Chapter 11: Practice Test 3 435
- A. Lauren’s team would benefit from a credential management system. Credential
management systems offer features like password management, multifactor authentication
to retrieve passwords, logging, audit, and password rotation capabilities. A strong
password policy would only make maintenance of passwords for many systems a more
difficult task if done manually. Single sign-on would help if all of the systems had the same
sensitivity levels, but different credentials are normally required for higher-sensitivity
systems. - C. Windows systems will assign themselves an APIPA address between 169.254.0.1 and
169.254.255.254 if they cannot contact a DHCP server. - A. Enrollment, or registration, is the initial creation of a user account in the provisioning
process. Clearance verification and background checks are sometimes part of the process
that ensures that the identity of the person being enrolled matches who they claim to be.
Initialization is not used to describe the provisioning process. - B. Criminal forensic investigations typically have the highest standards for evidence,
as they must be able to help prove the case beyond a reasonable doubt. Administrative
investigations merely need to meet the standards of the organization and to be able to be
defended in court, while civil investigations operate on a preponderance of evidence. There
is not a category of forensic investigation referred to as “industry” in the CISSP exam’s
breakdown of forensic types. - D. The business or mission owner’s role is responsible for making sure systems provide
value. When controls decrease the value that an organization gets, the business owner
bears responsibility for championing the issue to those involved. There is not a business
manager or information security analyst role in the list of NIST-defined data security
roles. A data processor is defined but acts as a third-party data handler and would not
have to represent this issue in Olivia’s organization. - A. The Electronic Communications Privacy Act (ECPA) makes it a crime to invade the
electronic privacy of an individual. It prohibits the unauthorized monitoring of email and
voicemail communications. - D. The kernel lies within the central ring, Ring 0. Ring 1 contains other operating
system components. Ring 2 is used for drivers and protocols. User-level programs and
applications run at Ring 3. Rings 0–2 run in privileged mode whereas Ring 3 runs in user
mode. - B. The Common Vulnerability Scoring System (CVSS) uses measures such as attack
vector, complexity, exploit maturity, and how much user interaction is required as
well as measures suited to local concerns. CVE is the Common Vulnerabilities and
Exposures dictionary, CNA is the CVE Numbering Authority, and NVD is the National
Vulnerability Database. - C. An individual does not have a reasonable expectation of privacy when any
communication takes place using employer-owned communications equipment or
accounts.