CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 11: Practice Test 3 435



  1. A. Lauren’s team would benefit from a credential management system. Credential
    management systems offer features like password management, multifactor authentication
    to retrieve passwords, logging, audit, and password rotation capabilities. A strong
    password policy would only make maintenance of passwords for many systems a more
    difficult task if done manually. Single sign-on would help if all of the systems had the same
    sensitivity levels, but different credentials are normally required for higher-sensitivity
    systems.

  2. C. Windows systems will assign themselves an APIPA address between 169.254.0.1 and
    169.254.255.254 if they cannot contact a DHCP server.

  3. A. Enrollment, or registration, is the initial creation of a user account in the provisioning
    process. Clearance verification and background checks are sometimes part of the process
    that ensures that the identity of the person being enrolled matches who they claim to be.
    Initialization is not used to describe the provisioning process.

  4. B. Criminal forensic investigations typically have the highest standards for evidence,
    as they must be able to help prove the case beyond a reasonable doubt. Administrative
    investigations merely need to meet the standards of the organization and to be able to be
    defended in court, while civil investigations operate on a preponderance of evidence. There
    is not a category of forensic investigation referred to as “industry” in the CISSP exam’s
    breakdown of forensic types.

  5. D. The business or mission owner’s role is responsible for making sure systems provide
    value. When controls decrease the value that an organization gets, the business owner
    bears responsibility for championing the issue to those involved. There is not a business
    manager or information security analyst role in the list of NIST-defined data security
    roles. A data processor is defined but acts as a third-party data handler and would not
    have to represent this issue in Olivia’s organization.

  6. A. The Electronic Communications Privacy Act (ECPA) makes it a crime to invade the
    electronic privacy of an individual. It prohibits the unauthorized monitoring of email and
    voicemail communications.

  7. D. The kernel lies within the central ring, Ring 0. Ring 1 contains other operating
    system components. Ring 2 is used for drivers and protocols. User-level programs and
    applications run at Ring 3. Rings 0–2 run in privileged mode whereas Ring 3 runs in user
    mode.

  8. B. The Common Vulnerability Scoring System (CVSS) uses measures such as attack
    vector, complexity, exploit maturity, and how much user interaction is required as
    well as measures suited to local concerns. CVE is the Common Vulnerabilities and
    Exposures dictionary, CNA is the CVE Numbering Authority, and NVD is the National
    Vulnerability Database.

  9. C. An individual does not have a reasonable expectation of privacy when any
    communication takes place using employer-owned communications equipment or
    accounts.

Free download pdf