threats and attacks by the simple fact that the existence of the control is enough to keep some potential
attackers from attempting to circumvent the control. This is often because the effort required to circumvent
the control is far greater than the potential reward if the attacker is successful, or, conversely, the negative
implications of a failed attack (or getting caught) outweigh the benefits of success. For example, by forcing
the identification and authentication of a user, service, or application, and all that it implies, the potential for
incidents associated with the system is significantly reduced because an attacker will fear association with
the incident. If there are no controls for a given access path, the number of incidents and the potential
impact become infinite. Controls inherently reduce exposure to risk by applying oversight for a process.
This oversight acts as a deterrent, curbing an attacker's appetite in the face of probable repercussions.
The best example of a deterrent control is demonstrated by employees and their propensity to intentionally
perform unauthorized functions, leading to unwanted events. When users begin to understand that by
authenticating into a system to perform a function, their activities are logged and monitored, and it reduces
the likelihood they will attempt such an action. Many threats are based on the anonymity of the threat
agent, and any potential for identification and association with their actions is avoided at all costs. It is this
fundamental reason why access controls are the key target of circumvention by attackers. Deterrents also
take the form of potential punishment if users do something unauthorized. For example, if the organization
policy specifies that an employee installing an unauthorized wireless access point will be fired, that will
determine most employees from installing wireless access points.
Preventative Controls
Preventive controls are intended to avoid an incident from occurring. Preventative access controls keep a
user from performing some activity or function. Preventative controls differ from deterrent controls in that
the control is not optional and cannot (easily) be bypassed. Deterrent controls work on the theory that it is
easier to obey the control rather than to risk the consequences of bypassing the control. In other words,
the power for action resides with the user (or the attacker). Preventative controls place the power of action
with the system, obeying the control is not optional. The only way to bypass the control is to find a flaw in
the control's implementation.
Compensating Controls
Compensating controls are introduced when the existing capabilities of a system do not support the
requirement of a policy. Compensating controls can be technical, procedural, or managerial. Although an
existing system may not support the required controls, there may exist other technology or processes that
can supplement the existing environment, closing the gap in controls, meeting policy requirements, and
reducing overall risk. For example, the access control policy may state that the authentication process
must be encrypted when performed over the Internet. Adjusting an application to natively support
encryption for authentication purposes may be too costly. Secure Socket Layer (SSL), an encryption
protocol, can be employed and layered on top of the authentication process to support the policy
statement. Other examples include a separation of duties environment, which offers the capability to
isolate certain tasks to compensate for technical limitations in the system and ensure the security of
transactions. In addition, management processes, such as authorization, supervision, and administration,
can be used to compensate for gaps in the access control environment.
Detective Controls
Detective controls warn when something has happened, and are the earliest point in the post- incident
timeline. Access controls are a deterrent to threats and can be aggressively utilized to prevent harmful
incidents through the application of least privilege. However, the detective nature of access controls can
provide significant visibility into the access environment and help organizations manage their access
strategy and related security risk. As mentioned previously, strongly managed access privileges provided
to an authenticated user offer the ability to reduce the risk exposure of the enterprise's assets by limiting
the capabilities that authenticated user has. However, there are few options to control what a user can
perform once privileges are provided. For example, if a user is provided write access to a file and that file is
damaged, altered, or otherwise negatively impacted (either deliberately or unintentionally), the use of
applied access controls will offer visibility into the transaction. The control environment can be established
to log activity regarding the identification, authentication, authorization, and use of privileges on a system.
This can be used to detect the occurrence of errors, the attempts to perform an unauthorized action, or to
validate when provided credentials were exercised. The logging system as a detective device provides
evidence of actions (both successful and unsuccessful) and tasks that were executed by authorized users.
Corrective Controls
When a security incident occurs, elements within the security infrastructure may require corrective actions.
Corrective controls are actions that seek to alter the security posture of an environment to correct any
deficiencies and return the environment to a secure state. A security incident signals the failure of one or
more directive, deterrent, preventative, or compensating controls. The detective controls may have
triggered an alarm or notification, but now the corrective controls must work to stop the incident in its
tracks. Corrective controls can take many forms, all depending on the particular situation at hand or the
particular security failure that needs to be dealt with.
Recovery Controls
Any changes to the access control environment, whether in the face of a security incident or to offer
temporary compensating controls, need to be accurately reinstated and returned to normal operations.
There are several situations that may affect access controls, their applicability, status, or management.
Events can include system outages, attacks, project changes, technical demands, administrative gaps,
and full-blown disaster situations. For example, if an application is not correctly installed or deployed, it
may adversely affect controls placed on system files or even have default administrative accounts
unknowingly implemented upon install. Additionally, an employee may be transferred, quit, or be on
temporary leave that may affect policy requirements regarding separation of duties. An attack on systems
may have resulted in the implantation of a Trojan horse program, potentially exposing private user
information, such as credit card information and financial data. In all of these cases, an undesirable
situation must be rectified as quickly as possible and controls returned to normal operations.
For your exam you should know below information about different security controls
Deterrent Controls
Deterrent Controls are intended to discourage a potential attacker. Access controls act as a deterrent to
threats and attacks by the simple fact that the existence of the control is enough to keep some potential
attackers from attempting to circumvent the control. This is often because the effort required to circumvent
the control is far greater than the potential reward if the attacker is successful, or, conversely, the negative
implications of a failed attack (or getting caught) outweigh the benefits of success. For example, by forcing
the identification and authentication of a user, service, or application, and all that it implies, the potential for
incidents associated with the system is significantly reduced because an attacker will fear association with
the incident. If there are no controls for a given access path, the number of incidents and the potential
impact become infinite. Controls inherently reduce exposure to risk by applying oversight for a process.
This oversight acts as a deterrent, curbing an attacker's appetite in the face of probable repercussions.
The best example of a deterrent control is demonstrated by employees and their propensity to intentionally
perform unauthorized functions, leading to unwanted events. When users begin to understand that by
authenticating into a system to perform a function, their activities are logged and monitored, and it reduces
the likelihood they will attempt such an action. Many threats are based on the anonymity of the threat
agent, and any potential for identification and association with their actions is avoided at all costs. It is this
fundamental reason why access controls are the key target of circumvention by attackers. Deterrents also
take the form of potential punishment if users do something unauthorized. For example, if the organization
policy specifies that an employee installing an unauthorized wireless access point will be fired, that will
determine most employees from installing wireless access points.
Preventative Controls
Preventive controls are intended to avoid an incident from occurring. Preventative access controls keep a
user from performing some activity or function. Preventative controls differ from deterrent controls in that
the control is not optional and cannot (easily) be bypassed. Deterrent controls work on the theory that it is
easier to obey the control rather than to risk the consequences of bypassing the control. In other words,
the power for action resides with the user (or the attacker). Preventative controls place the power of action
with the system, obeying the control is not optional. The only way to bypass the control is to find a flaw in
the control's implementation.
Compensating Controls
Compensating controls are introduced when the existing capabilities of a system do not support the
requirement of a policy. Compensating controls can be technical, procedural, or managerial. Although an
existing system may not support the required controls, there may exist other technology or processes that
can supplement the existing environment, closing the gap in controls, meeting policy requirements, and
reducing overall risk. For example, the access control policy may state that the authentication process
must be encrypted when performed over the Internet. Adjusting an application to natively support
encryption for authentication purposes may be too costly. Secure Socket Layer (SSL), an encryption
protocol, can be employed and layered on top of the authentication process to support the policy
statement.
Other examples include a separation of duties environment, which offers the capability to isolate certain
tasks to compensate for technical limitations in the system and ensure the security of transactions. In
addition, management processes, such as authorization, supervision, and administration, can be used to
compensate for gaps in the access control environment.
Detective Controls
Detective controls warn when something has happened, and are the earliest point in the post- incident
timeline. Access controls are a deterrent to threats and can be aggressively utilized to prevent harmful
incidents through the application of least privilege. However, the detective nature of access controls can
provide significant visibility into the access environment and help organizations manage their access
strategy and related security risk.
As mentioned previously, strongly managed access privileges provided to an authenticated user offer the
ability to reduce the risk exposure of the enterprise's assets by limiting the capabilities that authenticated
user has. However, there are few options to control what a user can perform once privileges are provided.
For example, if a user is provided write access to a file and that file is damaged, altered, or otherwise
negatively impacted (either deliberately or unintentionally), the use of applied access controls will offer
visibility into the transaction. The control environment can be established to log activity regarding the
identification, authentication, authorization, and use of privileges on a system.
This can be used to detect the occurrence of errors, the attempts to perform an unauthorized action, or to
validate when provided credentials were exercised. The logging system as a detective device provides
evidence of actions (both successful and unsuccessful) and tasks that were executed by authorized users.
Corrective Controls
When a security incident occurs, elements within the security infrastructure may require corrective actions.
Corrective controls are actions that seek to alter the security posture of an environment to correct any
deficiencies and return the environment to a secure state. A security incident signals the failure of one or
more directive, deterrent, preventative, or compensating controls. The detective controls may have
triggered an alarm or notification, but now the corrective controls must work to stop the incident in its
tracks. Corrective controls can take many forms, all depending on the particular situation at hand or the
particular security failure that needs to be dealt with.
Recovery Controls
Any changes to the access control environment, whether in the face of a security incident or to offer
temporary compensating controls, need to be accurately reinstated and returned to normal operations.
There are several situations that may affect access controls, their applicability, status, or management.
Events can include system outages, attacks, project changes, technical demands, administrative gaps,
and full-blown disaster situations. For example, if an application is not correctly installed or deployed, it
may adversely affect controls placed on system files or even have default administrative accounts
unknowingly implemented upon install. Additionally, an employee may be transferred, quit, or be on
temporary leave that may affect policy requirements regarding separation of duties. An attack on systems
may have resulted in the implantation of a Trojan horse program, potentially exposing private user
information, such as credit card information and financial data. In all of these cases, an undesirable
situation must be rectified as quickly as possible and controls returned to normal operations.
QUESTION 244
Which of the following is NOT an example of a detective control?
A. System Monitor
B. IDS
C. Monitor detector
D. Backup data restore
Correct Answer: D
Explanation
Explanation/Reference:
The word NOT is used as a keyword in the question. You need to find out a security control from an given
options which in not detective control. Backup data restore is a corrective control and not a detective
control.
For your exam you should know below information about different security controls
Deterrent Controls
Deterrent Controls are intended to discourage a potential attacker. Access controls act as a deterrent to
threats and attacks by the simple fact that the existence of the control is enough to keep some potential
attackers from attempting to circumvent the control. This is often because the effort required to circumvent
the control is far greater than the potential reward if the attacker is successful, or, conversely, the negative
implications of a failed attack (or getting caught) outweigh the benefits of success. For example, by forcing
the identification and authentication of a user, service, or application, and all that it implies, the potential for
incidents associated with the system is significantly reduced because an attacker will fear association with
the incident. If there are no controls for a given access path, the number of incidents and the potential
impact become infinite. Controls inherently reduce exposure to risk by applying oversight for a process.
This oversight acts as a deterrent, curbing an attacker's appetite in the face of probable repercussions.
The best example of a deterrent control is demonstrated by employees and their propensity to intentionally
perform unauthorized functions, leading to unwanted events. When users begin to understand that by
authenticating into a system to perform a function, their activities are logged and monitored, and it reduces
the likelihood they will attempt such an action. Many threats are based on the anonymity of the threat
agent, and any potential for identification and association with their actions is avoided at all costs. It is this
fundamental reason why access controls are the key target of circumvention by attackers. Deterrents also
take the form of potential punishment if users do something unauthorized. For example, if the organization
policy specifies that an employee installing an unauthorized wireless access point will be fired, that will
determine most employees from installing wireless access points.
Preventative Controls
Preventive controls are intended to avoid an incident from occurring. Preventative access controls keep a
user from performing some activity or function. Preventative controls differ from deterrent controls in that
the control is not optional and cannot (easily) be bypassed. Deterrent controls work on the theory that it is
easier to obey the control rather than to risk the consequences of bypassing the control. In other words,
the power for action resides with the user (or the attacker). Preventative controls place the power of action
with the system, obeying the control is not optional. The only way to bypass the control is to find a flaw in
the control's implementation.
Compensating Controls
Compensating controls are introduced when the existing capabilities of a system do not support the
requirement of a policy. Compensating controls can be technical, procedural, or managerial. Although an
existing system may not support the required controls, there may exist other technology or processes that
can supplement the existing environment, closing the gap in controls, meeting policy requirements, and
reducing overall risk. For example, the access control policy may state that the authentication process
must be encrypted when performed over the Internet. Adjusting an application to natively support
encryption for authentication purposes may be too costly. Secure Socket Layer (SSL), an encryption
protocol, can be employed and layered on top of the authentication process to support the policy
statement. Other examples include a separation of duties environment, which offers the capability to
isolate certain tasks to compensate for technical limitations in the system and ensure the security of
transactions. In addition, management processes, such as authorization, supervision, and administration,
can be used to compensate for gaps in the access control environment.
Detective Controls
Detective controls warn when something has happened, and are the earliest point in the post- incident
timeline. Access controls are a deterrent to threats and can be aggressively utilized to prevent harmful
incidents through the application of least privilege. However, the detective nature of access controls can
provide significant visibility into the access environment and help organizations manage their access
strategy and related security risk. As mentioned previously, strongly managed access privileges provided
to an authenticated user offer the ability to reduce the risk exposure of the enterprise's assets by limiting
the capabilities that authenticated user has. However, there are few options to control what a user can
perform once privileges are provided. For example, if a user is provided write access to a file and that file is
damaged, altered, or otherwise negatively impacted (either deliberately or unintentionally), the use of
applied access controls will offer visibility into the transaction. The control environment can be established
to log activity regarding the identification, authentication, authorization, and use of privileges on a system.
This can be used to detect the occurrence of errors, the attempts to perform an unauthorized action, or to
validate when provided credentials were exercised. The logging system as a detective device provides
evidence of actions (both successful and unsuccessful) and tasks that were executed by authorized users.
Corrective Controls
When a security incident occurs, elements within the security infrastructure may require corrective actions.
Corrective controls are actions that seek to alter the security posture of an environment to correct any
deficiencies and return the environment to a secure state. A security incident signals the failure of one or
more directive, deterrent, preventative, or compensating controls. The detective controls may have
triggered an alarm or notification, but now the corrective controls must work to stop the incident in its
tracks. Corrective controls can take many forms, all depending on the particular situation at hand or the
particular security failure that needs to be dealt with.
Recovery Controls
Any changes to the access control environment, whether in the face of a security incident or to offer
temporary compensating controls, need to be accurately reinstated and returned to normal operations.
There are several situations that may affect access controls, their applicability, status, or management.
Events can include system outages, attacks, project changes, technical demands, administrative gaps,
and full-blown disaster situations. For example, if an application is not correctly installed or deployed, it
may adversely affect controls placed on system files or even have default administrative accounts
unknowingly implemented upon install. Additionally, an employee may be transferred, quit, or be on
temporary leave that may affect policy requirements regarding separation of duties. An attack on systems
may have resulted in the implantation of a Trojan horse program, potentially exposing private user
information, such as credit card information and financial data. In all of these cases, an undesirable
situation must be rectified as quickly as possible and controls returned to normal operations.
For your exam you should know below information about different security controls
Deterrent Controls
Deterrent Controls are intended to discourage a potential attacker. Access controls act as a deterrent to
threats and attacks by the simple fact that the existence of the control is enough to keep some potential
attackers from attempting to circumvent the control. This is often because the effort required to circumvent
the control is far greater than the potential reward if the attacker is successful, or, conversely, the negative
implications of a failed attack (or getting caught) outweigh the benefits of success. For example, by forcing
the identification and authentication of a user, service, or application, and all that it implies, the potential for
incidents associated with the system is significantly reduced because an attacker will fear association with
the incident. If there are no controls for a given access path, the number of incidents and the potential
impact become infinite. Controls inherently reduce exposure to risk by applying oversight for a process.
This oversight acts as a deterrent, curbing an attacker's appetite in the face of probable repercussions.
The best example of a deterrent control is demonstrated by employees and their propensity to intentionally
perform unauthorized functions, leading to unwanted events.
When users begin to understand that by authenticating into a system to perform a function, their activities
are logged and monitored, and it reduces the likelihood they will attempt such an action. Many threats are
based on the anonymity of the threat agent, and any potential for identification and association with their
actions is avoided at all costs. It is this fundamental reason why access controls are the key target of
circumvention by attackers. Deterrents also take the form of potential punishment if users do something
unauthorized. For example, if the organization policy specifies that an employee installing an unauthorized
wireless access point will be fired, that will determine most employees from installing wireless access
points.
Preventative Controls
Preventive controls are intended to avoid an incident from occurring. Preventative access controls keep a
user from performing some activity or function. Preventative controls differ from deterrent controls in that
the control is not optional and cannot (easily) be bypassed. Deterrent controls work on the theory that it is
easier to obey the control rather than to risk the consequences of bypassing the control. In other words,
the power for action resides with the user (or the attacker). Preventative controls place the power of action
with the system, obeying the control is not optional. The only way to bypass the control is to find a flaw in
the control's implementation.
Compensating Controls
Compensating controls are introduced when the existing capabilities of a system do not support the
requirement of a policy. Compensating controls can be technical, procedural, or managerial. Although an
existing system may not support the required controls, there may exist other technology or processes that
can supplement the existing environment, closing the gap in controls, meeting policy requirements, and
reducing overall risk. For example, the access control policy may state that the authentication process
must be encrypted when performed over the Internet. Adjusting an application to natively support
encryption for authentication purposes may be too costly. Secure Socket Layer (SSL), an encryption
protocol, can be employed and layered on top of the authentication process to support the policy
statement.
Other examples include a separation of duties environment, which offers the capability to isolate certain
tasks to compensate for technical limitations in the system and ensure the security of transactions. In
addition, management processes, such as authorization, supervision, and administration, can be used to
compensate for gaps in the access control environment.
Detective Controls
Detective controls warn when something has happened, and are the earliest point in the post- incident
timeline. Access controls are a deterrent to threats and can be aggressively utilized to prevent harmful
incidents through the application of least privilege. However, the detective nature of access controls can
provide significant visibility into the access environment and help organizations manage their access
strategy and related security risk. As mentioned previously, strongly managed access privileges provided
to an authenticated user offer the ability to reduce the risk exposure of the enterprise's assets by limiting
the capabilities that authenticated user has. However, there are few options to control what a user can
perform once privileges are provided. For example, if a user is provided write access to a file and that file is
damaged, altered, or otherwise negatively impacted (either deliberately or unintentionally), the use of
applied access controls will offer visibility into the transaction. The control environment can be established
to log activity regarding the identification, authentication, authorization, and use of privileges on a system.
This can be used to detect the occurrence of errors, the attempts to perform an unauthorized action, or to
validate when provided credentials were exercised. The logging system as a detective device provides
evidence of actions (both successful and unsuccessful) and tasks that were executed by authorized users.
Corrective Controls
When a security incident occurs, elements within the security infrastructure may require corrective actions.
Corrective controls are actions that seek to alter the security posture of an environment to correct any
deficiencies and return the environment to a secure state. A security incident signals the failure of one or
more directive, deterrent, preventative, or compensating controls. The detective controls may have
triggered an alarm or notification, but now the corrective controls must work to stop the incident in its
tracks. Corrective controls can take many forms, all depending on the particular situation at hand or the
particular security failure that needs to be dealt with.
Recovery Controls
Any changes to the access control environment, whether in the face of a security incident or to offer
temporary compensating controls, need to be accurately reinstated and returned to normal operations.
There are several situations that may affect access controls, their applicability, status, or management.
Events can include system outages, attacks, project changes, technical demands, administrative gaps,
and full-blown disaster situations. For example, if an application is not correctly installed or deployed, it
may adversely affect controls placed on system files or even have default administrative accounts
unknowingly implemented upon install. Additionally, an employee may be transferred, quit, or be on
temporary leave that may affect policy requirements regarding separation of duties. An attack on systems
may have resulted in the implantation of a Trojan horse program, potentially exposing private user
information, such as credit card information and financial data. In all of these cases, an undesirable
situation must be rectified as quickly as possible and controls returned to normal operations.
QUESTION 245
During an IS audit, auditor has observed that authentication and authorization steps are split into two
functions and there is a possibility to force the authorization step to be completed before the authentication
step. Which of the following technique an attacker could user to force authorization step before
authentication?
A. Eavesdropping
B. Traffic analysis
C. Masquerading
D. Race Condition
Correct Answer: D
Explanation
Explanation/Reference:
A race condition is when processes carry out their tasks on a shared resource in an incorrect order. A race
condition is possible when two or more processes use a shared resource, as in data within a variable. It is
important that the processes carry out their functionality in the correct sequence. If process 2 carried out its
task on the data before process 1, the result will be much different than if process1 carried out its tasks on
the data before process 2 In software, when the authentication and authorization steps are split into two
functions, there is a possibility an attacker could use a race condition to force the authorization step to be
completed before the authentication step. This would be a flaw in the software that the attacker has figured
out how to exploit. A race condition occurs when two or more processes use the same resource and the
sequences of steps within the software can be carried out in an improper order, something that can
drastically affect the output. So, an attacker can force the authorization step to take place before the
authentication step and gain unauthorized access to a resource.
The following answers are incorrect:
Eavesdropping - is the act of secretly listening to the private conversation of others without their consent,
as defined by Black's Law Dictionary. This is commonly thought to be unethical and there is an old adage
that "eavesdroppers seldom hear anything good of themselves...eavesdroppers always try to listen to
matters that concern them."
Traffic analysis - is the process of intercepting and examining messages in order to deduce information
from patterns in communication. It can be performed even when the messages are encrypted and cannot
be decrypted. In general, the greater the number of messages observed, or even intercepted and stored,
the more can be inferred from the traffic. Traffic analysis can be performed in the context of military
intelligence, counter-intelligence, or pattern-of-life analysis, and is a concern in computer security.
Masquerading - A masquerade attack is an attack that uses a fake identity, such as a network identity, to
gain unauthorized access to personal computer information through legitimate access identification. If an
authorization process is not fully protected, it can become extremely vulnerable to a masquerade attack.
Masquerade attacks can be perpetrated using stolen passwords and logons, by locating gaps in programs,
or by finding a way around the authentication process. The attack can be triggered either by someone
within the organization or by an outsider if the organization is connected to a public network. The amount
of access masquerade attackers get depends on the level of authorization they've managed to attain. As
such, masquerade attackers can have a full smorgasbord of cyber crime opportunities if they've gained the
highest access authority to a business organization. Personal attacks, although less common, can also be
harmful.
Following reference(s) were/was used to create this question:
QUESTION 246
Which of the following attack is also known as Time of Check(TOC)/Time of Use(TOU)?
A. Eavesdropping
B. Traffic analysis
C. Masquerading
D. Race Condition
Correct Answer: D
Explanation
Explanation/Reference:
A Race Condition attack is also known as Time of Check(TOC)/Time of Use(TOU). A race condition is
when processes carry out their tasks on a shared resource in an incorrect order. A race condition is
possible when two or more processes use a shared resource, as in data within a variable. It is important
that the processes carry out their functionality in the correct sequence. If process 2 carried out its task on
the data before process 1, the result will be much different than if process1 carried out its tasks on the data
before process 2 In software, when the authentication and authorization steps are split into two functions,
there is a possibility an attacker could use a race condition to force the authorization step to be completed
before the authentication step. This would be a flaw in the software that the attacker has figured out how to
exploit. A race condition occurs when two or more processes use the same resource and the sequences of
steps within the software can be carried out in an improper order, something that can drastically affect the
output. So, an attacker can force the authorization step to take place before the authentication step and
gain unauthorized access to a resource.
Traffic analysis - is the process of intercepting and examining messages in order to deduce information
from patterns in communication. It can be performed even when the messages are encrypted and cannot
be decrypted. In general, the greater the number of messages observed, or even intercepted and stored,
the more can be inferred from the traffic. Traffic analysis can be performed in the context of military
intelligence, counter-intelligence, or pattern-of-life analysis, and is a concern in computer security.
Masquerading - A masquerade attack is an attack that uses a fake identity, such as a network identity, to
gain unauthorized access to personal computer information through legitimate access identification. If an
authorization process is not fully protected, it can become extremely vulnerable to a masquerade attack.
Masquerade attacks can be perpetrated using stolen passwords and logons, by locating gaps in programs,
or by finding a way around the authentication process. The attack can be triggered either by someone
within the organization or by an outsider if the organization is connected to a public network. The amount
of access masquerade attackers get depends on the level of authorization they've managed to attain. As
such, masquerade attackers can have a full smorgasbord of cyber crime opportunities if they've gained the
highest access authority to a business organization. Personal attacks, although less common, can also be
harmful.
QUESTION 247
Which of the following biometrics methods provides the HIGHEST accuracy and is LEAST accepted by
users?
A. Palm Scan
B. Hand Geometry
C. Fingerprint
D. Retina scan
Correct Answer: D
Explanation
Explanation/Reference:
Retina based biometric involves analyzing the layer of blood vessels situated at the back of the eye.
An established technology, this technique involves using a low-intensity light source through an optical
coupler to scan the unique patterns of the retina. Retinal scanning can be quite accurate but does require
the user to look into a receptacle and focus on a given point. This is not particularly convenient if you wear
glasses or are concerned about having close contact with the reading device. For these reasons, retinal
scanning is not warmly accepted by all users, even though the technology itself can work well.
Biometrics
Biometrics verifies an individual's identity by analyzing a unique personal attribute or behavior, which is
one of the most effective and accurate methods of verifying identification and not well received by society.
Biometrics is a very sophisticated technology; thus, it is much more expensive and complex than the other
types of identity verification processes. A biometric system can make authentication decisions based on an
individual's behavior, as in signature dynamics, but these can change over time and possibly be forged.
Biometric systems that base authentication decisions on physical attributes (such as iris, retina, or
fingerprint) provide more accuracy because physical attributes typically don't change, absent some
disfiguring injury, and are harder to impersonate
Biometrics is typically broken up into two different categories. The first is the physiological. These are traits
that are physical attributes unique to a specific individual. Fingerprints are a common example of a
physiological trait used in biometric systems. The second category of biometrics is known as behavioral.
The behavioral authentication is also known as continuous authentication. The behavioral/continuous
authentication prevents session hijacking attack. This is based on a characteristic of an individual to
confirm his identity. An example is signature Dynamics. Physiological is "what you are" and behavioral is
"what you do." When a biometric system rejects an authorized individual, it is called a Type I error (false
rejection rate). When the system accepts impostors who should be rejected, it is called a Type II error
(false acceptance rate). The goal is to obtain low numbers for each type of error, but Type II errors are the
most dangerous and thus the most important to avoid. When comparing different biometric systems, many
different variables are used, but one of the most important metrics is the crossover error rate (CER). This
rating is stated as a percentage and represents the point at which the false rejection rate equals the false
acceptance rate. This rating is the most important measurement when determining the system's accuracy.
A biometric system that delivers a CER of 3 will be more accurate than a system that delivers a CER of 4
Crossover error rate (CER) is also called equal error rate (EER). Throughput describes the process of
authenticating to a biometric system. This is also referred to as the biometric system response time. The
primary consideration that should be put into the purchasing and implementation of biometric access
control are user acceptance, accuracy and processing speed.
Biometric Considerations
In addition to the access control elements of a biometric system, there are several other considerations
that are important to the integrity of the control environment. These are:
Resistance to counterfeiting
Data storage requirements
User acceptance
Reliability and
Target User and approach
Fingerprint
Fingerprints are made up of ridge endings and bifurcations exhibited by friction ridges and other detailed
characteristics called minutiae. It is the distinctiveness of these minutiae that gives each individual a
unique fingerprint. An individual places his finger on a device that reads the details of the fingerprint and
compares this to a reference file. If the two match, the individual's identity has been verified.
Palm Scan
The palm holds a wealth of information and has many aspects that are used to identify an individual. The
palm has creases, ridges, and grooves throughout that are unique to a specific person. The palm scan
also includes the fingerprints of each finger. An individual places his hand on the biometric device, which
scans and captures this information. This information is compared to a reference file, and the identity is
either verified or rejected.
Hand Geometry
The shape of a person's hand (the shape, length, and width of the hand and fingers) defines hand
geometry. This trait differs significantly between people and is used in some biometric systems to verify
identity. A person places her hand on a device that has grooves for each finger. The system compares the
geometry of each finger, and the hand as a whole, to the information in a reference file to verify that
person's identity.
Retina Scan
A system that reads a person's retina scans the blood-vessel pattern of the retina on the backside of the
eyeball. This pattern has shown to be extremely unique between different people. A camera is used to
project a beam inside the eye and capture the pattern and compare it to a reference file recorded
previously.
Iris Scan
An iris scan is a passive biometric control
The iris is the colored portion of the eye that surrounds the pupil. The iris has unique patterns, rifts, colors,
rings, coronas, and furrows. The uniqueness of each of these characteristics within the iris is captured by a
camera and compared with the information gathered during the enrollment phase.
When using an iris pattern biometric system, the optical unit must be positioned so the sun does not shine
into the aperture; thus, when implemented, it must have proper placement within the facility.
Signature Dynamics
When a person signs a signature, usually they do so in the same manner and speed each time. Signing a
signature produces electrical signals that can be captured by a biometric system. The physical motions
performed when someone is signing a document create these electrical signals. The signals provide
unique characteristics that can be used to distinguish one individual from another. Signature dynamics
provides more information than a static signature, so there are more variables to verify when confirming an
individual's identity and more assurance that this person is who he claims to be.
Keystroke Dynamics
Whereas signature dynamics is a method that captures the electrical signals when a person signs a name,
keystroke dynamics captures electrical signals when a person types a certain phrase. As a person types a
specified phrase, the biometric system captures the speed and motions of this action. Each individual has
a certain style and speed, which translate into unique signals. This type of authentication is more effective
than typing in a password, because a password is easily obtainable. It is much harder to repeat a person's
typing style than it is to acquire a password.
Voice Print
People's speech sounds and patterns have many subtle distinguishing differences. A biometric system that
is programmed to capture a voice print and compare it to the information held in a reference file can
differentiate one individual from another. During the enrollment process, an individual is asked to say
several different words.
Facial Scan
A system that scans a person's face takes many attributes and characteristics into account. People have
different bone structures, nose ridges, eye widths, forehead sizes, and chin shapes. These are all captured
during a facial scan and compared to an earlier captured scan held within a reference record. If the
information is a match, the person is positively identified.
Hand Topography
Whereas hand geometry looks at the size and width of an individual's hand and fingers, hand topology
looks at the different peaks and valleys of the hand, along with its overall shape and curvature. When an
individual wants to be authenticated, she places her hand on the system. Off to one side of the system, a
camera snaps a side-view picture of the hand from a different view and angle than that of systems that
target hand geometry, and thus captures different data. This attribute is not unique enough to authenticate
individuals by itself and is commonly used in conjunction with hand geometry.
Vascular Scan
Valcular Scan uses the blood vessel under the first layer of skin.
Fingerprint - Fingerprints are made up of ridge endings and bifurcations exhibited by friction ridges and
other detailed characteristics called minutiae. It is the distinctiveness of these minutiae that gives each
individual a unique fingerprint. An individual places his finger on a device that reads the details of the
fingerprint and compares this to a reference file. If the two match, the individual's identity has been verified.
Hand Geometry - The shape of a person's hand (the shape, length, and width of the hand and fingers)
defines hand geometry. This trait differs significantly between people and is used in some biometric
systems to verify identity. A person places her hand on a device that has grooves for each finger. The
system compares the geometry of each finger, and the hand as a whole, to the information in a reference
file to verify that person's identity.
Palm Scan - The palm holds a wealth of information and has many aspects that are used to identify an
individual. The palm has creases, ridges, and grooves throughout that are unique to a specific person. The
palm scan also includes the fingerprints of each finger. An individual places his hand on the biometric
device, which scans and captures this information. This information is compared to a reference file, and the
identity is either verified or rejected.
QUESTION 248
During an IS audit, one of your auditor has observed that some of the critical servers in your organization
can be accessed ONLY by using shared/common user name and password. What should be the auditor's
PRIMARY concern be with this approach?
A. Password sharing
B. Accountability
C. Shared account management
D. Difficulty in auditing shared account
Correct Answer: B
Explanation
Explanation/Reference:
The keyword PRIMARY is used in the question. Accountability should be the primary concern if critical
servers can be accessed only by using shared user id and password. It would be very difficult to track the
changes done by employee on critical server.
For your exam you should know the information below:
Accountability
Ultimately one of the drivers behind strong identification, authentication, auditing and session management
is accountability. Accountability is fundamentally about being able to determine who or what is responsible
for an action and can be held responsible. A closely related information assurance topic is non-repudiation.
Repudiation is the ability to deny an action, event, impact or result. Non-repudiation is the process of
ensuring a user may not deny an action. Accountability relies heavily on non-repudiation to ensure users,
processes and actions may be held responsible for impacts.
QUESTION 249
Which of the following testing method examines the functionality of an application without peering into its
internal structure or knowing the details of it's internals?
A. Black-box testing
B. Parallel Test
C. Regression Testing
D. Pilot Testing
Correct Answer: A
Explanation
Explanation/Reference:
Black-box testing is a method of software testing that examines the functionality of an application (e.g.
what the software does) without peering into its internal structures or workings (see white-box testing). This
method of test can be applied to virtually every level of software testing: unit, integration, system and
acceptance. It typically comprises most if not all higher level testing, but can also dominate unit testing as
well.
Pilot Testing - A preliminary test that focuses on specific and predefined aspect of a system. It is not meant
to replace other testing methods, but rather to provide a limited evaluation of the system. Proof of concept
are early pilot tests usually over interim platform and with only basic functionalities.
White box testing - Assess the effectiveness of a software program logic. Specifically, test data are used in
determining procedural accuracy or conditions of a program's specific logic path. However testing all
possible logical path in large information system is not feasible and would be cost prohibitive, and therefore
is used on selective basis only.
Black Box Testing - An integrity based form of testing associated with testing components of an information
system's "functional" operating effectiveness without regards to any specific internal program structure.
Applicable to integration and user acceptance testing.
Function/validation testing It is similar to system testing but it is often used to test the functionality of the
system against the detailed requirements to ensure that the software that has been built is traceable to
customer requirements.
Regression Testing - The process of rerunning a portion of a test scenario or test plan to ensure that
changes or corrections have not introduced new errors. The data used in regression testing should be
same as original data.
Parallel Testing - This is the process of feeding test data into two systems the modified system and an
alternative system and comparing the result.
Sociability Testing - The purpose of these tests is to confirm that new or modified system can operate in its
target environment without adversely impacting existing system. This should cover not only platform that
will perform primary application processing and interface with other system but , in a client server and web
development, changes to the desktop environment. Multiple application may run on the users desktop,
potentially simultaneously , so it is important to test the impact of installing new dynamic link libraries
(DLLs), making operating system registry or configuration file modification, and possibly extra memory
utilization.
Regression Testing - The process of rerunning a portion of a test scenario or test plan to ensure that
changes or corrections have not introduced new errors. The data used in regression testing should be
same as original data.
Pilot Testing - A preliminary test that focuses on specific and predefined aspect of a system. It is not meant
to replace other testing methods, but rather to provide a limited evaluation of the system. Proof of concept
are early pilot tests usually over interim platform and with only basic functionalities
The following reference(s) were/was used to create this question:
CISA review manual 2014 Page number 167
Official ISC2 guide to CISSP CBK 3rd Edition Page number 176
QUESTION 250
Which of the following testing method examines internal structure or working of an application?
A. White-box testing
B. Parallel Test
C. Regression Testing
D. Pilot Testing
Correct Answer: A
Explanation
Explanation/Reference:
White-box testing (also known as clear box testing, glass box testing, transparent box testing, and
structural testing) is a method of testing software that tests internal structures or workings of an application,
as opposed to its functionality (i.e. black-box testing). In white-box testing an internal perspective of the
system, as well as programming skills, are used to design test cases. The tester chooses inputs to
exercise paths through the code and determine the appropriate outputs. This is analogous to testing nodes
in a circuit, e.g. in-circuit testing (ICT). White-box testing can be applied at the unit, integration and system
levels of the software testing process. Although traditional testers tended to think of white-box testing as
being done at the unit level, it is used for integration and system testing more frequently today. It can test
paths within a unit, paths between units during integration, and between subsystems during a systemlevel
test. Though this method of test design can uncover many errors or problems, it has the potential to miss
unimplemented parts of the specification or missing requirements.
Pilot Testing - A preliminary test that focuses on specific and predefined aspect of a system. It is not meant
to replace other testing methods, but rather to provide a limited evaluation of the system. Proof of concept
are early pilot tests usually over interim platform and with only basic functionalities.
White box testing - Assess the effectiveness of a software program logic. Specifically, test data are used in
determining procedural accuracy or conditions of a program's specific logic path. However testing all
possible logical path in large information system is not feasible and would be cost prohibitive, and therefore
is used on selective basis only.
Black Box Testing - An integrity based form of testing associated with testing components of an information
system's "functional" operating effectiveness without regards to any specific internal program structure.
Applicable to integration and user acceptance testing.
Function/validation testing It is similar to system testing but it is often used to test the functionality of the
system against the detailed requirements to ensure that the software that has been built is traceable to
customer requirements.
Regression Testing - The process of rerunning a portion of a test scenario or test plan to ensure that
changes or corrections have not introduced new errors. The data used in regression testing should be
same as original data.
Parallel Testing - This is the process of feeding test data into two systems the modified system and an
alternative system and comparing the result.
Sociability Testing - The purpose of these tests is to confirm that new or modified system can operate in its
target environment without adversely impacting existing system. This should cover not only platform that
will perform primary application processing and interface with other system but , in a client server and web
development, changes to the desktop environment. Multiple application may run on the users desktop,
potentially simultaneously , so it is important to test the impact of installing new dynamic link libraries
(DLLs), making operating system registry or configuration file modification, and possibly extra memory
utilization.
Regression Testing - The process of rerunning a portion of a test scenario or test plan to ensure that
changes or corrections have not introduced new errors. The data used in regression testing should be
same as original data.
Pilot Testing - A preliminary test that focuses on specific and predefined aspect of a system. It is not meant
to replace other testing methods, but rather to provide a limited evaluation of the system. Proof of concept
are early pilot tests usually over interim platform and with only basic functionalities
QUESTION 1
Which of the following type of traffic can easily be filtered with a stateful packet filter by enforcing the
context or state of the request?
A. ICMP
B. TCP
C. UDP
D. IP
Correct Answer: B
Explanation
Explanation/Reference:
The question is explict in asking *easily*. With TCP connection establishment there is a distinct state or
sequence that can be expected. Consult the references for further details.
ICMP, IP and UDP don't have any concept of a session; i.e. each packet or datagram is handled
individually, with no reference to the contents of the previous one. With no sessions, these protocols
usually cannot be filtered on the state of the session.
Some newer firewalls, however, simulate the concept of state for these protocols, and filter out unexpected
packets based upon normal usage. Although these are commonly treated like normal stateful filters, they
are more complex to program, and hence more prone to errors.
A stateful packet filter or stateful inspection inspects each packet and only allows known connection states
through. So, if a SYN/ACK packet was recieved and there was not a prior SYN packet sent it would filter
that packet and not let it in. The correct sequence of steps are known and if the sequence or state is
incorrect then it is dropped.
UDP. UDP has no real state so you could only partially filter them based on the state or sequence. The
question was explicit in asking *easily*. While it is possible, UDP is not the best answer.
IP. IP would refer to the Internet Protocol and as such is stateless so you would not be able to filter it out
*easily*.
http://www.nwo.net/ipf/ipf-howto.pdf
QUESTION 2
When referring to the data structures of a packet, the term Protocol Data Unit (PDU) is used, what is the
proper term to refer to a single unit of TCP data at the transport layer?
A. TCP segment.
B. TCP datagram.
C. TCP frame.
D. TCP packet.
Correct Answer: A
Explanation
Explanation/Reference:
A TCP Segment is the group of TCP data tramsmitted at the Transport Layer. TCP is segment based
network technology.
The message is sent to the transport layer, where TCP does its magic on the data. The bundle of data is
now a segment. If the message is being transmitted over TCP, it is referred to as a "segment."
Protocol Data Unit Layers
TCP frame. Is incorrect because a TCP frame is only a distractor, Ethernet Frame would be the proper
terminology. TCP is segment based network technology. TCP packet. Is incorrect because a TCP packet
is only a distractor. TCP is segment based network technology.
QUESTION 3
How do you distinguish between a bridge and a router?
A. A bridge simply connects multiple networks, a router examines each packet to determine which
network to forward it to.
B. "Bridge" and "router" are synonyms for equipment used to join two networks.
C. The bridge is a specific type of router used to connect a LAN to the global Internet.
D. The bridge connects multiple networks at the data link layer, while router connects multiple networks at
the network layer.
Correct Answer: D
Explanation
Explanation/Reference:
The following answers are incorrect:
A bridge simply connects multiple networks, a router examines each packet to determine which network to
forward it to. Is incorrect because both forward packets this is not distinctive enough.
"Bridge" and "router" are synonyms for equipment used to join two networks. Is incorrect because the two
are unique and operate at different layers of the OSI model. The bridge is a specific type of router used to
connect a LAN to the global Internet. Is incorrect because a bridge does not connect a LAN to the global
internet, but connects networks together creating a LAN.
QUESTION 4
ICMP and IGMP belong to which layer of the OSI model?
A. Datagram Layer.
B. Network Layer.
C. Transport Layer.
D. Data Link Layer.
Correct Answer: B
Explanation
Explanation/Reference:
The network layer contains the Internet Protocol (IP), the Internet Control Message Protocol (ICMP), and
the Internet Group Management Protocol (IGMP)
Correct Answer: A
Explanation
Explanation/Reference:
TCP Wrappers can control when a UDP server starts but has little control afterwards because UDP
packets can be sent randomly.
The hosts.* access control system requires a complicated directory tree. Is incorrect because a simple
directory tree is involved.
They are too expensive. Is incorrect because TCP Wrapper is considered open source with a BSD
licensing scheme.
QUESTION 6
The IP header contains a protocol field. If this field contains the value of 1, what type of data is contained
within the IP datagram?
A. TCP.
B. ICMP.
C. UDP.
D. IGMP.
Correct Answer: B
Explanation
Explanation/Reference:
If the protocol field has a value of 1 then it would indicate it was ICMP.
QUESTION 7
The IP header contains a protocol field. If this field contains the value of 2, what type of data is contained
within the IP datagram?
A. TCP.
B. ICMP.
C. UDP.
D. IGMP.
Correct Answer: D
Explanation
Explanation/Reference:
If the protocol field has a value of 2 then it would indicate it was IGMP.
The following answers are incorrect:
TCP. Is incorrect because the value for a TCP protocol would be 6. UDP. Is incorrect because the value for
an UDP protocol would be 17. ICMP. Is incorrect because the value for an ICMP protocol would be 1.
QUESTION 8
What is the proper term to refer to a single unit of IP data?
A. IP segment.
B. IP datagram.
C. IP frame.
D. IP fragment.
Correct Answer: B
Explanation
Explanation/Reference:
IP is a datagram based technology.
DIFFERENCE BETWEEN PACKETS AND DATAGRAM
In general, the term packet applies to any message formatted as a packet, while the term datagram is
generally reserved for packets of an "unreliable" service.
A "reliable" service is one that notifies the user if delivery fails, while an "unreliable" one does not notify the
user if delivery fails. For example, IP provides an unreliable service.
Together, TCP and IP provide a reliable service, whereas UDP and IP provide an unreliable one. All these
protocols use packets, but UDP packets are generally called datagrams.
If a network does not guarantee packet delivery, then it becomes the host's responsibility to provide
reliability by detecting and retransmitting lost packets. Subsequent experience on the ARPANET indicated
that the network itself could not reliably detect all packet delivery failures, and this pushed responsibility for
error detection onto the sending host in any case. This led to the development of the end-to-end principle,
which is one of the Internet's fundamental design assumptions.
IP segment. Is incorrect because IP segment is a detractor, the correct terminology is TCP segment. IP is
a datagram based technology.
IP frame. Is incorrect because IP frame is a detractor, the correct terminology is Ethernet frame.
IP is a datagram based technology.
References:
Wikipedia http://en.wikipedia.org/wiki/Internet_Protocol
QUESTION 9
A packet containing a long string of NOP's followed by a command is usually indicative of what?
A. A syn scan.
B. A half-port scan.
C. A buffer overflow attack.
D. A packet destined for the network's broadcast address.
Correct Answer: C
Explanation
Explanation/Reference:
A series of the same control, hexidecimal, characters imbedded in the string is usually an indicator of a
buffer overflow attack. A NOP is a instruction which does nothing (No Operation - the hexadecimal
equivalent is 0x90)
A half-port scan. This is incorrect because the port scanner generates a SYN packet. If the target port is
open, it will respond with a SYN-ACK packet. The scanner host responds with a RST packet, closing the
connection before the handshake is completed. Also known as a Half Open Port scan.
A packet destined for the network's broadcast address. This is incorrect because this type of packet would
not contain a long string of NOP characters.
QUESTION 10
In the days before CIDR (Classless Internet Domain Routing), networks were commonly organized by
classes. Which of the following would have been true of a Class C network?
Correct Answer: C
Explanation
Explanation/Reference:
Each Class C network address has a 24-bit network prefix, with the three highest order bits set to 1-1-0
The first bit of the IP address would be set to one and the second bit set to zero. Is incorrect because, this
would be a Class B network address .
The first three bits of the IP address would be set to one. Is incorrect because, this is a distractor. Class D
& E have the first three bits set to 1. Class D the 4th bit is 0 and for Class E the 4th bit to 1.
For Class A, the addresses are 0.0.0.0 - 127.255.255.255 The lowest Class A address is represented in
binary as 00000000.00000000.0000000.00000000
For Class B networks, the addresses are 128.0.0.0 - 191.255.255.255. The lowest Class B address is
represented in binary as 10000000.00000000.00000000.00000000
For Class C, the addresses are 192.0.0.0 - 223.255.255.255 The lowest Class C address is represented in
binary as 11000000.00000000.00000000.00000000
For Class D, the addresses are 224.0.0.0 - 239.255.255.255 (Multicast) The lowest Class D address is
represented in binary as 11100000.00000000.00000000.00000000
For Class E, the addresses are 240.0.0.0 - 255.255.255.255 (Reserved for future usage) The lowest Class
E address is represented in binary as 11110000.00000000.00000000.00000000 Classful IP Address
Format
References:
3Com http://www.3com.com/other/pdfs/infra/corpinfo/en_US/501302.pdf AIOv3 Telecommunications and
Networking Security (page 438)
QUESTION 11
Which of the following is an IP address that is private (i.e. reserved for internal networks, and not a valid
address to use on the Internet)?
A. 192.168.42.5
B. 192.166.42.5
C. 192.175.42.5
D. 192.1.42.5
Correct Answer: A
Explanation
Explanation/Reference:
This is a valid Class C reserved address. For Class C, the reserved addresses are 192.168.0.0 -
192.168.255.255.
The private IP address ranges are defined within RFC 1918:
192.175.42.5 Is incorrect because it is not a Class C reserved address. 192.1.42.5 Is incorrect because it
is not a Class C reserved address.
QUESTION 12
In the days before CIDR (Classless Internet Domain Routing), networks were commonly organized by
classes. Which of the following would have been true of a Class A network?
Correct Answer: A
Explanation
Explanation/Reference:
Each Class A network address has a 8-bit network prefix, with the first bit of the ipaddress set to zero. See
the diagram below for more details.
The first bit of the IP address would be set to one and the second bit set to zero. Is incorrect because this
would be a Class B network address.
The first two bits of the IP address would be set to one, and the third bit set to zero. Is incorrect because,
this would be a Class C network address.
The first three bits of the ipaddress would be set to one. Is incorrect because, this is a distractor.
See diagram below from the 3COM tutorial on everything you ever wanted to know about IP addressing:
Classful IP addressing format
Classless Internet Domain Routing (CIDR)
Classless Inter-Domain Routing (CIDR) is a method for allocating IP addresses and routing Internet
Protocol packets. The Internet Engineering Task Force introduced CIDR in 1993 to replace the previous
addressing architecture of classful network design in the Internet. Their goal was to slow the growth of
routing tables on routers across the Internet, and to help slow the rapid exhaustion of IPv4 addresses.
For Class A, the addresses are 0.0.0.0 - 127.255.255.255. For Class B networks, the addresses are
128.0.0.0 - 191.255.255.255. For Class C, the addresses are 192.0.0.0 - 223.255.255.255. For Class D,
the addresses are 224.0.0.0 - 239.255.255.255. For Class E, the addresses are 240.0.0.0 -
255.255.255.255.
References:
QUESTION 13
Which of the following is an IP address that is private (i.e. reserved for internal networks, and not a valid
address to use on the Internet)?
A. 10.0.42.5
B. 11.0.42.5
C. 12.0.42.5
D. 13.0.42.5
Correct Answer: A
Explanation
Explanation/Reference:
This is a valid Class A reserved address. For Class A, the reserved addresses are 10.0.0.0 -
10.255.255.255.
References:
QUESTION 14
Which one of the following authentication mechanisms creates a problem for mobile users?
Correct Answer: A
Explanation
Explanation/Reference:
Anything based on a fixed IP address would be a problem for mobile users because their location and its
associated IP address can change from one time to the next. Many providers will assign a new IP every
time the device would be restarted. For example an insurance adjuster using a laptop to file claims online.
He goes to a different client each time and the address changes every time he connects to the ISP.
QUESTION 15
Which of the following media is MOST resistant to tapping?
A. microwave.
B. twisted pair.
C. coaxial cable.
D. fiber optic.
Correct Answer: D
Explanation
Explanation/Reference:
Fiber Optic is the most resistant to tapping because Fiber Optic uses a light to transmit the signal. While
there are some technologies that will allow to monitor the line passively, it is very difficult to tap into without
detection sot this technology would be the MOST resistent to tapping.
twisted pair. Is incorrect because it is easy to tap into a twisted pair line. coaxial cable. Is incorrect because
it is easy to tap into a coaxial cable line.
QUESTION 16
Which of the following is a tool often used to reduce the risk to a local area network (LAN) that has external
connections by filtering Ingress and Egress traffic?
A. a firewall.
B. dial-up.
C. passwords.
D. fiber optics.
Correct Answer: A
Explanation
Explanation/Reference:
The use of a firewall is a requirement to protect a local area network (LAN) that has external connections
without that you have no real protection from fraudsters.
QUESTION 17
Which one of the following is usually not a benefit resulting from the use of firewalls?
A. reduces the risks of external threats from malicious hackers.
B. prevents the spread of viruses.
C. reduces the threat level on internal system.
D. allows centralized management and control of services.
Correct Answer: B
Explanation
Explanation/Reference:
This is not a benefit of a firewall. Most firewalls are limited when it comes to preventing the spread of
viruses.
This question is testing your knowledge of Malware and Firewalls. The keywords within the questions are
"usually" and "virus". Once again to come up with the correct answer, you must stay within the context of
the question and really ask yourself which of the 4 choices is NOT usually done by a firewall.
Some of the latest Appliances such as Unified Threat Management (UTM) devices does have the ability to
do virus scanning but most first and second generation firewalls would not have such ability. Remember,
the questions is not asking about all possible scenarios that could exist but only about which of the 4
choices presented is the BEST.
For the exam you must know your general classes of Malware. There are generally four major classes of
malicious code that fall under the general definition of malware:
1. Virus: Parasitic code that requires human action or insertion, or which attaches itself to another program
to facilitate replication and distribution. Virus-infected containers can range from e- mail, documents, and
data file macros to boot sectors, partitions, and memory fobs. Viruses were the first iteration of malware
and were typically transferred by floppy disks (also known as "sneakernet") and injected into memory when
the disk was accessed or infected files were transferred from system to system.
2. Worm: Self-propagating code that exploits system or application vulnerabilities to replicate. Once on a
system, it may execute embedded routines to alter, destroy, or monitor the system on which it is running,
then move on to the next system. A worm is effectively a virus that does not require human interaction or
other programs to infect systems.
3. Trojan Horse: Named after the Trojan horse of Greek mythology (and serving a very similar function), a
Trojan horse is a general term referring to programs that appear desirable, but actually contain something
harmful. A Trojan horse purports to do one thing that the user wants while secretly performing other
potentially malicious actions. For example, a user may download a game file, install it, and begin playing
the game. Unbeknownst to the user, the application may also install a virus, launch a worm, or install a
utility allowing an attacker to gain unauthorized access to the system remotely, all without the user's
knowledge.
4. Spyware: Prior to its use in malicious activity, spyware was typically a hidden application injected
through poor browser security by companies seeking to gain more information about a user's Internet
activity. Today, those methods are used to deploy other malware, collect private data, send advertising or
commercial messages to a system, or monitor system input, such as keystrokes or mouse clicks.
QUESTION 18
Which of the following DoD Model layer provides non-repudiation services?
A. network layer.
B. application layer.
C. transport layer.
D. data link layer.
Correct Answer: B
Explanation
Explanation/Reference:
The Application Layer determines the identity of the communication partners and this is where Non-
Repudiation service would be provided as well. See the layers below:
DOD Model DoD Model
network layer. Is incorrect because the Network Layer mostly has routing protocols, ICMP, IP, and IPSEC.
It it not a layer in the DoD Model. It is called the Internet Layer within the DoD model.
transport layer. Is incorrect because the Transport layer provides transparent transfer of data between end
users. This is called Host-to-Host on the DoD model but sometimes some books will call it Transport as
well on the DoD model.
data link layer. Is incorrect because the Data Link Layer defines the protocols that computers must follow
to access the network for transmitting and receiving messages. It is part of the OSI Model. This does not
exist on the DoD model, it is called the Link Layer on the DoD model.
QUESTION 19
What is the 802.11 standard related to?
Correct Answer: B
Explanation
Explanation/Reference:
The 802.11 standard outlines how wireless clients and APs communicate, lays out the specifications of
their interfaces, dictates how signal transmission should take place, and describes how authentication,
association, and security should be implemeted.
Packet-switching technology A packet-switching technology is not included in the IEEE 802 Working Group
standard. It is a technology where-in messages are broken up into packets, which then travel along
different routes to the destination.
The OSI/ISO model The Open System Interconnect model is a sevel-layer model defined as an
international standard describing network communications.
802.11 refers to a family of specifications developed by the IEEE for Wireless LAN technology. 802.11
specifies an over-the-air interface between a wireless client and a base station or between two wireless
clients. The IEEE accepted the specification in 1997. There are several specifications in the 802.11 family:
802.11 # applies to wireless LANs and provides 1 or 2 Mbps transmission in the 2.4 GHz band using either
frequency hopping spread spectrum (FHSS) or direct sequence spread spectrum (DSSS).
802.11a # an extension to 802.11 that applies to wireless LANs and provides up to 54 Mbps in the 5GHz
band. 802.11a uses an orthogonal frequency division multiplexing encoding scheme rather than FHSS or
DSSS.
802.11b (also referred to as 802.11 High Rate or Wi-Fi) # an extension to 802.11 that applies to wireless
LANS and provides 11 Mbps transmission (with a fallback to 5.5, 2 and 1 Mbps) in the 2.4 GHz band.
802.11b uses only DSSS. 802.11b was a 1999 ratification to the original 802.11 standard, allowing
wireless functionality comparable to Ethernet. 802.11g # applies to wireless LANs and provides 20+ Mbps
in the 2.4 GHz band.
QUESTION 20
Remote Procedure Call (RPC) is a protocol that one program can use to request a service from a program
located in another computer in a network. Within which OSI/ISO layer is RPC implemented?
A. Session layer
B. Transport layer
C. Data link layer
D. Network layer
Correct Answer: A
Explanation
Explanation/Reference:
The following answers are incorrect:
Transport layer: The Transport layer handles computer-to computer communications, rather than
application-to-application communications like RPC.
Data link Layer: The Data Link layer protocols can be divided into either Logical Link Control (LLC) or
Media Access Control (MAC) sublayers. Protocols like SLIP, PPP, RARP and L2TP are at this layer. An
application-to-application protocol like RPC would not be addressed at this layer.
Network layer: The Network Layer is mostly concerned with routing and addressing of information, not
application-to-application communication calls such as an RPC call.
QUESTION 21
Frame relay and X.25 networks are part of which of the following?
A. Circuit-switched services
B. Cell-switched services
C. Packet-switched services
D. Dedicated digital services
Correct Answer: C
Explanation
Explanation/Reference:
Frame relay and X.25 are both examples of packet-switching technologies. In packet-switched networks
there are no dedicated connections between endpoints, and data is divided into packets and reassembled
on the receiving end.
Variable-length packets
Statistical multiplexing
Variable-length packets are used for more efficient and flexible data transfers. These packets are switched
between the various segments in the network until the destination is reached.
Statistical multiplexing techniques control network access in a packet-switched network. The advantage of
this technique is that it accommodates more flexibility and more efficient use of bandwidth. Most of today's
popular LANs, such as Ethernet and Token Ring, are packet- switched networks.
Frame Relay often is described as a streamlined version of X.25, offering fewer of the robust capabilities,
such as windowing and retransmission of last data that are offered in X.25. This is because Frame Relay
typically operates over WAN facilities that offer more reliable connection services and a higher degree of
reliability than the facilities available during the late 1970s and early 1980s that served as the common
platforms for X.25 WANs. As mentioned earlier, Frame Relay is strictly a Layer 2 protocol suite, whereas
X.25 provides services at Layer 3 (the network layer) as well. This enables Frame Relay to offer higher
performance and greater transmission efficiency than X.25, and makes Frame Relay suitable for current
WAN applications, such as LAN interconnection.
Circuit-switched services. An example of a circuit-switched service are Integrated Services Digital Network
(ISDN) and Point-to-Point Protocol (PPP). Frame Relay and X.25 do not use circuit switching technology.
Dedicated digital services. A packet switched network is commonly via a digital method, but is not
dedicated. Examples of a Dedicated digital service might be a Permanent Virtual Circuit (PVC), which does
not use packet switching.
QUESTION 22
Within the OSI model, at what layer are some of the SLIP, CSLIP, PPP control functions provided?
A. Data Link
B. Transport
C. Presentation
D. Application
Correct Answer: A
Explanation
Explanation/Reference:
RFC 1661 - The Point-to-Point Protocol (PPP) specifies that the Point-to-Point Protocol (PPP) provides a
standard method for transporting multi-protocol datagrams over point-to-point links.
PPP is comprised of three main components:
1 A method for encapsulating multi-protocol datagrams. 2 A Link Control Protocol (LCP) for establishing,
configuring, and testing the data-link connection.
3 A family of Network Control Protocols (NCPs) for establishing and configuring different network-layer
protocols.
QUESTION 23
In the Open Systems Interconnect (OSI) Reference Model, at what level are TCP and UDP provided?
A. Transport
B. Network
C. Presentation
D. Application
Correct Answer: A
Explanation
Explanation/Reference:
The following answers are incorrect:
Network. The Network layer moves information between hosts that are not physically connected. It deals
with routing of information. IP is a protocol that is used in Network Layer. TCP and UDP do not reside at
the Layer 3 Network Layer in the OSI Reference Model.
Presentation. The Presentation Layer is concerned with the formatting of data into a standard presentation
such as
ASCII. TCP and UDP do not reside at the Layer 6 Presentation Layer in the OSI Reference Model.
Application. The Application Layer is a service for applications and Operating Systems data transmission,
for example HTTP, FTP and SMTP. TCP and UDP do not reside at the Layer 7 Application Layer in the
OSI Reference Model.
QUESTION 24
Which of the following is TRUE regarding Transmission Control Protocol (TCP) and User Datagram
Protocol (UDP)?
Correct Answer: A
Explanation
Explanation/Reference:
TCP is a reliable connection-oriented transport for guaranteed delivery of data.
Protocols represent certain rules and regulations that are essential in order to have data communication
between two entities. Internet Protocols work in sending and receiving data packets. This type of
communication may be either connection-less or connection-oriented. In a connection-oriented scenario,
an acknowledgement is being received by the sender from the receiver in support of a perfect transfer.
Transmission Control Protocol or TCP is such a protocol.
On the other hand, UDP or User Datagram Protocol is of the connection-less type where no feedback is
being forwarded to the sender after delivery and the data transfer have taken place or not. Though, it's not
a guaranteed method, but, once a connection is established, UDP works much faster than TCP as TCP
has to rely on a feedback and accordingly, the entire 3-way handshaking takes place.
UDP provides for Error Correction, TCP does not: UDP does not provide for error correction, while TCP
does.
UDP is useful for longer messages, rather than TCP: UDP is useful for shorter messages due to its
connectionless nature.
TCP does not guarantee delivery of data, while UDP does guarantee data delivery: The opposite is true.
http://www.cyberciti.biz/faq/key-differences-between-tcp-and-udp-protocols/ http://www.skullbox.net/
tcpudp.php
A. 81
B. 80
C. 8080
D. 8180
Correct Answer: B
Explanation
Explanation/Reference:
HTTP is Port 80.
Reference: MAIWALD, Eric, Network Security: A Beginner's Guide, McGraw-Hill/Osborne Media, 2001,
page 135.
QUESTION 26
Looking at the choices below, which ones would be the most suitable protocols/tools for securing e-mail?
Correct Answer: A
Explanation
Explanation/Reference:
Both PGP and S/MIME are protocol/tool used to secure internet emails. Today the de facto standard within
email client is mostly S/MIME. Around year 1999 many people were using PGP to secure their emails.
PGP was developed by Phil Zimmerman as a free product for noncommercial use that would enable all
people to have access to state-of-the-art cryptographic algorithms to protect their privacy. PGP is also
available as a commercial product that has received widespread acceptance by many organizations
looking for a user-friendly, simple system of encryption of files, documents, and e-mail and the ability to
wipe out old files through a process of overwriting them to protect old data from recovery. PGP also
compresses data to save on bandwidth and storage needs.
The Secure/Multipurpose Internet Mail Extension S/MIME is the security enhancement for the MIME
Internet e-mail standard format. S/MIME provides several features, including signed and encrypted mail
messages. As a hybrid cryptographic application, S/MIME, similar to IPSec and SSL, uses hash functions,
symmetric and asymmetric cryptographies. There are a variety of bulk encryption algorithms defined the
most popular being AES. Asymmetric encryption, such as RSA, is used for digital signatures. Secure hash
algorithms, such as SHA-1, are used to provide data integrity of the message body and message
attributes.
OPPLIGER, Rolf, Secure Messaging with PGP and S/MIME, 2000, Artech House; The international PGP
homepage, online at http://www.pgpi.org
QUESTION 27
Which of the following are suitable protocols for securing VPN connections at the lower layers of the OSI
model?
Correct Answer: C
Explanation
Explanation/Reference:
Reference: HARRIS, Shon, All-In-One CISSP Certification Exam Guide, 2001, McGraw- Hill/Osborne,
page 467; SMITH, Richard E., Internet Cryptography, 1997, Addison-Wesley Pub Co.
QUESTION 28
What is the role of IKE within the IPsec protocol?
Correct Answer: A
Explanation
Explanation/Reference:
Reference: RFC 2409: The Internet Key Exchange (IKE); DORASWAMY, Naganand & HARKINS, Dan,
Ipsec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks, 1999, Prentice
Hall PTR; SMITH, Richard E., Internet Cryptography, 1997, Addison-Wesley Pub Co.
QUESTION 29
What is NOT an authentication method within IKE and IPSec?
A. CHAP
B. Pre shared key
C. certificate based authentication
D. Public key authentication
Correct Answer: A
Explanation
Explanation/Reference:
CHAP is not used within IPSEC or IKE. CHAP is an authentication scheme used by Point to Point Protocol
(PPP) servers to validate the identity of remote clients. CHAP periodically verifies the identity of the client
by using a three-way handshake. This happens at the time of establishing the initial link (LCP), and may
happen again at any time afterwards. The verification is based on a shared secret (such as the client
user's password). After the completion of the link establishment phase, the authenticator sends a
"challenge" message to the peer.
The peer responds with a value calculated using a one-way hash function on the challenge and the secret
combined.
The authenticator checks the response against its own calculation of the expected hash value. If the values
match, the authenticator acknowledges the authentication; otherwise it should terminate the connection.
At random intervals the authenticator sends a new challenge to the peer and repeats steps 1 through 3.
RFC 2409: The Internet Key Exchange (IKE); DORASWAMY, Naganand & HARKINS, Dan Ipsec: The
New Security Standard for the Internet, Intranets, and Virtual Private Networks, 1999, Prentice Hall PTR;
SMITH, Richard E.
Internet Cryptography, 1997, Addison-Wesley Pub Co.; HARRIS, Shon, All-In-One CISSP Certification
Exam Guide, 2001, McGraw-Hill/Osborne, page 467.
http://en.wikipedia.org/wiki/Pre-shared_key
http://www.home.umk.pl/~mgw/LDAP/RS.C4.JUN.97.pdf
http://the.earth.li/~sgtatham/putty/0.55/htmldoc/Chapter8.html#S8.1
QUESTION 30
What is NOT true with pre shared key authentication within IKE / IPsec protocol?
Correct Answer: B
Explanation
Explanation/Reference:
Internet Key Exchange (IKE or IKEv2) is the protocol used to set up a security association (SA) in the
IPsec protocol suite. IKE builds upon the Oakley protocol and ISAKMP. IKE uses X.509 certificates for
authentication which are either pre-shared or distributed using DNS (preferably with DNSSEC) and a
DiffieHellman key exchange to set up a shared session secret from which cryptographic keys are derived.
Internet Key Exchange (IKE) Internet key exchange allows communicating partners to prove their identity
to each other and establish a secure communication channel, and is applied as an authentication
component of IPSec.
IKE uses two phases:
Phase 1: In this phase, the partners authenticate with each other, using one of the following:
Shared Secret: A key that is exchanged by humans via telephone, fax, encrypted e-mail, etc. Public Key
Encryption: Digital certificates are exchanged. Revised mode of Public Key Encryption: To reduce the
overhead of public key encryption, a nonce (a Cryptographic function that refers to a number or bit string
used only once, in security engineering) is encrypted with the communicating partner's public key, and the
peer's identity is encrypted with symmetric encryption using the nonce as the key. Next, IKE establishes a
temporary security association and secure tunnel to protect the rest of the key exchange. Phase 2:
The peers' security associations are established, using the secure tunnel and temporary SA created at the
end of phase 1.
QUESTION 31
In SSL/TLS protocol, what kind of authentication is supported when you establish a secure session
between a client and a server?
A. Peer-to-peer authentication
B. Only server authentication (optional)
C. Server authentication (mandatory) and client authentication (optional)
D. Role based authentication scheme
Correct Answer: C
Explanation
Explanation/Reference:
Reference:
RESCORLA, Eric, SSL and TLS: Designing and Building Secure Systems, 2000, Addison Wesley
Professional; SMITH, Richard E., Internet Cryptography, 1997, Addison-Wesley Pub Co.
QUESTION 32
What kind of encryption is realized in the S/MIME-standard?
Correct Answer: C
Explanation
Explanation/Reference:
S/MIME (for Secure MIME, or Secure Multipurpose Mail Extension) is a security process used for e-mail
exchanges that makes it possible to guarantee the confidentiality and non-repudiation of electronic
messages.
S/MIME is based on the MIME standard, the goal of which is to let users attach files other than ASCII text
files to electronic messages. The MIME standard therefore makes it possible to attach all types of files to
e-mails.
S/MIME was originally developed by the company RSA Data Security. Ratified in July 1999 by the IETF, S/
MIME has become a standard, whose specifications are contained in RFCs 2630 to 2633.
How S/MIME works
The S/MIME standard is based on the principle of public-key encryption. S/MIME therefore makes it
possible to encrypt the content of messages but does not encrypt the communication.
The various sections of an electronic message, encoded according to the MIME standard, are each
encrypted using a session key.
The session key is inserted in each section's header, and is encrypted using the recipient's public key.
Only the recipient can open the message's body, using his private key, which guarantees the
confidentiality and integrity of the received message. In addition, the message's signature is encrypted with
the sender's private key. Anyone intercepting the communication can read the content of the message's
signature, but this ensures the recipient of the sender's identity, since only the sender is capable of
encrypting a message (with his private key) that can be decrypted with his public key.
QUESTION 33
Which of the following is true of network security?
Correct Answer: B
Explanation
Explanation/Reference:
Commercial firewalls are a dime-a-dozen in todays world. Black firewall and whitewall are just distracters.
QUESTION 34
Which of the following best describes signature-based detection?
A. Compare source code, looking for events or sets of events that could cause damage to a system or
network.
B. Compare system activity for the behaviour patterns of new attacks.
C. Compare system activity, looking for events or sets of events that match a predefined pattern of events
that describe a known attack.
D. Compare network nodes looking for objects or sets of objects that match a predefined pattern of
objects that may describe a known attack.
Correct Answer: C
Explanation
Explanation/Reference:
Misuse detectors compare system activity, looking for events or sets of events that match a predefined
pattern of events that describe a known attack. As the patterns corresponding to known attacks are called
signatures, misuse detection is sometimes called "signature-based detection."
The most common form of misuse detection used in commercial products specifies each pattern of events
corresponding to an attack as a separate signature. However, there are more sophisticated approaches to
doing misuse detection (called "state-based" analysis techniques) that can leverage a single signature to
detect groups of attacks.
Reference:
Old Document:
BACE, Rebecca & MELL, Peter, NIST Special Publication 800-31 on Intrusion Detection Systems, Page
16.
The publication above has been replaced by 800-94 on page 2-4 The Updated URL is: http://csrc.nist.gov/
publications/nistpubs/800-94/SP800-94.pdf
QUESTION 35
Which layer deals with Media Access Control (MAC) addresses?
Correct Answer: A
Explanation
Explanation/Reference:
Layer 2 (Data Link layer) transfers information to the other end of the physical link. It handles physical
addressing, network topology, error notification, delivery of frames and flow control.
QUESTION 36
What is a decrease in amplitude as a signal propagates along a transmission medium best known as?
A. Crosstalk
B. Noise
C. Delay distortion
D. Attenuation
Correct Answer: D
Explanation
Explanation/Reference:
Attenuation is the loss of signal strength as it travels. The longer a cable, the more at tenuation occurs,
which causes the signal carrying the data to deteriorate. This is why standards include suggested cable-
run lengths. If a networking cable is too long, attenuation may occur. Basically, the data are in the form of
electrons, and these electrons have to "swim" through a copper wire. However, this is more like swimming
upstream, because there is a lot of resistance on the electrons working in this media. After a certain
distance, the electrons start to slow down and their encoding format loses form. If the form gets too
degraded, the receiving system cannot interpret them any longer. If a network administrator needs to run a
cable longer than its recommended segment length, she needs to insert a repeater or some type of device
that will amplify the signal and ensure it gets to its destination in the right encoding format. Attenuation can
also be caused by cable breaks and malfunctions. This is why cables should be tested. If a cable is
suspected of attenuation problems, cable testers can inject signals into the cable and read the results at
the end of the cable.
Noise - Noise is also a signal degradation but it refers to a large amount of electrical fluctuation that can
interfere with the interpretation of the signal by the receiver. Delay distortion - Delay distortion can result in
a misinterpretation of a signal that results from transmitting a digital signal with varying frequency
components. The various components arrive at the receiver with varying delays.
Following reference(s) were/was used to create this question:
CISA review manual 2014 Page number 265
Official ISC2 guide to CISSP CBK 3rd Edition Page number 229 & CISSP All-In-One Exam guide 6th
Edition Page Number 561
QUESTION 37
Which device acting as a translator is used to connect two networks or applications from layer 4 up to layer
7 of the ISO/OSI Model?
A. Bridge
B. Repeater
C. Router
D. Gateway
Correct Answer: D
Explanation
Explanation/Reference:
A gateway is used to connect two networks using dissimilar protocols at the lower layers or it could also be
at the highest level of the protocol stack.
Important Note:
For the purpose of the exam, you have to remember that a gateway is not synonymous to the term firewall.
The second thing you must remembers is the fact that a gateway act as a translation device. It could be
used to translate from IPX to TCP/IP for example. It could be used to convert different types of applications
protocols and allow them to communicate together. A gateway could be at any of the OSI layers but
usually tend to be higher up in the stack.
Repeaters
A repeater provides the simplest type of connectivity, because it only repeats electrical signals between
cable segments, which enables it to extend a network. Repeaters work at the physical layer and are add-
on devices for extending a network connection over a greater distance. The device amplifies signals
because signals attenuate the farther they have to travel. Repeaters can also work as line conditioners by
actually cleaning up the signals. This works much better when amplifying digital signals than when
amplifying analog signals, because digital signals are discrete units, which makes extraction of background
noise from them much easier for the amplifier. If the device is amplifying analog signals, any
accompanying noise often is amplified as well, which may further distort the signal. A hub is a multi-port
repeater. A hub is often referred to as a concentrator because it is the physical communication device that
allows several computers and devices to communicate with each other. A hub does not understand or
work with IP or MAC addresses. When one system sends a signal to go to another system connected to it,
the signal is broadcast to all the ports, and thus to all the systems connected to the concentrator.
Repeater
Image Reference- http://www.erg.abdn.ac.uk/~gorry/course/images/repeater.gif
Bridges
A bridge is a LAN device used to connect LAN segments. It works at the data link layer and therefore
works with MAC addresses. A repeater does not work with addresses; it just forwards all signals it
receives. When a frame arrives at a bridge, the bridge determines whether or not the MAC address is on
the local network segment. If the MAC address is not on the local network segment, the bridge forwards
the frame to the necessary network segment.
Bridge
Image Reference- http://www.oreillynet.com/network/2001/01/30/graphics/bridge.jpg
Routers
Routers are layer 3, or network layer, devices that are used to connect similar or different networks. (For
example, they can connect two Ethernet LANs or an Ethernet LAN to a Token Ring LAN.) A router is a
device that has two or more interfaces and a routing table so it knows how to get packets to their
destinations. It can filter traffic based on access control lists (ACLs), and it fragments packets when
necessary. Because routers have more network-level knowledge, they can perform higher-level functions,
such as calculating the shortest and most economical path between the sending and receiving hosts.
Switches
Switches combine the functionality of a repeater and the functionality of a bridge. A switch amplifies the
electrical signal, like a repeater, and has the built-in circuitry and intelligence of a bridge. It is a multi-port
connection device that provides connections for individual computers or other hubs and switches.
Gateways
Gateway is a general term for software running on a device that connects two different environments and
that many times acts as a translator for them or somehow restricts their interactions. Usually a gateway is
needed when one environment speaks a different language, meaning it uses a certain protocol that the
other environment does not understand. The gateway can translate Internetwork Packet Exchange (IPX)
protocol packets to IP packets, accept mail from one type of mail server and format it so another type of
mail server can accept and understand it, or connect and translate different data link technologies such as
FDDI to Ethernet.
Gateway Server
Image Reference-
http://static.howtoforge.com/images/screenshots/556af08d5e43aa768260f9e589dc547f-3024.jpg
Bridges - A bridge is a LAN device used to connect LAN segments. It works at the data link layer and
therefore works with MAC addresses. A repeater does not work with addresses; it just forwards all signals
it receives. When a frame arrives at a bridge, the bridge determines whether or not the MAC address is on
the local network segment. If the MAC address is not on the local network segment, the bridge forwards
the frame to the necessary network segment.
Routers - Routers are layer 3, or network layer, devices that are used to connect similar or different
networks. (For example, they can connect two Ethernet LANs or an Ethernet LAN to a Token Ring LAN.) A
router is a device that has two or more interfaces and a routing table so it knows how to get packets to
their destinations. It can filter traffic based on access control lists (ACLs), and it fragments packets when
necessary.
QUESTION 38
In which layer of the OSI Model are connection-oriented protocols located in the TCP/IP suite of protocols?
A. Transport layer
B. Application layer
C. Physical layer
D. Network layer
Correct Answer: A
Explanation
Explanation/Reference:
Connection-oriented protocols such as TCP provides reliability. It is the responsibility of such protocols in
the transport layer to ensure every byte is accounted for. The network layer does not provide reliability. It
only privides the best route to get the traffic to the final destination address.
For your exam you should know the information below about OSI model:
The Open Systems Interconnection model (OSI) is a conceptual model that characterizes and
standardizes the internal functions of a communication system by partitioning it into abstraction layers. The
model is a product of the Open Systems Interconnection project at the International Organization for
Standardization (ISO), maintained by the identification ISO/IEC 7498-1.
The model groups communication functions into seven logical layers. A layer serves the layer above it and
is served by the layer below it. For example, a layer that provides error-free communications across a
network provides the path needed by applications above it, while it calls the next lower layer to send and
receive packets that make up the contents of that path. Two instances at one layer are connected by a
horizontal.
OSI Model
Image source: http://www.petri.co.il/images/osi_model.JPG
PHYSICAL LAYER
The physical layer, the lowest layer of the OSI model, is concerned with the transmission and reception of
the unstructured raw bit stream over a physical medium. It describes the electrical/optical, mechanical, and
functional interfaces to the physical medium, and carries the signals for all of the higher layers. It provides:
Data encoding: modifies the simple digital signal pattern (1s and 0s) used by the PC to better
accommodate the characteristics of the physical medium, and to aid in bit and frame synchronization. It
determines:
Link establishment and termination: establishes and terminates the logical link between two nodes.
Frame traffic control: tells the transmitting node to "back-off" when no frame buffers are available.
Frame sequencing: transmits/receives frames sequentially. Frame acknowledgment: provides/expects
frame acknowledgments. Detects and recovers from errors that occur in the physical layer by
retransmitting non-acknowledged frames and handling duplicate frame receipt.
Frame delimiting: creates and recognizes frame boundaries. Frame error checking: checks received
frames for integrity. Media access management: determines when the node "has the right" to use the
physical medium.
NETWORK LAYER
The network layer controls the operation of the subnet, deciding which physical path the data should take
based on network conditions, priority of service, and other factors. It provides:
Communications Subnet
The network layer software must build headers so that the network layer software residing in the subnet
intermediate systems can recognize them and use them to route data to the destination address.
This layer relieves the upper layers of the need to know anything about the data transmission and
intermediate switching technologies used to connect systems. It establishes, maintains and terminates
connections across the intervening communications facility (one or several intermediate systems in the
communication subnet).
In the network layer and the layers below, peer protocols exist between a node and its immediate
neighbor, but the neighbor may be a node through which data is routed, not the destination station. The
source and destination stations may be separated by many intermediate systems.
TRANSPORT LAYER
The transport layer ensures that messages are delivered error-free, in sequence, and with no losses or
duplications. It relieves the higher layer protocols from any concern with the transfer of data between them
and their peers.
The size and complexity of a transport protocol depends on the type of service it can get from the network
layer. For a reliable network layer with virtual circuit capability, a minimal transport layer is required. If the
network layer is unreliable and/or only supports datagrams, the transport protocol should include extensive
error detection and recovery.
Typically, the transport layer can accept relatively large messages, but there are strict message size limits
imposed by the network (or lower) layer. Consequently, the transport layer must break up the messages
into smaller units, or frames, prepending a header to each frame.
The transport layer header information must then include control information, such as message start and
message end flags, to enable the transport layer on the other end to recognize message boundaries. In
addition, if the lower layers do not maintain sequence, the transport header must contain sequence
information to enable the transport layer on the receiving end to get the pieces back together in the right
order before handing the received message up to the layer above.
End-to-end layers
Unlike the lower "subnet" layers whose protocol is between immediately adjacent nodes, the transport
layer and the layers above are true "source to destination" or end-to-end layers, and are not concerned
with the details of the underlying communications facility. Transport layer software (and software above it)
on the source station carries on a conversation with similar software on the destination station by using
message headers and control messages.
SESSION LAYER
The session layer allows session establishment between processes running on different stations.
It provides:
Session establishment, maintenance and termination: allows two application processes on different
machines to establish, use and terminate a connection, called a session. Session support: performs the
functions that allow these processes to communicate over the network, performing security, name
recognition, logging, and so on.
PRESENTATION LAYER
The presentation layer formats the data to be presented to the application layer. It can be viewed as the
translator for the network. This layer may translate data from a format used by the application layer into a
common format at the sending station, then translate the common format to a format known to the
application layer at the receiving station.
The presentation layer provides:
Character code translation: for example, ASCII to EBCDIC. Data conversion: bit order, CR-CR/LF, integer-
floating point, and so on. Data compression: reduces the number of bits that need to be transmitted on the
network. Data encryption: encrypt data for security purposes. For example, password encryption.
APPLICATION LAYER
The application layer serves as the window for users and application processes to access network
services. This layer contains a variety of commonly needed functions:
QUESTION 39
Which of the following transmission media would NOT be affected by cross talk or interference?
A. Copper cable
B. Radio System
C. Satellite radiolink
D. Fiber optic cables
Correct Answer: D
Explanation
Explanation/Reference:
Only fiber optic cables are not affected by crosstalk or interference.
For your exam you should know the information about transmission media:
Copper Cable
Copper cable is very simple to install and easy to tap. It is used mostly for short distance and supports
voice and data.
Copper has been used in electric wiring since the invention of the electromagnet and the telegraph in the
1820s.The invention of the telephone in 1876 created further demand for copper wire as an electrical
conductor.
Copper is the electrical conductor in many categories of electrical wiring. Copper wire is used in power
generation, power transmission, power distribution, telecommunications, electronics circuitry, and
countless types of electrical equipment. Copper and its alloys are also used to make electrical contacts.
Electrical wiring in buildings is the most important market for the copper industry. Roughly half of all copper
mined is used to manufacture electrical wire and cable conductors.
Copper Cable
Image Source - http://i00.i.aliimg.com/photo/v0/570456138/FRLS_HR_PVC_Copper_Cable.jpg
Coaxial cable
Coaxial cable, or coax (pronounced 'ko.aks), is a type of cable that has an inner conductor surrounded by
a tubular insulating layer, surrounded by a tubular conducting shield. Many coaxial cables also have an
insulating outer sheath or jacket. The term coaxial comes from the inner conductor and the outer shield
sharing a geometric axis. Coaxial cable was invented by English engineer and mathematician Oliver
Heaviside, who patented the design in 1880.Coaxial cable differs from other shielded cable used for
carrying lower-frequency signals, such as audio signals, in that the dimensions of the cable are controlled
to give a precise, constant conductor spacing, which is needed for it to function efficiently as a radio
frequency transmission line.
Coaxial cable are expensive and does not support many LAN's. It supports data and video Coaxial Cable
Image Source - http://www.tlc-direct.co.uk/Images/Products/size_3/CARG59.JPG
Fiber optics
An optical fiber cable is a cable containing one or more optical fibers that are used to carry light. The
optical fiber elements are typically individually coated with plastic layers and contained in a protective tube
suitable for the environment where the cable will be deployed. Different types of cable are used for
different applications, for example long distance telecommunication, or providing a high-speed data
connection between different parts of a building. Fiber optics used for long distance, hard to splice, not
vulnerable to cross talk and difficult to tap.
It supports voice data, image and video.
Radio System
Radio systems are used for short distance,cheap and easy to tap. Radio is the radiation (wireless
transmission) of electromagnetic signals through the atmosphere or free space.
Information, such as sound, is carried by systematically changing (modulating) some property of the
radiated waves, such as their amplitude, frequency, phase, or pulse width. When radio waves strike an
electrical conductor, the oscillating fields induce an alternating current in the conductor. The information in
the waves can be extracted and transformed back into its original form.
Fiber Optics
Image Source - http://aboveinfranet.com/wp-content/uploads/2014/04/fiber-optic-cables-above- infranet-
solutions.jpg
Microwave radio transmission is commonly used in point-to-point communication systems on the surface
of the Earth, in satellite communications, and in deep space radio communications. Other parts of the
microwave radio band are used for radars, radio navigation systems, sensor systems, and radio
astronomy.
Microwave radio systems are carriers for voice data signal, cheap and easy to tap.
Radio System - Radio systems are used for short distance,cheap and easy to tap. Satellite Radio Link -
Satellite radio link uses transponder to send information and easy to tap.
QUESTION 40
What is called an attack where the attacker spoofs the source IP address in an ICMP ECHO broadcast
packet so it seems to have originated at the victim's system, in order to flood it with REPLY packets?
A. SYN Flood attack
B. Smurf attack
C. Ping of Death attack
D. Denial of Service (DOS) attack
Correct Answer: B
Explanation
Explanation/Reference:
Although it may cause a denial of service to the victim's system, this type of attack is a Smurf attack. A
SYN Flood attack uses up all of a system's resources by setting up a number of bogus communication
sockets on the victim's system. A Ping of Death attack is done by sending IP packets that exceed the
maximum legal length (65535 octets). Source: HARRIS, Shon, All-In-One CISSP Certification Exam Guide,
McGraw-Hill/Osborne, 2002, chapter 11: Application and System Development (page 789).
QUESTION 41
Why are coaxial cables called "coaxial"?
A. it includes two physical channels that carries the signal surrounded (after a layer of insulation) by
another concentric physical channel, both running along the same axis.
B. it includes one physical channel that carries the signal surrounded (after a layer of insulation) by
another concentric physical channel, both running along the same axis
C. it includes two physical channels that carries the signal surrounded (after a layer of insulation) by
another two concentric physical channels, both running along the same axis.
D. it includes one physical channel that carries the signal surrounded (after a layer of insulation) by
another concentric physical channel, both running perpendicular and along the different axis
Correct Answer: B
Explanation
Explanation/Reference:
Coaxial cable is called "coaxial" because it includes one physical channel that carries the signal
surrounded (after a layer of insulation) by another concentric physical channel, both running along the
same axis.
The outer channel serves as a ground. Many of these cables or pairs of coaxial tubes can be placed in a
single outer sheathing and, with repeaters, can carry information for a great distance. Source: STEINER,
Kurt, Telecommunications and Network Security, Version 1, May 2002, CISSP Open Study Group (Domain
Leader: skottikus), Page 14.
QUESTION 42
The International Organization for Standardization / Open Systems Interconnection (ISO/OSI) Layer 7
does NOT include which of the following?
Correct Answer: B
Explanation
Explanation/Reference:
Layer 7 Applications Layer Provides specific services for applications such as:
FTP (File Transfer Protocol)
TFTP (Trivial File Transfer Protocol)Used by some X-Terminal systems HTTP (Hypertext Transfer
Protocol)
SNMP (Simple Network Management Protocol Helps network managers locate and correct problems in a
TCP/IP network
Used to gain information from network devices such as count of packets received and routing tables
SMTP (Simple Mail Transfer Protocol)Used by many email applications. Source: STEINER, Kurt,
Telecommunications and Network Security, Version 1, May 2002, CISSP Open Study Group (Domain
Leader: skottikus), Page 12.
QUESTION 43
The International Standards Organization / Open Systems Interconnection (ISO/OSI) Layers does NOT
have which of the following characteristics?
Correct Answer: B
Explanation
Explanation/Reference:
The International Standards Organization / Open Systems Interconnection (ISO/OSI) Layers and
Characteristics Standard model for network communications enables dissimilar networks to communicate,
Defines 7 protocol layers (a.k.a. protocol stack) Each layer on one workstation communicates with its
respective layer on another workstation using protocols (i.e. agreed-upon communication formats)
"Mapping" each protocol to the model is useful for comparing protocols.
Mnemonics: Please Do Not Throw Sausage Pizza Away (bottom to top layer) All People Seem To Need
Data Processing (top to bottom layer). Source: STEINER, Kurt, Telecommunications and Network
Security, Version 1, May 2002, CISSP Open Study Group (Domain Leader: skottikus), Page 12.
QUESTION 44
The International Standards Organization / Open Systems Interconnection (ISO/OSI) Layers 6 is which of
the following?
A. Application Layer
B. Presentation Layer
C. Data Link Layer
D. Network Layer
Correct Answer: B
Explanation
Explanation/Reference:
International Standards Organization / Open Systems Interconnection (ISO/OSI) Layers and
Characteristics:
Layers:
1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Applications Layer
Here's a great mnemonicfor the OSI model: "Please Do Not Throw Sausage Pizza Away". Source:
STEINER, Kurt, Telecommunications and Network Security, Version 1, May 2002, CISSP Open Study
Group (Domain Leader: skottikus), Page 12.
QUESTION 45
In telephony different types of connections are being used. The connection from the phone company's
branch office to local customers is referred to as which of the following choices?
A. new loop
B. local loop
C. loopback
D. indigenous loop
Correct Answer: B
Explanation
Explanation/Reference:
Transmission on fiber optic wire requires repeating at distance intervals. The glass fiber requires more
protection within an outer cable than copper. For these reasons and because the installation of any new
wiring is labor-intensive, few communities yet have fiber optic wires or cables from the phone company's
branch office to local customers (local loop). In telephony, a local loop is the wired connection from a
telephone company's central office in a locality to its customers' telephones at homes and businesses. This
connection is usually on a pair of copper wires called twisted pair. The system was originally designed for
voice transmission only using analog transmission technology on a single voice channel. Today, your
computer's modem makes the conversion between analog signals and digital signals. With Integrated
Services Digital Network (ISDN) or Digital Subscriber Line (DSL), the local loop can carry digital signals
directly and at a much higher bandwidth than they do for voice only.
Local Loop diagram
Image from: http://www.thenetworkencyclopedia.com/entry/local-loop/
QUESTION 46
Communications and network security relates to transmission of which of the following?
A. voice
B. voice and multimedia
C. data and multimedia
D. voice, data and multimedia
Correct Answer: D
Explanation
Explanation/Reference:
From the published (ISC)2 goals for the Certified Information Systems Security Professional candidate:
The CISSP candidate should be familiar to communications and network security as it relates to voice,
data, multimedia, and facsimile transmissions in terms of local area, wide area, and remote access.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 57.
QUESTION 47
One of the following assertions is NOT a characteristic of Internet Protocol Security (IPsec)
Correct Answer: C
Explanation
Explanation/Reference:
IPSec provide replay protection that ensures data is not delivered multiple times, however IPsec does not
ensure that data is delivered in the exact order in which it is sent. IPSEC uses TCP and packets may be
delivered out of order to the receiving side depending which route was taken by the packet.
Internet Protocol Security (IPsec) has emerged as the most commonly used network layer security control
for protecting communications. IPsec is a framework of open standards for ensuring private
communications over IP networks. Depending on how IPsec is implemented and configured, it can provide
any combination of the following types of protection:
Confidentiality. IPsec can ensure that data cannot be read by unauthorized parties. This is accomplished
by encrypting data using a cryptographic algorithm and a secret key a value known only to the two parties
exchanging data. The data can only be decrypted by someone who has the secret key.
Integrity. IPsec can determine if data has been changed (intentionally or unintentionally) during transit. The
integrity of data can be assured by generating a message authentication code (MAC) value, which is a
cryptographic checksum of the data. If the data is altered and the MAC is recalculated, the old and new
MACs will differ.
Peer Authentication. Each IPsec endpoint confirms the identity of the other IPsec endpoint with which it
wishes to communicate, ensuring that the network traffic and data is being sent from the expected host.
Replay Protection. The same data is not delivered multiple times, and data is not delivered grossly out of
order. However, IPsec does not ensure that data is delivered in the exact order in which it is sent.
Traffic Analysis Protection. A person monitoring network traffic does not know which parties are
communicating, how often communications are occurring, or how much data is being exchanged.
However, the number of packets being exchanged can be counted. Access Control. IPsec endpoints can
perform filtering to ensure that only authorized IPsec users can access particular network resources. IPsec
endpoints can also allow or block certain types of network traffic, such as allowing Web server access but
denying file sharing.
The following are incorrect answers because they are all features provided by IPSEC:
"Data cannot be read by unauthorized parties" is wrong because IPsec provides confidentiality through the
usage of the Encapsulating Security Protocol (ESP), once encrypted the data cannot be read by
unauthorized parties because they have access only to the ciphertext. This is accomplished by encrypting
data using a cryptographic algorithm and a session key, a value known only to the two parties exchanging
data. The data can only be decrypted by someone who has a copy of the session key.
"The identity of all IPsec endpoints are confirmed by other endpoints" is wrong because IPsec provides
peer authentication: Each IPsec endpoint confirms the identity of the other IPsec endpoint with which it
wishes to communicate, ensuring that the network traffic and data is being sent from the expected host.
"The number of packets being exchanged can be counted" is wrong because although IPsec provides
traffic protection where a person monitoring network traffic does not know which parties are
communicating, how often communications are occurring, or how much data is being exchanged, the
number of packets being exchanged still can be counted.
QUESTION 48
One of these statements about the key elements of a good configuration process is NOT true
Correct Answer: C
Explanation
Explanation/Reference:
Configuration management isn't about preventing change but ensuring the integrity of IT resources by
preventing unauthorised or improper changes. According to the Official ISC2 guide to the CISSP exam, a
good CM process is one that can:
QUESTION 49
One of the following statements about the differences between PPTP and L2TP is NOT true
Correct Answer: C
Explanation
Explanation/Reference:
L2TP is affected by packet header modification and cannot cope with firewalls and network devices that
perform NAT.
"PPTP can run only on top of IP networks." is correct as PPTP encapsulates datagrams into an IP packet,
allowing PPTP to route many network protocols across an IP network. "PPTP is an encryption protocol and
L2TP is not." is correct. When using PPTP, the PPP payload is encrypted with Microsoft Point-to-Point
Encryption (MPPE) using MSCHAP or EAP-TLS. "L2TP supports AAA servers" is correct as L2TP
supports TACACS+ and RADIUS.
NOTE:
L2TP does work over NAT. It is possible to use a tunneled mode that wraps every packet into a UDP
packet. Port 4500 is used for this purpose. However this is not true of PPTP and it is not true as well that it
works well with all firewalls and NAT devices.
References:
All in One Third Edition page 545
Official Guide to the CISSP Exam page 124-126
QUESTION 50
You have been tasked to develop an effective information classification program. Which one of the
following steps should be performed first?
Correct Answer: D
Explanation
Explanation/Reference:
According to the AIO 3rd edition, these are the necessary steps for a proper classification program:
1. Define classification levels.
2. Specify the criteria that will determine how data is classified.
3. Have the data owner indicate the classification of the data she is responsible for.
4. Identify the data custodian who will be responsible for maintaining data and its security level.
5. Indicate the security controls, or protection mechanisms, that are required for each classification level.
6. Document any exceptions to the previous classification issues.
7. Indicate the methods that can be used to transfer custody of the information to a different data owner.
8. Create a procedure to periodically review the classification and ownership. Communicate any changes
to the data custodian.
9. Indicate termination procedures for declassifying the data.
10. Integrate these issues into the security-awareness program so that all employees understand how to
handle data at different classification levels.
QUESTION 51
In the course of responding to and handling an incident, you work on determining the root cause of the
incident. In which step are you in?
A. Recovery
B. Containment
C. Triage
D. Analysis and tracking
Correct Answer: D
Explanation
Explanation/Reference:
In this step, your main objective is to examine and analyze what has occurred and focus on determining
the root cause of the incident.
Recovery is incorrect as recovery is about resuming operations or bringing affected systems back into
production
Containment is incorrect as containment is about reducing the potential impact of an incident. Triage is
incorrect as triage is about determining the seriousness of the incident and filtering out false positives
Reference:
Official Guide to the CISSP CBK, pages 700-704
QUESTION 52
Which of the following assertions is NOT true about pattern matching and anomaly detection in intrusion
detection?
Correct Answer: C
Explanation
Explanation/Reference:
This is wrong which makes this the correct choice. This statement is not true as stateful matching scans for
attack signatures by analyzing traffic streams rather than individual packets. Stateful matching intrusion
detection takes pattern matching to the next level. As networks become faster there is an emerging need
for security analysis techniques that can keep up with the increased network throughput. Existing network-
based intrusion detection sensors can barely keep up with bandwidths of a few hundred Mbps. Analysis
tools that can deal with higher throughput are unable to maintain state between different steps of an attack
or they are limited to the analysis of packet headers.
The following answers are all incorrect:
Anomaly detection tends to produce more data is true as an anomaly-based IDS produces a lot of data as
any activity outside of expected behavior is recorded. A pattern matching IDS can only identify known
attacks is true as a pattern matching IDS works by comparing traffic streams against signatures. These
signatures are created for known attacks. An anomaly-based engine develops baselines of normal traffic
activity and throughput, and alerts on deviations from these baselines is true as the assertion is a
characteristic of a statistical anomaly-based IDS.
Reference:
Official guide to the CISSP CBK. Pages 198 to 201
http://cs.ucsb.edu/~vigna/publications/2003_vigna_robertson_kher_kemmerer_ACSAC03.pdf
QUESTION 53
Which of the following is NOT a characteristic of a host-based intrusion detection system?
Correct Answer: A
Explanation
Explanation/Reference:
A HIDS does not consume large amounts of system resources is the correct choice. HIDS can consume
inordinate amounts of CPU and system resources in order to function effectively, especially during an
event.
All the other answers are characteristics of HIDSes
A HIDS can:
- scrutinize event logs, critical system files, and other auditable system resources;
- look for unauthorized change or suspicious patterns of behavior or activity
- can send alerts when unusual events are discovered
Reference:
Official guide to the CISSP CBK. Pages 197 to 198.
QUESTION 54
Which of the following is NOT a correct notation for an IPv6 address?
A. 2001:0db8:0:0:0:0:1428:57ab
B. ABCD:EF01:2345:6789:
C. ABCD:EF01:2345:6789::1
D. 2001:DB8::8:800::417A
Correct Answer: D
Explanation
Explanation/Reference:
This is not a correct notation for an IPv6 address because the "::" can only appear once in an address. The
use of "::" is a shortcut notation that indicates one or more groups of 16 bits of zeros.
::1 is the loopback address using the special notation Reference: IP Version 6 Addressing Architecture
http://tools.ietf.org/html/rfc4291#section-2.1
QUESTION 55
Another example of Computer Incident Response Team (CIRT) activities is:
A. Management of the netware logs, including collection, retention, review, and analysis of data
B. Management of the network logs, including collection and analysis of data
C. Management of the network logs, including review and analysis of data
D. Management of the network logs, including collection, retention, review, and analysis of data
Correct Answer: D
Explanation
Explanation/Reference:
Additional examples of CIRT activities are:
- Management of the network logs, including collection, retention, review, and analysis of data
- Management of the resolution of an incident, management of the remediation of a vulnerability, and post-
event reporting to the appropriate parties.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 64.
QUESTION 56
An area of the Telecommunications and Network Security domain that directly affects the Information
Systems Security tenet of Availability can be defined as:
A. Netware availability
B. Network availability
C. Network acceptability
D. Network accountability
Correct Answer: A
Explanation
Explanation/Reference:
Details:
Network availability can be defined as an area of the Telecommunications and Network Security domain
that directly affects the Information Systems Security tenet of Availability. Source: KRUTZ, Ronald L. &
VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John
Wiley & Sons, Page 64.
QUESTION 57
Which of the following is the correct set of assurance requirements for EAL 5?
Correct Answer: C
Explanation
Explanation/Reference:
Under the Common Criteria model, an evaluation is carried out on a product and is assigned an Evaluation
Assurance Level (EAL). The thorough and stringent testing increases in detailed- oriented tasks as the
assurance levels increase. The Common Criteria has seven assurance levels. The range is from EAL1,
where functionality testing takes place, to EAL7, where thorough testing is performed and the system
design is verified. The Orange Book and the Rainbow Series provide evaluation schemes that are too rigid
and narrowly defined for the business world. ITSEC attempted to provide a more flexible approach by
separating the functionality and assurance attributes and considering the evaluation of entire systems.
However, this flexibility added complexity because evaluators could mix and match functionality and
assurance ratings, which resulted in too many classifications to keep straight. Because we are a species
that continues to try to get it right, the next attempt for an effective and usable evaluation criteria was the
Common Criteria. In 1990, the International Organization for Standardization (ISO) identified the need for
international standard evaluation criteria to be used globally. The Common Criteria project started in 1993
when several organizations came together to combine and align existing and emerging evaluation criteria
(TCSEC, ITSEC, Canadian Trusted Computer Product Evaluation Criteria [CTCPEC], and the Federal
Criteria). The Common Criteria was developed through a collaboration among national security standards
organizations within the United States, Canada, France, Germany, the United Kingdom, and the
Netherlands. The benefit of having a globally recognized and accepted set of criteria is that it helps
consumers by reducing the complexity of the ratings and eliminating the need to understand the definition
and meaning of different ratings within various evaluation schemes. This also helps vendors, because now
they can build to one specific set of requirements if they want to sell their products internationally, instead
of having to meet several different ratings with varying rules and requirements.
The full list of assurance requirements for the Evaluation Assurance Levels is provided below:
EAL 1: The product is functionally tested; this is sought when some assurance in accurate operation is
necessary, but the threats to security are not seen as serious.
EAL 2: Structurally tested; this is sought when developers or users need a low to moderate level of
independently guaranteed security.
EAL 3: Methodically tested and checked; this is sought when there is a need for a moderate level of
independently ensured security.
EAL 4: Methodically designed, tested, and reviewed; this is sought when developers or users require a
moderate to high level of independently ensured security.
EAL 5: Semiformally designed and tested; this is sought when the requirement is for a high level of
independently ensured security.
EAL 6: Semiformally verified, designed, and tested; this is sought when developing specialized TOEs for
high-risk situations.
EAL 7: Formally verified, designed, and tested; this is sought when developing a security TOE for
application in extremely high-risk situations.
EALs are frequently misunderstood to provide a simple means to compare security products with similar
levels. In fact, products may be very different even if they are assigned the same EAL level, since
functionality may have little in common.
QUESTION 58
Which of the following defines when RAID separates the data into multiple units and stores it on multiple
disks?
A. striping
B. scanning
C. screening
D. shadowing
Correct Answer: A
Explanation
Explanation/Reference:
Basically, RAID separates the data into multiple units and stores it on multiple disks by using a process
called "striping".
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 65.
QUESTION 59
What is the process that RAID Level 0 uses as it creates one large disk by using several disks?
A. striping
B. mirroring
C. integrating
D. clustering
Correct Answer: A
Explanation
Explanation/Reference:
RAID Level 0 creates one large disk by using several disks. This process is called striping. Source:
KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer
Security, 2001, John Wiley & Sons, Page 65.
QUESTION 60
RAID Level 1 mirrors the data from one disk or set of disks using which of the following techniques?
Correct Answer: A
Explanation
Explanation/Reference:
RAID Level 1 mirrors the data from one disk or set of disks by duplicating the data onto another disk or set
of disks.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 65.
QUESTION 61
Which of the following stripes the data and the parity information at the block level across all the drives in
the set?
A. RAID Level 5
B. RAID Level 0
C. RAID Level 2
D. RAID Level 1
Correct Answer: A
Explanation
Explanation/Reference:
RAID Level 5 stripes the data and the parity information at the block level across all the drives in the set.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 66.
QUESTION 62
A group of independent servers, which are managed as a single system, that provides higher availability,
easier manageability, and greater scalability is:
A. server cluster.
B. client cluster.
C. guest cluster.
D. host cluster.
Correct Answer: A
Explanation
Explanation/Reference:
A server cluster is a group of independent servers, which are managed as a single system, that provides
higher availability, easier manageability, and greater scalability. Source: KRUTZ, Ronald L. & VINES,
Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley &
Sons, Page 67.
QUESTION 63
If any server in the cluster crashes, processing continues transparently, however, the cluster suffers some
performance degradation. This implementation is sometimes called a:
A. server farm
B. client farm
C. cluster farm
D. host farm
Correct Answer: A
Explanation
Explanation/Reference:
If any server in the cluster crashes, processing continues transparently, however, the cluster suffers some
performance degradation. This implementation is sometimes called a "server farm." Source: KRUTZ,
Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security,
2001, John Wiley & Sons, Page 67.
QUESTION 64
Which of the following backup methods is primarily run when time and tape space permits, and is used for
the system archive or baselined tape sets?
Correct Answer: A
Explanation
Explanation/Reference:
The Full Backup Method is primarily run when time and tape space permits, and is used for the system
archive or baselined tape sets.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 69.
QUESTION 65
Which backup method is used if backup time is critical and tape space is at an extreme premium?
Correct Answer: A
Explanation
Explanation/Reference:
Full Backup/Archival Backup - Complete/Full backup of every selected file on the system regardless of
whether it has been backup recently.. This is the slowest of the backup methods since it backups all the
data. It's however the fastest for restoring data. Incremental Backup - Any backup in which only the files
that have been modified since last full back up are backed up. The archive attribute should be updated
while backing up only modified files, which indicates that the file has been backed up. This is the fastest of
the backup methods, but the slowest of the restore methods.
Differential Backup - The backup of all data files that have been modified since the last incremental backup
or archival/full backup. Uses the archive bit to determine what files have changed since last incremental
backup or full backup. The files grows each day until the next full backup is performed clearing the archive
attributes. This enables the user to restore all files changed since the last full backup in one pass. This is a
more neutral method of backing up data since it's not faster nor slower than the other two
Source:
KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer
Security, 2001, John Wiley & Sons, Page 69.
and
http://www.proprofs.com/mwiki/index.php/Full_Backup,_Incremental_ %26_Differential_Backup66.
Hierarchical Storage Management (HSM) is commonly employed in:
Answer: A
Hierarchical Storage Management (HSM) is commonly employed in very large data retrieval systems.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 71.
QUESTION 66
Which of the following is immune to the effects of electromagnetic interference (EMI) and therefore has a
much longer effective usable length?
Correct Answer: A
Explanation
Explanation/Reference:
Fiber Optic cable is immune to the effects of electromagnetic interference (EMI) and therefore has a much
longer effective usable length (up to two kilometers in some cases). Source: KRUTZ, Ronald L. & VINES,
Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley &
Sons, Page 72.
QUESTION 67
Which of the following methods of providing telecommunications continuity involves the use of an
alternative media?
A. Alternative routing
B. Diverse routing
C. Long haul network diversity
D. Last mile circuit protection
Correct Answer: A
Explanation
Explanation/Reference:
Alternative routing is a method of routing information via an alternate medium such as copper cable or fiber
optics. This involves use of different networks, circuits or end points should the normal network be
unavailable. Diverse routing routes traffic through split cable facilities or duplicate cable facilities. This can
be accomplished with different and/or duplicate cable sheaths. If different cable sheaths are used, the
cable may be in the same conduit and therefore subject to the same interruptions as the cable it is backing
up. The communication service subscriber can duplicate the facilities by having alternate routes, although
the entrance to and from the customer premises may be in the same conduit. The subscriber can obtain
diverse routing and alternate routing from the local carrier, including dual entrance facilities. This type of
access is time- consuming and costly. Long haul network diversity is a diverse long-distance network
utilizing T1 circuits among the major long-distance carriers. It ensures long-distance access should any
one carrier experience a network failure. Last mile circuit protection is a redundant combination of local
carrier T1s microwave and/or coaxial cable access to the local communications loop. This enables the
facility to have access during a local carrier communication disaster. Alternate local carrier routing is also
utilized.
Source: Information Systems Audit and Control Association, Certified Information Systems Auditor 2002
review manual, chapter 5: Disaster Recovery and Business Continuity (page 259).
QUESTION 68
Which SERVICE usually runs on port 25?
Correct Answer: C
Explanation
Explanation/Reference:
FTP - Port 21
Telnet - Port 23
SMTP - Port 25
DNS - Port 53
The port numbers are divided into three ranges: the Well Known Ports, the Registered Ports, and the
Dynamic and/or Private Ports.
QUESTION 69
Which port does the Post Office Protocol Version 3 (POP3) make use of?
A. 110
B. 109
C. 139
D. 119
Correct Answer: A
Explanation
Explanation/Reference:
The other answers are not correct because of the following protocol/port numbers matrix:
QUESTION 70
Which of the following are WELL KNOWN PORTS assigned by the IANA?
A. Ports 0 to 255
B. Ports 0 to 1024
C. Ports 0 to 1023
D. Ports 0 to 127
Correct Answer: C
Explanation
Explanation/Reference:
The port numbers are divided into three ranges: the Well Known Ports, the Registered Ports, and the
Dynamic and/or Private Ports. The range for assigned "Well Known" ports managed by the IANA (Internet
Assigned Numbers Authority) is 0-1023.
Source: iana.org: port assignments.
QUESTION 71
What is the maximum length of cable that can be used for a twisted-pair, Category 5 10Base-T cable?
A. 80 meters
B. 100 meters
C. 185 meters
D. 500 meters
Correct Answer: B
Explanation
Explanation/Reference:
As a signal travels though a medium, it attenuates (loses strength) and at some point will become
indistinguishable from noise. To assure trouble-free communication, maximum cable lengths are set
between nodes to assure that attenuation will not cause a problem. The maximum CAT-5 UTP cable
length between two nodes for 10BASE-T is 100M.
QUESTION 72
Secure Sockets Layer (SSL) is very heavily used for protecting which of the following?
A. Web transactions.
B. EDI transactions.
C. Telnet transactions.
D. Electronic Payment transactions.
Correct Answer: A
Explanation
Explanation/Reference:
SSL was developed Netscape Communications Corporation to improve security and privacy of HTTP
transactions.
SSL is one of the most common protocols used to protect Internet traffic. It encrypts the messages using
symmetric algorithms, such as IDEA, DES, 3DES, and Fortezza, and also calculates the MAC for the
message using MD5 or SHA-1. The MAC is appended to the message and encrypted along with the
message data. The exchange of the symmetric keys is accomplished through various versions of Diffie-
Hellmann or RSA. TLS is the Internet standard based on SSLv3. TLSv1 is backward compatible with
SSLv3. It uses the same algorithms as SSLv3; however, it computes an HMAC instead of a MAC along
with other enhancements to improve security.
QUESTION 73
Transport Layer Security (TLS) is a two-layered socket layer security protocol that contains the TLS
Record Protocol and the::
Correct Answer: D
Explanation
Explanation/Reference:
This is the second protocol in TLS.
"Transport Layer Security (TLS) Internet Protocol" is incorrect. There is no such protocol. "Transport Layer
Security (TLS) Data Protocol" is incorrect. There is no such protocol. "Transport Layer Security (TLS) Link
Protocol" is incorrect. There is no such protocol.
References
CBK, pp. 496 - 497
QUESTION 74
Similar to Secure Shell (SSH-2), Secure Sockets Layer (SSL) uses symmetric encryption for encrypting the
bulk of the data being sent over the session and it uses asymmetric or public key cryptography for:
A. Peer Authentication
B. Peer Identification
C. Server Authentication
D. Name Resolution
Correct Answer: A
Explanation
Explanation/Reference:
SSL provides for Peer Authentication. Though peer authentication is possible, authentication of the client is
seldom used in practice when connecting to public e-commerce web sites. Once authentication is
complete, confidentiality is assured over the session by the use of symmetric encryption in the interests of
better performance.
QUESTION 75
Secure Sockets Layer (SSL) uses a Message Authentication Code (MAC) for what purpose?
A. message non-repudiation.
B. message confidentiality.
C. message interleave checking.
D. message integrity.
Correct Answer: D
Explanation
Explanation/Reference:
A keyed hash also called a MAC (message authentication code) is used for integrity protection and
authenticity.
In cryptography, a message authentication code (MAC) is a generated value used to authenticate a
message. A MAC can be generated by HMAC or CBC-MAC methods. The MAC protects both a
message's integrity (by ensuring that a different MAC will be produced if the message has changed) as
well as its authenticity, because only someone who knows the secret key could have modified the
message.
MACs differ from digital signatures as MAC values are both generated and verified using the same secret
key. This implies that the sender and receiver of a message must agree on the same key before initiating
communications, as is the case with symmetric encryption. For the same reason, MACs do not provide the
property of non-repudiation offered by signatures specifically in the case of a network-wide shared secret
key: any user who can verify a MAC is also capable of generating MACs for other messages.
HMAC
When using HMAC the symmetric key of the sender would be concatenated (added at the end) with the
message. The result of this process (message + secret key) would be put through a hashing algorithm,
and the result would be a MAC value. This MAC value is then appended to the message being sent. If an
enemy were to intercept this message and modify it, he would not have the necessary symmetric key to
create a valid MAC value. The receiver would detect the tampering because the MAC value would not be
valid on the receiving side.
CBC-MAC
If a CBC-MAC is being used, the message is encrypted with a symmetric block cipher in CBC mode, and
the output of the final block of ciphertext is used as the MAC. The sender does not send the encrypted
version of the message, but instead sends the plaintext version and the MAC attached to the message.
The receiver receives the plaintext message and encrypts it with the same symmetric block cipher in CBC
mode and calculates an independent MAC value. The receiver compares the new MAC value with the
MAC value sent with the message. This method does not use a hashing algorithm as does HMAC.
Need Help
Please provide as much detail as possible so we can best assist you.
To update a previously submitted ticket:
Any charges made through this site will appear as Global Simulators Limited.
All trademarks are the property of their respective owners.