Practice Exam I

You will have 90 minutes to complete this exam, which consists of 60 questions. The actual exam requires a minimum passing score of 700 out of 1,000. Ensure you read each question, looking for details that would rule out any of the answers. Many times there will be two or more correct answers; however, there is only one best answer that can be selected. This is a reflection of the real world, where the CISSP often has several options to secure his/her network but one best option. Such is the case when choosing the best encryption to secure data or wireless networks.

Remember that the CISSP exam asks many conceptual questions that may not have a perfect answer. In that case, choose the most correct answer. Leaving a question blank will count against you, so you are always better off taking your best guess. The exam may present you with drag-and-drop questions, or scenarios, or offer figures or diagrams. Examine each question carefully. It’s best to work through the entire test once, answering the questions that you can easily answer. On the second pass, work on the more difficult questions. Others that you have already answered could help you answer the remaining questions.

Practice Exam Questions

1. What type of access control features security labels?

Image A. Restricted access control

Image B. Discretionary access control

Image C. Mandatory access control

Image D. Role-based access control

2. Information security models bridge the gap between access control concepts and implementation of the concepts through the operating system. Place the following models into the category that best describes their design. Some categories may or may not be used.

Image A. Biba

Image B. Clark-Wilson

Image C. Bell-LaPadula

Image D. Brewer-Nash

Image

3. What form of biometric system analyzes the features that exist in the colored tissue surrounding the pupil to validate access?

Image A. Retina

Image B. Cornea

Image C. Iris

Image D. Optic nerve

4. What is the most important item to consider when examining biometric systems?

Image A. The crossover acceptance rate—the lower the number, the better the biometric system

Image B. The crossover error rate—the higher the number, the better the biometric system

Image C. The crossover acceptance rate—the lower the number, the better the biometric system

Image D. The crossover error rate—the lower the number, the better the biometric system

5. You have been asked to help with an authentication problem that was reported after moving to biometric authentication. One of your company’s employees enrolled with a fingerprint reader and was able to authenticate for several weeks using the new system. Then, one day, the employee complained that after cutting his finger he could no longer authenticate and received a “Type 1” error. What is most likely the problem?

Image A. The system does not examine enough information to determine the user.

Image B. Fingerprint readers are not very good at handling type 1 errors by nature, since these are very dynamic.

Image C. Fingerprint readers are not very good at handling type 1 errors by nature, since they have high cross-over error rates.

Image D. The system examines too much information and needs to be configured to be less sensitive.

6. What height of fence will deter only casual trespassers?

Image A. 2–3 feet

Image B. 3–4 feet

Image C. 4–5 feet

Image D. 5–7 feet

7. When discussing policies and procedures, who is strictly responsible for the protection of the company’s assets and data?

Image A. User

Image B. Data owner

Image C. Data custodian

Image D. Security auditor

8. Which of the following is considered a flaw, loophole, oversight, or error that makes the organization susceptible to attack or damage?

Image A. Risk

Image B. Vulnerability

Image C. Exposure

Image D. Threat

9. Which of the following are the correct steps involved in determining the single loss expectancy?

Image A. Single loss expectancy = Asset value / Exposure factor

Image B. Single loss expectancy = Asset value × Exposure factor

Image C. Single loss expectancy = Risk / Exposure factor

Image D. Single loss expectancy = Vulnerability × Exposure factor

10. Estimating potential loss is an important task of CISSP-certified professionals. In order, which of the following are the steps used to perform a quantitative assessment?

Image A. Estimate potential losses, perform a vulnerability assessment, and determine annual loss expectancy.

Image B. Estimate potential losses, conduct a threat analysis, and rank losses as high, medium, or low.

Image C. Assemble a team, prepare a matrix of critical systems and services, and rank losses as high, medium, or low.

Image D. Estimate potential losses, conduct a threat analysis, and determine annual loss expectancy.

11. What is the Delphi Technique an example of?

Image A. A BCP analysis technique

Image B. A quantitative assessment technique

Image C. A DRP analysis technique

Image D. A qualitative assessment technique

12. What is the formula for total risk?

Image A. (Threat – Countermeasure) / Asset value = Total risk

Image B. (Threat – Countermeasure) × Asset value = Total risk

Image C. Threat × Vulnerability × Asset value = Total risk

Image D. Threat × Vulnerability / Asset value = Total risk

13. What method of dealing with risk occurs when individuals do a cost-benefit analysis and determine that the cost of the benefits outweigh the cost of the potential loss?

Image A. Risk reduction

Image B. Risk rejection

Image C. Risk transference

Image D. Risk acceptance

14. The security kernel is found at what protection ring level?

Image A. Ring 0

Image B. Ring 1

Image C. Ring 2

Image D. Ring 4

15. You have been brought in as a consultant for a small local startup firm. They have provided you the diagram shown below. Initially they want to connect to remote sites but would like to plan for remote user access in the future. With this in mind how do you advise them as to which VPN method is less likely to work through NAT?

Image

NAT Tunnel

Image A. IPsec transport mode

Image B. IPsec tunnel with AH

Image C. IPsec tunnel with ESP

Image D. Suggest they use PPTP

16. Which of the following are considered temporary storage units within the CPU?

Image A. I/O buffer

Image B. Registers

Image C. Control circuitry

Image D. ALU

17. Confidentiality and integrity are important concepts when discussing security models. Which of the following was one the first models developed to address only one goal of integrity?

Image A. Biba

Image B. Clark-Wilson

Image C. Brewer and Nash

Image D. Chinese Wall

18. Which of the following is considered the first security model to be based on confidentiality?

Image A. Biba

Image B. Bell-LaPadula

Image C. Graham-Denning

Image D. Clark-Wilson

19. What country-specific standard was developed to evaluate integrity of individual systems and is broken into four categories?

Image A. ITSEC

Image B. TCSEC

Image C. Common Criteria

Image D. CTCPEC

20. You are a consultant for a contractor that is doing work for an individual government agency; the government requires that all people must have a clearance for most restricted information in the information systems, and a valid need to know. All people do not have to have a clearance for all information in the information system. What mode of security do you recommend for the GSA contractor?

Image A. Dedicated security mode

Image B. System high security mode

Image C. Compartmented security mode

Image D. Multi-level security mode

21. When using PKI there are two methods by which you can handle revocation of certificates, as shown in the following diagram. When using Online Certificate Status Protocol (OCSP), messages are encoded and typically transmitted over HTTP. When compared to certificate revocation lists (CRLs), which of the following is not true?

Image

PKI

Image A. Does not mandate encryption

Image B. Contains more information than a typical CRL

Image C. Discloses that a particular network host used a particular certificate at a particular time

Image D. Places less burden on client resources

22. You have been asked to examine a database to evaluate referential integrity. Which of the following should you review?

Image A. Field

Image B. Aggregation

Image C. Composite key

Image D. Foreign key

23. Which of the following wireless standards uses frequency-hopping spread spectrum (FHSS) by default?

Image A. Bluetooth

Image B. 802.11a

Image C. 802.11b

Image D. 802.11g

24. Which of the following is the original technique used to digitize voice with 8 bits of sampling 8,000 times per second, which yields 64Kbps for one voice channel?

Image A. DAT

Image B. CDMA

Image C. PCM

Image D. GSM

25. How many DS0 channels are bundled to make a T1?

Image A. 18

Image B. 21

Image C. 24

Image D. 32

26. Which of the following protocols was developed in the mid-1970s for use in Systems Network Architecture (SNA) environments?

Image A. SDLC

Image B. ISDN

Image C. LAP-B

Image D. X.25

27. Which of the following best defines transaction persistence?

Image A. Database transactions should be all or nothing to protect the integrity of the database.

Image B. The database should be in a consistent state, and there should not be a risk of integrity problems.

Image C. The database should be the same before and after a transaction has occurred.

Image D. Databases should be available to multiple users at the same time without endangering the integrity of the data.

28. What is the capability to combine data from separate sources to gain information?

Image A. Metadata

Image B. Inference

Image C. Aggregation

Image D. Deadlocking

29. Ted considers himself a skillful hacker. He has devised a way to replace the existing startup programs between the moment that the system boots yet before the system actually executes these programs. He believes that if he can perfect his attack, he can gain control of the system. What type of attack is described here?

Image A. Synchronous attack

Image B. TOC/TOU attack

Image C. DCOM attack

Image D. Smurf attack

30. Which of the following is evidence that is not based on personal knowledge but that was told to the witness?

Image A. Best evidence

Image B. Secondary evidence

Image C. Conclusive evidence

Image D. Hearsay evidence

31. Which mode of DES functions by means of taking each block of cipher text and XORing it with the next plain text block to be encrypted, with the result being a dependency on all the previous blocks?

Image A. ECB

Image B. CBC

Image C. CFB

Image D. OFB

32. What mode of DES is susceptible to a meet-in-the-middle attack?

Image A. DES

Image B. 2DES

Image C. 3DES

Image D. 3DES EDE2

33. Which asymmetric cryptosystem is used for digital signatures?

Image A. DES

Image B. SHA1

Image C. Diffie-Hellman

Image D. ECC

34. When developing the organization’s contingency plan, which of the following should not be included in the process?

Image A. Damage-assessment team

Image B. Legal counsel

Image C. Salvage team

Image D. Red team

35. Which of the following is a valid form of attack against ARP?

Image A. Flooding

Image B. Spanning tree attack

Image C. Name server poisoning

Image D. Reverse lookups

36. Which of the following is considered an authentication type that can use smart cards and certificates?

Image A. CHAP

Image B. EAP

Image C. MS-CHAP

Image D. PAP

37. Which of the following address ranges is not listed in RFC 1918?

Image A. 10.0.0.0 to 10.255.255.255

Image B. 172.16.0.0 to 172.31.255.255

Image C. 172.16.0.0 to 172.63.255.255

Image D. 192.168.0.0 to 192.168.255.255

38. Which of the following is not a reason why email should be protected?

Image A. Encryption is a difficult, time-consuming process.

Image B. Faking email is easy.

Image C. Sniffing email is easy.

Image D. Stealing email is difficult.

39. Which of the following statements about instant messaging is incorrect?

Image A. No capability for scripting

Image B. Can bypass corporate firewalls

Image C. Lack of encryption

Image D. Insecure password management

40. ActiveX is used by which of the following technologies?

Image A. Java

Image B. CORBA

Image C. EJB

Image D. DCOM

41. Which of the following protocols is said to use “a web of trust”?

Image A. PKI

Image B. IGMP

Image C. PGP

Image D. PEM

42. Which of the following is considered the act of encouraging or inducing a person to commit a crime in order to bring criminal charges against him?

Image A. Inducement

Image B. Entrapment

Image C. Honeypotting

Image D. Enticement

43. Which of the following terms describes the coalition of nations that have been meeting since the 1970s to solve the world’s economic problems?

Image A. G8

Image B. MLAT

Image C. SWAT

Image D. UN Resolution 1154

44. Which of the following is not one of the main BCP testing strategies?

Image A. Partial interruption

Image B. Structured walk-through

Image C. Parallel

Image D. Full interruption

45. When discussing the BCP, critical resources are usually divided into five primary categories. The categories are which of the following groups?

Image A. Business, administrative, user, technical, and data

Image B. Administrative, policy, user, technical, and data

Image C. Business, facility and supply, user, technical, and nontechnical

Image D. Business, facility and supply, user, technical, and data

46. Which of the following is not one of the three layers used by the Java interpreter?

Image A. Java language

Image B. Java script

Image C. Java libraries

Image D. Java interpreter

47. Which of the following protocols is used for router multicasting?

Image A. ICMP

Image B. RIPv1

Image C. 224.0.0.1

Image D. IGMP

48. VoIP uses which of the following because network congestion can be such a critical problem?

Image A. Time-division multiplexing

Image B. TCP protocol

Image C. VLANs technology

Image D. Isochronous design

49. Which of the following is considered a network technology based on transferring data in cells or packets of a fixed size?

Image A. ATM

Image B. ISDN

Image C. SMDS

Image D. Frame Relay

50. WEP has vulnerabilities. Which of the following is not a reason why it is vulnerable?

Image A. Shared WEP keys among all clients

Image B. An RC4 engine not properly initialized

Image C. 20-bit initialization vector

Image D. 40-bit WEP keys

51. You are an advisory board member for a local charity. The charity has been given a new server, and members plan to use it to connect their 24 client computers to the Internet for email access. Currently, none of these computers has antivirus software installed. Your research indicates that there is a 95% chance these systems will become infected after email is in use. A local vendor has offered to sell 25 copies of antivirus software to the nonprofit organization for $400. Even though the nonprofit’s 10 paid employees make only about $9 an hour, there’s a good chance that a virus could bring down the network for an entire day. They would like you to tell them what the ALE for this proposed change would be. How will you answer them?

Image A. $423

Image B. $950

Image C. $720

Image D. $684

52. A Common Criteria rating of “structurally tested” means the design meets what level of verification?

Image A. EAL 1

Image B. EAL 2

Image C. EAL 4

Image D. EAL 5

53. Which of the following is not a valid Red Book rating?

Image A. A1

Image B. B2

Image C. C1

Image D. C2

54. What Bell-LaPadula model rule states that someone at one security level cannot write information to a lower security level?

Image A. Star * property

Image B. Simple security rule

Image C. Simple integrity property

Image D. Strong star rule

55. You are an advisory board member for a organization that has decided to go forward with a proposed Internet and email connectivity project. Here are the projected details:

24 computers connected to the Internet

95% probability of virus infection

10 paid employees who make $9 an hour

A successful virus outage could bring down the network for an entire day

25 copies of antivirus software will cost the nonprofit $399

The CEO would like to know how much money, if any, will be saved through the purchase of antivirus software. How much money will be saved?

Image A. $218

Image B. $285

Image C. $380

Image D. $490

56. Which of the following is considered the first line of defense against human attack?

Image A. Cryptography

Image B. Physical security

Image C. Business continuity planning

Image D. Policies

57. HVAC should provide which of the following?

Image A. HVAC should be a closed-loop system with negative pressurization.

Image B. HVAC should be an open-loop system with positive pressurization.

Image C. HVAC should be an open-loop system with negative pressurization.

Image D. HVAC should be a closed-loop system with positive pressurization.

58. Which of the following types of fire detectors uses rate-of-rise sensors?

Image A. Flame-activated

Image B. Heat-activated

Image C. Smoke-activated

Image D. Ion-activated

59. A fire caused by electrical equipment is considered which class of fire?

Image A. D

Image B. C

Image C. B

Image D. A

60. While Jim was examining the clapper valve of a failed fire suppression system on the loading dock, he started to wonder whether he installed the right fire suppression system. The facility is unheated and located in a major city in the northeastern United States. Based on this information, which system would you recommend to Jim?

Image A. Deluge

Image B. Wet pipe

Image C. Preaction

Image D. Dry pipe

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.149.28.126