CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

332 Appendix ■ Answers


4 0. A. When data is stored in a mixed classification environment, it is typically classified
based on the highest classification of data included. In this case, the US government’s
highest classification is Top Secret. Mixed classification is not a valid classification in this
scheme.


  1. B. A nondisclosure agreement, or NDA, is a legal agreement that prevents employees
    from sharing proprietary data with their new employers. Purging is used on media,
    while classification is used on data. Encryption can help secure data, but it doesn’t stop
    employees who can decrypt or copy the data from sharing it.

  2. C. By default, BitLocker and Microsoft’s Encrypting File System (EFS) both use AES
    (Advanced Encryption Standard), which is the NIST-approved replacement for DES (Data
    Encryption Standard). Serpent was a competitor of AES, and 3DES was created as a
    possible replacement for DES.

  3. B. Group Policy provides the ability to monitor and apply settings in a security
    baseline. Manual checks by users and using startup scripts provide fewer reviews
    and may be prone to failure, while periodic review of the baseline won’t result in
    compliance being checked.

  4. B. A baseline is a set of security configurations that can be adopted and modified to fit
    an organization’s security needs. A security policy is written to describe an organization’s
    approach to security, while DSS is the second half of the Payment Card Industry Data
    Security Standard. The NIST SP-800 series of documents address computer security in a
    variety of areas.

  5. C. Record retention policies describe how long an organization should retain data and
    may also specify how and when destruction should occur. Classification policies describe
    how and why classification should occur and who is responsible, while availability and
    audit policies may be created for specific purposes.

  6. A. The POODLE (or Padding Oracle On Downgraded Legacy Encryption) attack helped
    force the move from SSL 3.0 to TLS because it allowed attackers to easily access SSL
    encrypted messages. Stuxnet was a worm aimed at the Iranian nuclear program, while
    CRIME and BEAST were earlier attacks against SSL.

  7. D. Using strong encryption, like AES-256, can help ensure that loss of removable media
    like tapes doesn’t result in a data breach. Security labels may help with handling processes,
    but they won’t help once the media is stolen or lost. Having multiple copies will ensure that
    you can still access the data but won’t increase the security of the media. Finally, using hard
    drives instead of tape only changes the media type and not the risk from theft or loss.

  8. D. Electronic signatures, as used in this rule, prove that the signature was provided by the
    intended signer. Electronic signatures as part of the FDA code are intended to ensure that
    electronic records are “trustworthy, reliable, and generally equivalent to paper records and
    handwritten signatures executed on paper.” Signatures cannot provide confidentiality or
    integrity and don’t ensure that someone has reviewed the data.

  9. D. Secure Shell (SSH) is an encrypted protocol for remote login and command-line
    access. SCP and SFTP are both secure file transfer protocols, while WDS is the acronym
    for Windows Deployment Services, which provides remote installation capabilities for
    Windows operating systems.

Free download pdf