CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 11 ■ Practice Test 3 283


and regularly handles classified information on behalf of the government and other
government contractors. Kim is concerned about ensuring the security of information
stored in ASI databases.

Kim’s database is a multilevel security database, and different ASI employees have different
security clearances. The database contains information on the location of military aircraft
containing ASI systems to allow ASI staff to monitor those systems.


  1. Kim learned that the military is planning a classified mission that involves some ASI
    aircraft. She is concerned that employees not cleared for the mission may learn of it by
    noticing the movement of many aircraft to the region. Individual employees are cleared
    to know about the movement of an individual aircraft, but they are not cleared to know
    about the overall mission. What type of attack is Kim concerned about?
    A. Aggregation
    B. SQL injection
    C. Inference
    D. Multilevel security

  2. What technique can Kim employ to prevent employees not cleared for the mission from
    learning the true location of the aircraft?
    A. Input validation
    B. Polyinstantiation
    C. Parameterization
    D. Server-side validation

  3. Kim’s database uniquely identifies aircraft by using their tail number. Which one of the
    following terms would not necessarily accurately describe the tail number?
    A. Database field
    B. Foreign key
    C. Primary key
    D. Candidate key

  4. Kim would like to create a key that enforces referential integrity for the database. What
    type of key does she need to create?
    A. Primary key
    B. Foreign key
    C. Candidate key
    D. Master key

Free download pdf