CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

416 Appendix ■ Answers


1 07. D. Patents and trade secrets can both protect intellectual property in the form of a
process. Patents require public disclosure and have expiration dates while trade secrets
remain in force for as long as they remain secret. Therefore, trade secret protection most
closely aligns with the company’s goals.


  1. D. The Security Content Automation Protocol (SCAP) is a suite of specifications used to
    handle vulnerability and security configuration information. The National Vulnerability
    Database provided by NIST uses SCAP. XACML is the eXtensible Access Control Markup
    Language, an OASIS standard used for access control decisions, and neither VSML nor
    SCML are industry terms.

  2. B. The three components of the DevOps model are software development, operations, and
    quality assurance.

  3. A. The Simple Security Property prevents an individual from reading information at
    a higher security level than his or her clearance allows. This is also known as the “no
    read up” rule. The Simple Integrity Property says that a user can’t write data to a higher
    integrity level than their own. The *-Security Property says that users can’t write data to a
    lower security level than their own. The Discretionary Security Property allows the use of
    a matrix to determine access permissions.

  4. B. The work breakdown structure (WBS) is an important project management tool that
    divides the work done for a large project into smaller components. It is not a project plan
    because it does not describe timing or resources. Test analyses are used during later phases
    of the development effort to report test results. Functional requirements may be included
    in a work breakdown structure, but they are not the full WBS.


112. B. Network Access Control (NAC) systems can be used to authenticate users and then
validate their system’s compliance with a security standard before they are allowed to
connect to the network. Enforcing security profiles can help reduce zero-day attacks,
making NAC a useful solution. A firewall can’t enforce system security policies, whereas
an IDS can only monitor for attacks and alarm when they happen. Thus, neither a firewall
nor an IDS meets Kolin’s needs. Finally, port security is a MAC address–based security
feature that can only restrict which systems or devices can connect to a given port.


  1. C. This scenario violates the least privilege principle because an application should never
    require full administrative rights to run. Gwen should update the service account to have
    only the privileges necessary to support the application.

  2. B. Trace coverage is not a type of structural coverage. Common types of structural
    coverage include statement, branch or decision coverage, loop coverage, path coverage,
    and data flow coverage.

  3. A. During the information gathering and discovery phase of a penetration test, testers
    will gather information about the target. Whois can provide information about an
    organization, including IP ranges, physical addresses, and staff contacts. Nessus would
    be useful during a vulnerability detection phase, and Metasploit would be useful during
    exploitation. zzuf is a fuzzing tool and is less likely to be used during a penetration test.

Free download pdf