CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

420 Appendix ■ Answers


2 0. C. The blacklist approach to application control blocks certain prohibited packages but
allows the installation of other software on systems. The whitelist approach uses the
reverse philosophy and only allows approved software. Antivirus software would only
detect the installation of malicious software after the fact. Heuristic detection is a variant
of antivirus software.


  1. B. The exposure factor is the percentage of the facility that risk managers expect will be
    damaged if a risk materializes. It is calculated by dividing the amount of damage by the
    asset value. In this case, that is $20 million in damage divided by the $100 million facility
    value, or 20%.

  2. B. The annualized rate of occurrence is the number of times each year that risk analysts
    expect a risk to happen in any given year. In this case, the analysts expect floods once
    every 200 years, or 0.005 times per year.

  3. B. The annualized loss expectancy is calculated by multiplying the single loss expectancy
    (SLE) by the annualized rate of occurrence (ARO). In this case, the SLE is $20 million and
    the ARO is 0.005. Multiplying these numbers together gives you the ALE of $100,000.

  4. B. The most frequent target of account management reviews are highly privileged
    accounts, as they create the greatest risk. Random samples are the second most likely
    choice. Accounts that have existed for a longer period of time are more likely to have a
    problem due to privilege creep than recently created accounts, but neither of these choices
    is likely unless there is a specific organizational reason to choose them.

  5. The cloud service offerings in order from the case where the customer bears the least
    responsibility to where the customer bears the most responsibility are
    B. SaaS
    C. PaaS
    A. IaaS
    In an infrastructure as a service (IaaS) cloud computing model, the customer retains
    responsibility for managing operating system and application security while the
    vendor manages security at the hypervisor level and below. In a platform as a service
    (PaaS) environment, the vendor takes on responsibility for the operating system, but
    the customer writes and configures any applications. In a software as a service (SaaS)
    environment, the vendor takes on responsibility for the development and implementa-
    tion of the application while the customer merely configures security settings within the
    application. TaaS is not a cloud service model.

  6. A. Type 1 errors occur when a valid subject is not authenticated. Type 2 errors occur
    when an invalid subject is incorrectly authenticated. Type 3 and Type 4 errors are not
    associated with biometric authentication.

  7. B. The Company ID is a field used to identify the corresponding record in another table.
    This makes it a foreign key. Each customer may place more than one order, making
    Company ID unsuitable for use as a primary or candidate key in this table. Referential
    keys are not a type of database key.

Free download pdf