Chapter 2
Security Operations and Administration (Domain 2)

THIS CHAPTER COVERS THE FOLLOWING SSCP EXAM OBJECTIVES:

  • images 2.1 Comply with codes of ethics
    • (ISC)2 Code of Ethics
    • Organizational code of ethics
  • images 2.2 Understand security concepts
    • Confidentiality
    • Integrity
    • Availability
    • Accountability
    • Privacy
    • Non-repudiation
    • Least privilege
    • Separation of duties
  • images 2.3 Document, implement, and maintain functional security controls
    • Deterrent controls
    • Preventative controls
    • Detective controls
    • Corrective controls
    • Compensating controls
  • images 2.4 Participate in asset management
    • Lifecycle (hardware, software, and data)
    • Hardware inventory
    • Software inventory and licensing
    • Data storage
  • images 2.5 Implement security controls and assess compliance
    • Technical controls (e.g., session timeout, password aging)
    • Physical controls (e.g., mantrap, cameras, locks)
    • Administrative controls (e.g., security policies and standards, procedures, baselines)
    • Periodic audit and review
  • images 2.6 Participate in change management
    • Execute change management process
    • Identify security impact
    • Testing/implementing patches, fixes, and updates (e.g., operating system, applications, SDLC)
  • images 2.7 Participate in security awareness and training
  • images 2.8 Participate in physical security operations (e.g., data center assessment, badging)

  1. Maddox is conducting an information audit for his organization. Which one of the following elements that he discovered is least likely to be classified as PII when used in isolation?

    1. Street addresses
    2. Item codes
    3. Mobile phone numbers
    4. Social Security numbers
  2. Carl recently assisted in the implementation of a new set of security controls designed to comply with legal requirements. He is concerned about the long-term maintenance of those controls. Which one of the following is a good way for Carl to ease his concerns?

    1. Firewall rules
    2. Policy documents
    3. Security standards
    4. Periodic audits
  3. Darlene was recently offered a consulting opportunity as a side job. She is concerned that the opportunity might constitute a conflict of interest. Which one of the following sources is most likely to provide her with appropriate guidance?

    1. Organizational code of ethics
    2. (ISC)2 code of ethics
    3. Organizational security policy
    4. (ISC)2 security policy
  4. Which one of the following is an administrative control that can protect the confidentiality of information?

    1. Encryption
    2. Nondisclosure agreement
    3. Firewall
    4. Fault tolerance
  5. Chris is worried that the laptops that his organization has recently acquired were modified by a third party to include keyloggers before they were delivered. Where should he focus his efforts to prevent this?

    1. His supply chain
    2. His vendor contracts
    3. His post-purchase build process
    4. The original equipment manufacturer (OEM)
  6. The (ISC)2 code of ethics applies to all SSCP holders. Which of the following is not one of the four mandatory canons of the code?

    1. Protect society, the common good, the necessary public trust and confidence, and the infrastructure.
    2. Disclose breaches of privacy, trust, and ethics.
    3. Provide diligent and competent service to the principles.
    4. Advance and protect the profession.
  7. Which one of the following control categories does not accurately describe a fence around a facility?

    1. Physical
    2. Detective
    3. Deterrent
    4. Preventive
  8. Which one of the following actions might be taken as part of a business continuity plan?

    1. Restoring from backup tapes
    2. Implementing RAID
    3. Relocating to a cold site
    4. Restarting business operations
  9. Which one of the following is an example of physical infrastructure hardening?

    1. Antivirus software
    2. Hardware-based network firewall
    3. Two-factor authentication
    4. Fire suppression system
  10. Mary is helping a computer user who sees the following message appear on his computer screen. What type of attack has occurred?

    Image shows characters (ISC) squared.
    1. Availability
    2. Confidentiality
    3. Disclosure
    4. Distributed
  11. The Acme Widgets Company is putting new controls in place for its accounting department. Management is concerned that a rogue accountant may be able to create a new false vendor and then issue checks to that vendor as payment for services that were never rendered. What security control can best help prevent this situation?

    1. Mandatory vacation
    2. Separation of duties
    3. Defense in depth
    4. Job rotation
  12. Beth is the security administrator for a public school district. She is implementing a new student information system and is testing the code to ensure that students are not able to alter their own grades. What principle of information security is Beth enforcing?

    1. Integrity
    2. Availability
    3. Confidentiality
    4. Denial

    For questions 13–15, please refer to the following scenario.

    Juniper Content is a web content development company with 40 employees located in two offices: one in New York and a smaller office in the San Francisco Bay Area. Each office has a local area network protected by a perimeter firewall. The local area network (LAN) contains modern switch equipment connected to both wired and wireless networks.

    Each office has its own file server, and the information technology (IT) team runs software every hour to synchronize files between the two servers, distributing content between the offices. These servers are primarily used to store images and other files related to web content developed by the company. The team also uses a SaaS-based email and document collaboration solution for much of their work.

    You are the newly appointed IT manager for Juniper Content, and you are working to augment existing security controls to improve the organization’s security.

  13. Users in the two offices would like to access each other’s file servers over the Internet. What control would provide confidentiality for those communications?

    1. Digital signatures
    2. Virtual private network
    3. Virtual LAN
    4. Digital content management
  14. You are also concerned about the availability of data stored on each office’s server. You would like to add technology that would enable continued access to files located on the server even if a hard drive in a server fails. What integrity control allows you to add robustness without adding additional servers?

    1. Server clustering
    2. Load balancing
    3. RAID
    4. Scheduled backups
  15. Finally, there are historical records stored on the server that are extremely important to the business and should never be modified. You would like to add an integrity control that allows you to verify on a periodic basis that the files were not modified. What control can you add?

    1. Hashing
    2. ACLs
    3. Read-only attributes
    4. Firewalls
  16. An accounting employee at Doolittle Industries was recently arrested for participation in an embezzlement scheme. The employee transferred money to a personal account and then shifted funds around between other accounts every day to disguise the fraud for months. Which one of the following controls might have best allowed the earlier detection of this fraud?

    1. Separation of duties
    2. Least privilege
    3. Defense in depth
    4. Mandatory vacation
  17. Yolanda is writing a document that will provide configuration information regarding the minimum level of security that every system in the organization must meet. What type of document is she preparing?

    1. Policy
    2. Baseline
    3. Guideline
    4. Procedure
  18. Frank discovers a keylogger hidden on the laptop of his company’s chief executive officer. What information security principle is the keylogger most likely designed to disrupt?

    1. Confidentiality
    2. Integrity
    3. Availability
    4. Denial
  19. Susan is working with the management team in her company to classify data in an attempt to apply extra security controls that will limit the likelihood of a data breach. What principle of information security is Susan trying to enforce?

    1. Availability
    2. Denial
    3. Confidentiality
    4. Integrity
  20. Gary is implementing a new website architecture that uses multiple small web servers behind a load balancer. What principle of information security is Gary seeking to enforce?

    1. Denial
    2. Confidentiality
    3. Integrity
    4. Availability
  21. Which one of the following is not an example of a technical control?

    1. Router ACL
    2. Firewall rule
    3. Encryption
    4. Data classification

    For questions 22–25, please refer to the following scenario.

    Jasper Diamonds is a jewelry manufacturer that markets and sells custom jewelry through their website. Bethany is the manager of Jasper’s software development organization, and she is working to bring the company into line with industry standard practices. She is developing a new change management process for the organization and wants to follow commonly accepted approaches.

  22. Jasper would like to establish a governing body for the organization’s change management efforts. What individual or group within an organization is typically responsible for reviewing the impact of proposed changes?

    1. Chief information officer
    2. Senior leadership team
    3. Change control board
    4. Software developer
  23. During what phase of the change management process does the organization conduct peer review of the change for accuracy and completeness?

    1. Recording
    2. Analysis/Impact Assessment
    3. Approval
    4. Decision Making and Prioritization
  24. Who should the organization appoint to manage the policies and procedures surrounding change management?

    1. Project manager
    2. Change manager
    3. System security officer
    4. Architect
  25. Which one of the following elements is not a crucial component of a change request?

    1. Description of the change
    2. Implementation plan
    3. Backout plan
    4. Incident response plan
  26. Ben is designing a messaging system for a bank and would like to include a feature that allows the recipient of a message to prove to a third party that the message did indeed come from the purported originator. What goal is Ben trying to achieve?

    1. Authentication
    2. Authorization
    3. Integrity
    4. Nonrepudiation
  27. What principle of information security states that an organization should implement overlapping security controls whenever possible?

    1. Least privilege
    2. Separation of duties
    3. Defense in depth
    4. Security through obscurity
  28. Which one of the following is not a goal of a formal change management program?

    1. Implement change in an orderly fashion.
    2. Test changes prior to implementation.
    3. Provide rollback plans for changes.
    4. Inform stakeholders of changes after they occur.
  29. Ben is responsible for the security of payment card information stored in a database. Policy directs that he remove the information from the database, but he cannot do this for operational reasons. He obtained an exception to policy and is seeking an appropriate compensating control to mitigate the risk. What would be his best option?

    1. Purchasing insurance
    2. Encrypting the database contents
    3. Removing the data
    4. Objecting to the exception
  30. You discover that a user on your network has been using the Wireshark tool, as shown here. Further investigation revealed that he was using it for illicit purposes. What pillar of information security has most likely been violated?

    Image shows application where table has columns headers for number, time, source, destination, protocol length, and Info where several rows are highlighted.
    1. Integrity
    2. Denial
    3. Availability
    4. Confidentiality
  31. Which one of the following is the first step in developing an organization’s vital records program?

    1. Identifying vital records
    2. Locating vital records
    3. Archiving vital records
    4. Preserving vital records
  32. Which one of the following security programs is designed to provide employees with the knowledge they need to perform their specific work tasks?

    1. Awareness
    2. Training
    3. Education
    4. Indoctrination
  33. Which one of the following security programs is designed to establish a minimum standard common denominator of security understanding?

    1. Training
    2. Education
    3. Indoctrination
    4. Awareness
  34. Chris is responsible for workstations throughout his company and knows that some of the company’s workstations are used to handle proprietary information. Which option best describes what should happen at the end of their lifecycle for workstations he is responsible for?

    1. Erasing
    2. Clearing
    3. Sanitization
    4. Destruction
  35. What term is used to describe a set of common security configurations, often provided by a third party?

    1. Security policy
    2. Baseline
    3. DSS
    4. NIST SP 800-53
  36. Which one of the following administrative processes assists organizations in assigning appropriate levels of security control to sensitive information?

    1. Information classification
    2. Remanence
    3. Transmitting data
    4. Clearing
  37. Ben is following the National Institute of Standards and Technology (NIST) Special Publication 800-88 guidelines for sanitization and disposition as shown here. He is handling information that his organization classified as sensitive, which is a moderate security categorization in the NIST model. If the media is going to be sold as surplus, what process does Ben need to follow?

    Flow diagram shows security categorization moderate leading to re-use media which leads to leaving org control if yes and destroy if no. Destroy leads to validate, to document, and to exit and leave org control leads to clear if no and purge if yes which both lead to validate to document, and to exit.

    Source: NIST SP 800-88

    1. Destroy, validate, document
    2. Clear, purge, document
    3. Purge, document, validate
    4. Purge, validate, document
  38. Ben has been tasked with identifying security controls for systems covered by his organization’s information classification system. Why might Ben choose to use a security baseline?

    1. It applies in all circumstances, allowing consistent security controls.
    2. They are approved by industry standards bodies, preventing liability.
    3. They provide a good starting point that can be tailored to organizational needs.
    4. They ensure that systems are always in a secure state.
  39. Retaining and maintaining information for as long as it is needed is known as what?

    1. Data storage policy
    2. Data storage
    3. Asset maintenance
    4. Record retention
  40. Referring to the figure shown here, what is the earliest stage of a fire where it is possible to use detection technology to identify it?

    Graph shows time versus temperature where curve increases gradually at first and then increases steeply. Curve at origin is labeled Stage 1: Incipient, as it increases, it is labeled Stage 2: Smoke and Stage 3: Flame, and lastly at highest point it is labeled Stage 4: Heat.

    Image reprinted from CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Edition © John Wiley & Sons 2015, reprinted with permission.

    1. Incipient
    2. Smoke
    3. Flame
    4. Heat
  41. What type of fire suppression system fills with water when the initial stages of a fire are detected and then requires a sprinkler head heat activation before dispensing water?

    1. Wet pipe
    2. Dry pipe
    3. Deluge
    4. Preaction
  42. Ralph is designing a physical security infrastructure for a new computing facility that will remain largely unstaffed. He plans to implement motion detectors in the facility but would also like to include a secondary verification control for physical presence. Which one of the following would best meet his needs?

    1. CCTV
    2. IPS
    3. Turnstiles
    4. Faraday cages
  43. Referring to the figure shown here, what is the name of the security control indicated by the arrow?

    Diagram shows fenced area with building which has door and windows in one corner and building with door where only half of it is inside fence.

    Image reprinted from CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Edition © John Wiley & Sons 2015, reprinted with permission.

    1. Mantrap
    2. Turnstile
    3. Intrusion prevention system
    4. Portal
  44. Which one of the following does not describe a standard physical security requirement for wiring closets?

    1. Place only in areas monitored by security guards.
    2. Do not store flammable items in the closet.
    3. Use sensors on doors to log entries.
    4. Perform regular inspections of the closet.
  45. Betty is concerned about the use of buffer overflow attacks against a custom application developed for use in her organization. What security control would provide the strongest defense against these attacks?

    1. Firewall
    2. Intrusion detection system
    3. Parameter checking
    4. Vulnerability scanning
  46. Juan is retrofitting an existing door to his facility to include a lock with automation capabilities. Which one of the following types of lock is easiest to install as a retrofit to the existing door?

    1. Mantrap
    2. Electric lock
    3. Magnetic lock
    4. Turnstile
  47. Rhonda is considering the use of new identification cards for physical access control in her organization. She comes across a military system that uses the card shown here. What type of card is this?

    �Image shows card with details of person, photo, bar code, and chip.
    1. Smart card
    2. Proximity card
    3. Magnetic stripe card
    4. Phase three card
  48. Which one of the following facilities would have the highest level of physical security requirements?

    1. Data center
    2. Network closet
    3. SCIF
    4. Cubicle work areas
  49. Glenda is investigating a potential privacy violation within her organization. The organization notified users that it was collecting data for product research that would last for six months and then disposed of the data at the end of that period. During the time that they had the data, they also used it to target a marketing campaign. Which principle of data privacy was most directly violated?

    1. Data minimization
    2. Accuracy
    3. Storage limitations
    4. Purpose limitations
  50. What type of access control is composed of policies and procedures that support regulations, requirements, and the organization’s own policies?

    1. Corrective
    2. Logical
    3. Compensating
    4. Administrative
  51. Match each of the numbered security controls listed with exactly one of the lettered categories shown. Choose the category that best describes each control. You may use each control category once, more than once, or not at all.

    Controls Categories
    1. Password
    2. Account reviews
    3. Badge readers
    4. MFA
    5. IDP
    1. Administrative
    2. Technical
    3. Physical
  52. Which of the following access control categories would not include a door lock?

    1. Physical
    2. Directive
    3. Preventative
    4. Deterrent

    For questions 53–54, please refer to the following scenario.

    Gary was recently hired as the first chief information security officer (CISO) for a local government agency. The agency recently suffered a security breach and is attempting to build a new information security program. Gary would like to apply some best practices for security operations as he is designing this program.

  53. As Gary decides what access permissions he should grant to each user, what principle should guide his decisions about default permissions?

    1. Separation of duties
    2. Least privilege
    3. Aggregation
    4. Separation of privileges
  54. As Gary designs the program, he uses the matrix shown here. What principle of information security does this matrix most directly help enforce?

    Table shows ten columns and nine rows with various roles and tasks as headers such as application programmer, security administrator, database administrator, database server administrator, accounts receivable, et cetera. Table also has field labeled potential areas of conflict.�
    1. Segregation of duties
    2. Aggregation
    3. Two-person control
    4. Defense in depth
  55. Lydia is processing access control requests for her organization. She comes across a request where the user does have the required security clearance, but there is no business justification for the access. Lydia denies this request. What security principle is she following?

    1. Need to know
    2. Least privilege
    3. Separation of duties
    4. Two-person control
  56. Helen is implementing a new security mechanism for granting employees administrative privileges in the accounting system. She designs the process so that both the employee’s manager and the accounting manager must approve the request before the access is granted. What information security principle is Helen enforcing?

    1. Least privilege
    2. Two-person control
    3. Job rotation
    4. Separation of duties
  57. Which of the following is not true about the (ISC)2 code of ethics?

    1. Adherence to the code is a condition of certification.
    2. Failure to comply with the code may result in revocation of certification.
    3. The code applies to all members of the information security profession.
    4. Members who observe a breach of the code are required to report the possible violation.
  58. Javier is verifying that only IT system administrators have the ability to log on to servers used for administrative purposes. What principle of information security is he enforcing?

    1. Need to know
    2. Least privilege
    3. Two-person control
    4. Transitive trust
  59. Connor’s company recently experienced a denial-of-service attack that Connor believes came from an inside source. If true, what type of event has the company experienced?

    1. Espionage
    2. Confidentiality breach
    3. Sabotage
    4. Integrity breach
  60. Which one of the following is not a canon of the (ISC)2 code of ethics?

    1. Protect society, the common good, necessary public trust and confidence, and the infrastructure.
    2. Promptly report security vulnerabilities to relevant authorities.
    3. Act honorably, honestly, justly, responsibly, and legally.
    4. Provide diligent and competent service to principals.
  61. When designing an access control scheme, Hilda set up roles so that the same person does not have the ability to provision a new user account and assign superuser privileges to an account. What information security principle is Hilda following?

    1. Least privilege
    2. Separation of duties
    3. Job rotation
    4. Security through obscurity
  62. Which one of the following tools helps system administrators by providing a standard, secure template of configuration settings for operating systems and applications?

    1. Security guidelines
    2. Security policy
    3. Baseline configuration
    4. Running configuration
  63. Tracy is preparing to apply a patch to her organization’s enterprise resource planning system. She is concerned that the patch may introduce flaws that did not exist in prior versions, so she plans to conduct a test that will compare previous responses to input with those produced by the newly patched application. What type of testing is Tracy planning?

    1. Unit testing
    2. Acceptance testing
    3. Regression testing
    4. Vulnerability testing
  64. Which one of the following security practices suggests that an organization should deploy multiple, overlapping security controls to meet security objectives?

    1. Defense in depth
    2. Security through obscurity
    3. Least privilege
    4. Separation of duties
  65. What technology asset management practice would an organization use to ensure that systems meet baseline security standards?

    1. Change management
    2. Patch management
    3. Configuration management
    4. Identity management
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.163.58