CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

426 Appendix ■ Answers


76. C. A Security Information and Event Management (SIEM) tool is designed to provide
automated analysis and monitoring of logs and security events. A SIEM tool that receives
access to logs can help detect and alert on events like logs being purged or other breach
indicators. An IDS can help detect intrusions, but IDSs are not typically designed to
handle central logs. A central logging server can receive and store logs but won’t help with
analysis without taking additional actions. Syslog is simply a log format.

7 7. B. Requiring authentication can help provide accountability by ensuring that any
action taken can be tracked back to a specific user. Storing logs centrally ensures
that users can’t erase the evidence of actions that they have taken. Log review can be
useful when identifying issues, but digital signatures are not a typical part of a logging
environment. Logging the use of administrative credentials helps for those users
but won’t cover all users, and encrypting the logs doesn’t help with accountability.
Authorization helps, but being able to specifically identify users through authentication
is more important.


  1. B. Port Address Translation (PAT) is used to allow a network to use any IP address set
    inside without causing a conflict with the public Internet. PAT is often confused with
    Network Address Translation (NAT), which maps one internal address to one external
    address. IPsec is a security protocol suite, software-defined networking (SDN) is a method
    of defining networks programmatically, and IPX is a non-IP network protocol.

  2. C. Each of the precautions listed helps to prevent social engineering by helping prevent
    exploitation of trust. Avoiding voice-only communications is particularly important, since
    establishing identity over the phone is difficult. The other listed attacks would not be
    prevented by these techniques.

  3. C. L2TP is the only one of the four common VPN protocols that can natively support
    non-IP protocols. PPTP, L2F, and IPsec are all IP-only protocols.

  4. D. Remnant data is data that is left after attempts have been made to remove or erase it.
    Bitrot is a term used to describe aging media that decays over time. MBR is the master
    boot record, a boot sector found on hard drives and other media. Leftover data is not an
    industry term.

  5. C. During a parallel test, the team activates the disaster recovery site for testing
    but the primary site remains operational. A simulation test involves a roleplay of a
    prepared scenario overseen by a moderator. Responses are assessed to help improve the
    organization’s response process. The checklist review is the least disruptive type of disaster
    recovery test. During a checklist review, team members each review the contents of their
    disaster recovery checklists on their own and suggest any necessary changes. During a
    tabletop exercise, team members come together and walk through a scenario without
    making any changes to information systems.

  6. C. Discretionary access control gives owners the right to decide who has access to the
    objects they own. Role-based access control uses administrators to make that decision for
    roles or groups of people with a role, task-based access control uses lists of tasks for each
    user, and rule-based access control applies a set of rules to all subjects.

Free download pdf