CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

442 Appendix ■ Answers


9 9. A. Skip should use SCP—Secure Copy is a secure file transfer method. SSH is a secure
command-line and login protocol, whereas HTTP is used for unencrypted web traffic.
Telnet is an unencrypted command-line and login protocol.


  1. C. The California Online Privacy Protection Act requires that commercial websites
    that collect personal information from users in California conspicuously post a
    privacy policy. The act does not require compliance with the EU GDPR, nor does it
    use the GDPR concepts of notice or choice, and it does not require encryption of all
    personal data.

  2. B. Callback disconnects a remote user after their initial connection and then calls them
    back at a preauthorized number. CallerID can help with this but can be spoofed, making
    callback a better solution. CHAP is an authentication protocol, and PPP is a dial-up
    protocol. Neither will verify a phone number.

  3. D. Ring 0 is the kernel, rings 1 and 2 are used for device drivers, and ring 3 is user
    application space. The Meltdown bug allowed processes in ring 3 to read data from kernel
    memory in ring 0.

  4. B. Iris scans have a longer useful life than many other types of biometric factors because
    they don’t change throughout a person’s life span (unless the eye itself is damaged). Iris
    scanners can be fooled in some cases by high-resolution images of an eye, and iris scanners
    are not significantly cheaper than other scanners.

  5. B. Nondisclosure agreements (NDAs) prohibit employees from sharing sensitive
    information without authorization, even after their employment ends. They may also apply
    to business partners, contractors, customers and others. Service level agreements (SLAs)
    and operating level agreements (OLAs) specify the parameters of service that a vendor
    provides to a customer. Data loss prevention (DLP) technology prevents data loss but is a
    technical rather than a policy control.

  6. C. They need a key for every possible pair of users in the cryptosystem. The first key
    would allow communication between Matthew and Richard. The second key would
    allow communication between Richard and Christopher. The third key would allow
    communication between Christopher and Matthew.

  7. A. The Gramm-Leach-Bliley Act is an example of civil law. The Computer Fraud and
    Abuse Act, Electronic Communications Privacy Act, and Identity Theft and Assumption
    Deterrence Act are all examples of criminal law.

  8. C. The SMTP protocol does not guarantee confidentiality between servers, making TLS
    or SSL between the client and server only a partial measure. Encrypting the email content
    can provide confidentiality; digital signatures can provide nonrepudiation.

  9. D. The single quotation mark in the input field is a telltale sign that this is a SQL injection
    attack. The quotation mark is used to escape outside the SQL code’s input field, and
    the text following is used to directly manipulate the SQL command sent from the web
    application to the database.

Free download pdf