CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

446 Appendix ■ Answers


10. A. The onward transfer principle requires that organizations only exchange personal
information with other organizations bound by the EU General Data Protection
Regulation (GDPR) privacy principles. France, Italy, and Germany, as EU member states,
are all bound by those principles. The United States does not have a comprehensive privacy
law codifying those principles, so the onward transfer requirement applies.


  1. The protocols match with the descriptions as follows:

    1. TCP: C. Transports data over a network in a connection-oriented fashion.

    2. UDP: D. Transports data over a network in a connectionless fashion.

    3. DNS: B. Performs translations between FQDNs and IP addresses.

    4. ARP: A. Performs translations between MAC addresses and IP addresses.
      The Domain Name System (DNS) translates human-friendly fully qualified domain
      names (FQDNs) into IP addresses, making it possible to easily remember websites and
      hostnames. ARP is used to resolve IP addresses into MAC addresses. TCP and UDP
      are used to control the network traffic that travels between systems. TCP does so in a
      connection-oriented fashion using the three-way handshake, while UDP uses connec-
      tionless “best effort” delivery.



  2. B. Ben is assessing a specification. Specifications are document-based artifacts like policies
    or designs. Activities are actions that support an information system that involves people.
    Mechanisms are the hardware-, software-, or firmware-based controls or systems in an
    information system, and an individual is one or more people applying specifications,
    mechanisms, or activities.

  3. C. When done properly, a sanitization process fully ensures that data is not remnant
    on the system before it is reused. Clearing and erasing can both be failure prone, and of
    course destruction wouldn’t leave a machine or device to reuse.

  4. C. In a gray box test, the tester evaluates the software from a user perspective but has
    access to the source code as the test is conducted. White box tests also have access to the
    source code but perform testing from a developer’s perspective. Black box tests work from
    a user’s perspective but do not have access to source code. Blue boxes are a telephone
    hacking tool and not a software testing technique.

  5. D. The DevOps approach to technology management seeks to integrate software
    development, operations, and quality assurance in a cohesive effort. It specifically attempts
    to eliminate the issue of “throwing problems over the fence” by building collaborative
    relationships between members of the IT team.

  6. B. A Security Information and Event Management (SIEM) tool is designed to centralize
    logs from many locations in many formats and to ensure that logs are read and analyzed
    despite differences between different systems and devices. The Simple Network
    Management Protocol (SNMP) is used for some log messaging but is not a solution that
    solves all of these problems. Most non-Windows devices, including network devices
    among others, are not designed to use the Windows event log format, although using NTP
    for time synchronization is a good idea. Finally, local logging is useful, but setting clocks
    individually will result in drift over time and won’t solve the issue with many log sources.

Free download pdf