Practice Exam II

You will have 90 minutes to complete this exam, which consists of 60 questions. You will need to get at least 42 correct. Ensure you read each question and look for details that would rule out any of the answers. Many times there will be two or more correct answers; however, there is only one best answer that can be selected. This is a reflection of the real world, where the CISSP often has several options to secure his/her network but one best option. Such is the case when choosing the best encryption to secure data or wireless networks.

Leaving a question blank will count against you, so you are always better off taking your best guess. It’s best to work through the entire test once, answering the questions that you can easily answer. On the second pass, work on the more difficult questions. Others you have already answered could help you answer the remaining questions.

Practice Exam Questions

1. What height of fence is required to prevent a determined intruder?

Image A. 4-foot

Image B. 6-foot

Image C. 8-foot

Image D. None of these is correct.

2. A fire caused by combustible metals would be considered which class of fire?

Image A. A

Image B. B

Image C. C

Image D. D

3. Controls should work in a layered approach. Review the following diagram; which order does the diagram most closely represent?

Image

Layered defense

Image A. (1) Physical/preventative, (2) administrative/preventative, (3) technical/deterrent control layered approach

Image B. (1) Physical/preventative/deterrent, (2) technical/preventative/detective/, (3) administrative/preventative layered approach

Image C. (1)Deterrent/preventative, (2) administrative/detective (3) preventative training

Image D. (1) Physical/preventative/deterrent, (2) hardware/software preventative (3) administrative/preventative layered approach

4. Which of the following types of card keys contains rows of copper strips?

Image A. Magnetic strip

Image B. Electronic circuit

Image C. Magnetic stripe

Image D. Active electronic

5. Tony’s company manufactures proprietary tractor-trailer tracking devices. Now that employees will be issued laptops, Tony is concerned about the loss of confidential information if an employee’s laptop is stolen. Which of the following represents the best defensive method?

Image A. Use integrity programs such as MD5 and SHA to verify the validity of installed programs.

Image B. Place labels on the laptops offering a reward for stolen or missing units.

Image C. Issue laptop users locking cables to secure the units and prevent their theft.

Image D. Encrypt the hard drives.

6. Under what conditions can halon be expected to degrade into toxic compounds?

Image A. At temperatures greater than 500° F

Image B. At temperatures greater than 900° F and concentrations greater than 10%

Image C. At temperatures greater than 900° F

Image D. At temperatures greater than 500° F and concentrations greater than 7%

7. According to NIST perimeter lighting standards, critical areas should be illuminated to what measurement?

Image A. 10 feet in height, with 2 foot-candles of illuminance

Image B. 12 feet in height, with 4 foot-candles of illuminance

Image C. 8 feet in height, with 2 foot-candles of illuminance

Image D. 8 feet in height, with 4 foot-candles of illuminance

8. What type of biometric error signifies that an authorized user has been denied legitimate access?

Image A. Type I

Image B. Type II

Image C. Type III

Image D. Type IV

9. In biometrics, the point at which the FAR equals the FRR is known as which of the following?

Image A. Crossover error rate

Image B. Error acceptance rate

Image C. Crossover acceptance rate

Image D. Failure acceptance rate

10. RSA’s SecurID is an example of which of the following?

Image A. SSO system

Image B. Synchronous authentication

Image C. Token authentication

Image D. Asynchronous authentication

11. Which of the following is a weak implementation of EAP?

Image A. EAP-FAST

Image B. LEAP

Image C. PEAP

Image D. EAP-TLS

12. When discussing the security of SSO systems, which of the following is considered a disadvantage?

Image A. Single sign-on requires much more maintenance and overhead because all systems are tied together.

Image B. The biggest disadvantage to single sign-on is that system time on all systems must be held to very tight standards; if deviated from, this can cause serious access problems.

Image C. There are no real disadvantages to single sign-on.

Image D. If single sign-on is breached, it offers the intruder access to all systems tied to the SSO implementation.

13. Snort started as what type of system?

Image A. Behavior-based IPS system

Image B. Signature-based IDS system

Image C. Behavior-based IDS system

Image D. Signature-based IPS system

14. What type of attack is also known as a race condition?

Image A. Synchronous attack

Image B. Buffer overflow

Image C. Asynchronous attack

Image D. Scanlog attack

15. I/O drivers and utilities are typically found at what protected ring level?

Image A. Ring 1

Image B. Ring 2

Image C. Ring 3

Image D. Ring 0

16. What type of CPU can interleave two or more programs for execution at any one time?

Image A. Multiprogramming

Image B. Multitasking

Image C. Multiapp

Image D. Multiprocessor

17. This portion of the CPU performs arithmetic and logical operations on the binary data.

Image A. I/O buffer

Image B. Registers

Image C. Control circuit

Image D. ALU

18. You are a security consultant for a contracting agency; the agency chief wants to ensure he prevents subjects from writing information to a higher level than the subject’s security clearance. He also wants to ensure subjects from a higher level clearance cannot read information at a lower level. They require some type of access control models for their information systems to protect the integrity of their data. What is your best recommendation for a model to use?

Image A. Bell LaPadula

Image B. Biba

Image C. State Machine

Image D. Clark Wilson

19. What piece of documentation was developed to evaluate stand-alone systems and is a basis of measurement for confidentiality?

Image A. The Red Book

Image B. The Orange Book

Image C. Common Criteria

Image D. CTCPEC

20. Which level of Orange Book protection is considered mandatory protection and is the first level in which labels are required?

Image A. B3

Image B. C2

Image C. B1

Image D. A1

21. Which of the following is considered the totality of protection mechanisms within a computer system and is responsible for enforcing security?

Image A. Rings of protection

Image B. The security kernel

Image C. TCB

Image D. Resource isolation

22. Johnny is worried that someone might be able to intercept and decrypt his VoIP phone calls. Which of the following protocols is most closely associated with VoIP?

Image A. SKYP

Image B. SLIP

Image C. S/MIME

Image D. SIP

23. Which of the following wireless standards uses direct sequence spread spectrum (DSSS) by default?

Image A. Bluetooth

Image B. 802.11a

Image C. 802.11b

Image D. 802.11ac

24. What is a rogue AP?

Image A. An individual connected to an unauthorized modem

Image B. An unauthorized AP attached to the corporate network

Image C. An unauthorized modem attached to the network

Image D. An individual intercepting wireless traffic from inside or outside the organization

25. Pulse code modulation (PCM) is used to digitize a voice with 8 bits of sampling for transmission on a DS0 line. What is the maximum rate of encoding for one of these voice channels?

Image A. 28.8Kbps

Image B. 56Kbps

Image C. 64Kbps

Image D. 128Kbps

26. A T1 uses which of the following to multiplex DS0s into a composite T1?

Image A. Channel division

Image B. Frequency-hopping spread spectrum

Image C. Frequency division

Image D. Time division

27. Which of the following focuses on how to repair and restore the data center and information at an original or new primary site?

Image A. BCP

Image B. BCM

Image C. DRP

Image D. BIA

28. This type of service is used to provide protection for source code in case the manufacturer declares bankruptcy or goes broke.

Image A. Government access to keys

Image B. MAD

Image C. Electronic vaulting

Image D. Software escrow

29. Which of the following describes the cooperative effort between the United States and Europe to exchange information about European citizens between European firms and North American parent corporations?

Image A. SB 168

Image B. Demar Act

Image C. Safe Harbor

Image D. Safety Shield

30. Which of the following best describes an approved type of forensic duplication?

Image A. Logical copy

Image B. Bit copy

Image C. Microsoft backup

Image D. Xcopy

31. Which of the following best describes the SET protocol?

Image A. Originated by Victor Miller and Neal Koblitz for use as a digital signature cryptosystem. It is useful in applications for which memory, bandwidth, or computational power is limited.

Image B. Originated by MasterCard and Visa to be used on the Internet for credit card transactions. It uses digital signatures.

Image C. Originated by Victor Miller and Neal Koblitz for use as a key exchange cryptosystem. It is useful in applications for which memory, bandwidth, or computational power is limited.

Image D. Originated by MasterCard and Visa to be used on the Internet for credit card transactions. It uses the SSL protocol.

32. Which of the following information-management systems uses artificial intelligence?

Image A. Polyinstantiation

Image B. Known signature scanning

Image C. Application programming interface

Image D. Knowledge discovery in databases

33. DNS lookups that are less than 512 bytes are typically performed on which of the following protocols and ports?

Image A. UDP 53

Image B. UDP 69

Image C. TCP 53

Image D. UDP 161

34. Bob is worried that the program someone gave him at DEFCON has been altered from the original. Which of the following is a valid technique that Bob can use to verify its authenticity?

Image A. Run AES against the program.

Image B. Compare the size and date with the version found on the developer’s website.

Image C. Run an MD5sum and check against the MD5sum from developer sites.

Image D. Calculate a digital signature.

35. Which of the following is not an email encryption security standard?

Image A. IMAP

Image B. MOSS

Image C. PGP

Image D. PEM

36. Which of the following best describes link encryption?

Image A. Data is encrypted at the point of origin and is decrypted at the point of destination.

Image B. The message is decrypted and re-encrypted as it passes through each successive node using a key common to the two nodes.

Image C. The KDC shares a user-unique key with each user.

Image D. It requires a session key that the KDC shares between the originator and the final destination.

37. Diameter uses which of the following as a base?

Image A. TACACS

Image B. TACACS+

Image C. RADIUS

Image D. Kerberos

38. The ACID test is used to describe what?

Image A. Behavior-based intrusion detection

Image B. Database transactions

Image C. Signature-based intrusion detection

Image D. The strength of a cryptographic function

39. Which fault-tolerant-like system can back up media in much the same way as disk striping?

Image A. RAID

Image B. RAIT

Image C. JBOD

Image D. MAID

40. Which of the following is a stream cipher?

Image A. DES

Image B. Skipjack

Image C. RC4

Image D. Twofish

41. Which of the following is considered the weakest mode of DES?

Image A. Electronic Code Book

Image B. Cipher Block Chaining

Image C. Cipher Feedback

Image D. Output Feedback

42. Which ethical standard states that “access and use of the Internet is a privilege and should be treated as such by all users”?

Image A. RFC 1087

Image B. ISC2 Code of Ethics

Image C. The Ten Commandments of Computer Ethics

Image D. RFC 1109

43. Which of the following would be considered the oldest and most well-known software development method?

Image A. Spiral

Image B. Clean room

Image C. Waterfall

Image D. Prototyping

44. Which of the following types of viruses can infect both boot sectors and program files?

Image A. File infector

Image B. Multipartite

Image C. Polymorphic

Image D. System infector

45. HTTPS uses TCP and which of the following ports?

Image A. 80

Image B. 110

Image C. 111

Image D. 443

46. Which of the following is considered the oldest type of database system?

Image A. Hierarchical

Image B. Network

Image C. Relational

Image D. Object-oriented

47. The IEEE separates the OSI data link layer into two sublayers. What are they?

Image A. Media MAC Control and Media Access Control

Image B. Logical Link Control and Media Access Control

Image C. High-Level Data Link Control and Media MAC Control

Image D. Data Link Control and Media MAC Control

Questions 48 and 49 refer to the table below

Image

User and Object List

48. What does the model shown in the table represent?

Image A. MAC

Image B. RBAC

Image C. LBAC

Image D. Access Control Matrix

49. Using the model shown in the table, Mike, Christine, Dwayne and Betsy are _________ and Object 1, Object 2, and Object 3 are _____?

Image A. Objects and subjects

Image B. Subject and Objects

Image C. Names of users and resources the users access

Image D. Names of the users and objects the users access

50. 802.11 networks are identified by which of the following?

Image A. Security identifier (SID)

Image B. Broadcast name

Image C. Kismet

Image D. Service set identifier (SSID)

51. ISO 17799 evolved from what regional standard?

Image A. British standard 7799

Image B. Canadian Trusted Computer Product Evaluation Criteria (CTCPEC)

Image C. Information Technology Security Evaluation Criteria (ITSEC)

Image D. Trusted Computer System Evaluation Criteria (TCSEC)

52. A Common Criteria rating of “Functionally Tested” means the design meets what level of verification?

Image A. EAL 1

Image B. EAL 2

Image C. EAL 4

Image D. EAL 5

53. Which of the following is not addressed by the Clark-Wilson security model?

Image A. Blocks unauthorized individuals from making changes to data

Image B. Maintains internal and external consistency

Image C. Protects the confidentiality of the information

Image D. Blocks authorized individuals from making unauthorized changes to data

54. Which of the following individuals’ roles and responsibilities would include the responsibility for maintaining and protecting the company’s assets and data?

Image A. User

Image B. Data owner

Image C. Data custodian

Image D. Security auditor

55. Which of the following is the proper formula used to calculate ALE?

Image A. Single loss expectancy (SLE) × Annualized rate of occurrence (ARO)

Image B. Asset value × Annualized rate of occurrence (ARO)

Image C. Single loss expectancy (SLE) × Annualized rate of occurrence (ARO)

Image D. Asset value / Annualized rate of occurrence (ARO)

56. Which of the following best describes a qualitative assessment?

Image A. A qualitative assessment deals with real numbers and seeks to place dollar values on losses. These dollar amounts are then used to determine where to apply risk controls.

Image B. A qualitative assessment assigns ratings to each risk.

Image C. A qualitative assessment is performed by experts or external consultants who seek to place dollar values on losses.

Image D. A qualitative assessment is performed by experts or external consultants, is based on risk scenarios, and assigns non-dollar values to risks.

57. The facilitated risk assessment process is an example of what?

Image A. A BCP analysis technique

Image B. A quantitative assessment technique

Image C. A DRP analysis technique

Image D. A qualitative assessment technique

58. Classification levels like confidential and secret are tied to which data classification scheme?

Image A. ISO 17799

Image B. U.S. Department of Defense (DoD)

Image C. RFC 2196 Site Security Guidelines

Image D. Commercial Data Classification Standard (CDCS)

59. Which of the following methods of dealing with risk is considered the least prudent course of action?

Image A. Risk reduction

Image B. Risk rejection

Image C. Risk transference

Image D. Risk acceptance

60. Your employer is pleased that you have become CISSP-certified and would now like you to evaluate your company’s security policy. Your boss believes that encryption should be used for all network traffic and that a $50,000 encrypted database should replace the current customer database. Based on what you know about risk management, upon what should your decision to use encryption and purchase the new database be based? Choose the most correct answer.

Image A. If an analysis shows that there is potential risk, the cost of protecting the network and database should be weighed against the cost of the deterrent.

Image B. If an analysis shows that the company’s network is truly vulnerable, systems should be implemented to protect the network data and the customer database.

Image C. If the network is vulnerable, systems should be implemented to protect the network and the database, regardless of the price.

Image D. Because it is only a customer database and the company is not well known, the probability of attack is not as great; therefore, the risk should be accepted or transferred through the use of insurance.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.191.147.77