CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

430 Appendix ■ Answers


11 2. B. Kathleen’s needs point to a directory service, and the Lightweight Directory Access
Protocol (LDAP) would meet her needs. LDAP is an open, industry-standard, and vendor-
neutral protocol for directory services. Kerberos and RADIUS are both authentication
protocols, and Active Directory is a Microsoft product and is not vendor neutral, although
it does support a number of open standards.


  1. A. Application firewalls add layer 7 functionality to other firewall solutions. This includes
    the ability to inspect Application-layer details such as analyzing HTTP, DNS, FTP, and
    other application protocols.

  2. C. The create rule allows a subject to create new objects and also creates an edge from the
    subject to that object, granting rights on the new object.

  3. A. Metasploit provides an extensible framework, allowing penetration testers to create
    their own exploits in addition to those that are built into the tool. Unfortunately,
    penetration testing can only cover the point in time when it is conducted. When
    conducting a penetration test, the potential to cause a denial of service due to a fragile
    service always exists, but it can test process and policy through social engineering and
    operational testing that validates how those processes and policies work.

  4. D. EAL7 is the highest level of assurance under the Common Criteria. It applies when a
    system has been formally verified, designed, and tested.

  5. C. X.509 defines standards for public key certificates like those used with many
    smartcards. X.500 is a series of standards defining directory services. The Service
    Provisioning Markup Language (SPML) and the Security Assertion Markup Language
    (SAML) aren’t standards that Alex should expect to see when using a smartcard to
    authenticate.

  6. C. The Children’s Online Privacy Protection Act (COPPA) regulates websites that cater to
    children or knowingly collect information from children under the age of 13.

  7. A. The Health Insurance Portability and Accountability Act (HIPAA) applies to
    healthcare information and is unlikely to apply in this situation. The Federal Information
    Security Management Act (FISMA) and Government Information Security Reform Act
    regulate the activities of all government agencies. The Homeland Security Act (HSA)
    created the US Department of Homeland Security, and more importantly for this question
    included the Cyber Security Enhancement Act of 2002 and the Critical Infrastructure
    Information Act of 2002. The Computer Fraud and Abuse Act (CFAA) provides specific
    protections for systems operated by government agencies.

  8. C. Turnstiles are unidirectional gates that prevent more than a single person from entering
    a facility at a time.

  9. C. Access control systems rely on identification and authentication to provide
    accountability. Effective authorization systems are desirable, but not required, since
    logs can provide information about who accessed what resources, even if access to those
    resources is not managed well. Of course, poor authorization management can create
    many other problems.

Free download pdf