CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 12: Practice Test 4 445


Chapter 12: Practice Test 4



  1. C. Detective access controls operate after the fact and are intended to detect or discover
    unwanted access or activity. Preventive access controls are designed to prevent the activity
    from occurring, whereas corrective controls return an environment to its original status
    after an issue occurs. Directive access controls limit or direct the actions of subjects to
    ensure compliance with policies.

  2. C. A honeypot is a decoy computer system used to bait intruders into attacking.
    A honeynet is a network of multiple honeypots that creates a more sophisticated
    environment for intruders to explore. A pseudoflaw is a false vulnerability in a system
    that may attract an attacker. A darknet is a segment of unused network address space that
    should have no network activity and, therefore, may be easily used to monitor for illicit
    activity.

  3. C. The CER is the point where FAR and FRR cross over, and it is a standard assessment
    used to compare the accuracy of biometric devices.

  4. A. At point B, the false acceptance rate (FAR) is quite high, whereas the false rejection
    rate (FRR) is relatively low. This may be acceptable in some circumstances, but in
    organizations where a false acceptance can cause a major problem, it is likely that they
    should instead choose a point to the right of point A.

  5. B. CER is a standard used to assess biometric devices. If the CER for this device does not
    fit the needs of the organization, Ben should assess other biometric systems to find one
    with a lower CER. Sensitivity is already accounted for in CER charts, and moving the
    CER isn’t something Ben can do. FRR is not a setting in software, so Ben can’t use that as
    an option either.

  6. B. Personally identifiable information (PII) can be used to distinguish a person’s identity.
    Personal health information (PHI) includes data like medical history, lab results, insurance
    information, and other details about a patient. Personal Protected Data is a made-up
    term, and PID is an acronym for process ID, the number associated with a running
    program or process.

  7. D. The figure shows the waterfall model, developed by Winston Royce. The key
    characteristic of this model is a series of sequential steps that include a feedback loop that
    allows the process to return one step prior to the current step when necessary.

  8. B. Encapsulation creates both the benefits and potential issues with multilayer protocols.
    Bridging can use various protocols but does not rely on encapsulation. Hashing
    and storage protocols typically do not rely on encapsulation as a core part of their
    functionality.

  9. B. The five COBIT principles are meeting stakeholder needs, covering the enterprise
    end-to-end, applying a single integrated framework, enabling a holistic approach, and
    separating governance from management.

Free download pdf