CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

326 Appendix ■ Answers


9 7. B. The annualized rate of occurrence is the number of times that risk analysts expect a
risk to happen in any given year. In this case, the analysts expect tornados once every 200
years, or 0.005 times per year.


  1. A. The annualized loss expectancy is calculated by multiplying the single loss expectancy
    (SLE) by the annualized rate of occurrence (ARO). In this case, the SLE is $5,000,000,
    and the ARO is 0.005. Multiplying these numbers together gives you the ALE of
    $25,000.

  2. C. Information disclosure attacks rely upon the revelation of private, confidential,
    or controlled information. Programming comments embedded in HTML code are an
    example of this type of attack.

  3. B. Nondisclosure agreements (NDAs) protect the confidentiality of sensitive information
    by requiring that employees and affiliates not share confidential information with third
    parties. NDAs normally remain in force after an employee leaves the company.

  4. A. Supply chain management can help ensure the security of hardware, software, and
    services that an organization acquires. Chris should focus on each step that his laptops
    take from the original equipment manufacturer to delivery.

  5. C. STRIDE, Process for Attack Simulation and Threat Analysis (PASTA), and Visual,
    Agile, and Simple Threat (VAST) modeling are all threat modeling methodologies.
    STRIDE was designed for applications and operating systems (but can be used more
    broadly), PASTA is a risk-centric modeling system, and VAST is a threat modeling concept
    based on Agile project management and programming techniques.

  6. C. Change management is a critical control process that involves systematically managing
    change. Without it, Lisa might simply deploy her code to production without oversight,
    documentation, or testing. Regression testing focuses on testing to ensure that new code
    doesn’t bring back old flaws, while fuzz testing feeds unexpected input to code. Code
    review reviews the source code itself and may be involved in the change management
    process but isn’t what is described here.

  7. A. Charles is tracking a key performance indicator (KPI). A KPI is used to measure
    performance (and success). Without a definition of success, this would simply be a metric,
    but Charles is working toward a known goal and can measure against it. There is not a
    return investment calculation in this problem, and the measure is not a control.

  8. D. A fitness evaluation is not a typical part of a hiring process. Drug tests, background
    checks, and social media checks are all common parts of current hiring practices.

  9. B. The (ISC)^2 code of ethics also includes “Act honorably, honestly, justly, responsibly,
    and legally” but does not specifically require credential holders to disclose all breaches of
    privacy, trust, or ethics.

  10. B. In general, companies should be aware of the breach laws in any location where they
    do business. US states have a diverse collection of breach laws and requirements, meaning
    that in this case, Greg’s company may need to review many different breach laws to
    determine which they may need to comply with if they conduct business in the state or
    with the state’s residents.

Free download pdf