CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

434 Appendix ■ Answers


2 1. A. Susan is performing passive monitoring, which uses a network tap or span port to
capture traffic to analyze it without impacting the network or devices that it is used
to monitor. Synthetic, or active, monitoring uses recorded or generated traffic to test
for performance and other issues. Signature-based technologies include IDS, IPS, and
antimalware systems.


  1. A. While the differences between rights, permissions, and roles can be confusing,
    typically permissions include both the access and actions that you can take on an object.
    Rights usually refer to the ability to take action on an object and don’t include the access
    to it. Privileges combine rights and permissions, and roles describe sets of privileges based
    on job tasks or other organizational artifacts.

  2. C. One of the core capabilities of infrastructure as a service is providing servers on
    a vendor-managed virtualization platform. Web-based payroll and email systems are
    examples of software as a service. An application platform managed by a vendor that runs
    customer code is an example of platform as a service.

  3. D. The exposure factor is the percentage of the facility that risk managers expect will
    be damaged if a risk materializes. It is calculated by dividing the amount of damage by
    the asset value. In this case, that is $750,000 in damage divided by the $2 million facility
    value, or 37.5%.

  4. C. The annualized rate of occurrence is the number of times each year that risk analysts
    expect a risk to happen. In this case, the analysts expect fires will occur once every 50
    years, or 0.02 times per year.

  5. A. The annualized loss expectancy is calculated by multiplying the single loss expectancy
    (SLE) by the annualized rate of occurrence (ARO). In this case, the SLE is $750,000, and
    the ARO is 0.02. Multiplying these numbers together gives you the ALE of $15,000.

  6. A. Congestion Window Reduced (CWR) and ECN-Echo (ECE) are used to manage
    transmission over congested links and are rarely seen in modern TCP networks.

  7. C. API keys, or application programming interface keys, are passed to services
    and identify the program, developer, or user. With this information, Mike can
    programmatically control API usage per user. Of course, if the keys are inadvertently
    exposed, the API keys themselves could be abused. Session IDs are typically used to
    identify users of an application, not an API. API firewalls and API buffers were made up
    for this question.

  8. A. An application programming interface (API) allows external users to directly call
    routines within Fran’s code. They can embed API calls within scripts and other programs
    to automate interactions with Fran’s company. A web scraper or call center might facilitate
    the same tasks, but they do not do so in a direct integration. Data dictionaries might
    provide useful information, but they also do not allow direct integration.

  9. A. A fault is a momentary loss of power. Blackouts are sustained complete losses of
    power. Sags and brownouts are not complete power disruptions but rather periods of
    low-voltage conditions.

Free download pdf