Chapter 12: Practice Test 4 455
the waterfall and spiral models. The SDLC does not mandate the use of an iterative or
sequential approach; it allows for either approach.
- A. The Bell-LaPadula model includes the Simple Security Property, which prevents an
individual from reading information that is classified at a level higher than the individual’s
security clearance. - C. Captive portals are designed to show a page that can require actions like accepting an
agreement or recording an email address before connecting clients to the Internet. NAC is
designed to verify whether clients meet a security profile, which doesn’t match the needs of
most coffee shops. A wireless gateway is a tool to access a cellular or other network, rather
than a way to interact with users before they connect, and 802.11 is the family of IEEE
wireless standards. - A. Active monitoring is also known as synthetic monitoring and relies on prerecorded or
generated traffic to test systems for performance and other issues. Passive monitoring uses
span ports, network taps, or similar technologies to capture actual traffic for analysis.
Reactive monitoring is not a commonly used industry term. - B. TCP headers can be 20 to 60 bytes long depending on options that are set.
- A. Cellular networks have the same issues that any public network does. Encryption
requirements should match those that the organization selects for other public networks
like hotels, conference Wi-Fi, and similar scenarios. Encrypting all data is difficult and
adds overhead, so it should not be the default answer unless the company specifically
requires it. WAP is a dated wireless application protocol and is not in broad use; requiring
it would be difficult. WAP does provide TLS, which would help when in use. - D. Fred’s best option is to use an encrypted, trusted VPN service to tunnel all of his data
usage. Trusted Wi-Fi networks are unlikely to exist at a hacker conference, normal usage
is dangerous due to the proliferation of technology that allows fake towers to be set up,
and discontinuing all usage won’t support Fred’s business needs. - B. Remote wipe tools are a useful solution, but they only work if the phone can access
either a cellular or Wi-Fi network. Remote wipe solutions are designed to wipe data from
the phone regardless of whether it is in use or has a passcode. Providers unlock phones for
use on other cellular networks rather than for wiping or other feature support. - C. The goal of business continuity planning exercises is to reduce the amount of time
required to restore operations. This is done by minimizing the recovery time objective (RTO). - D. NIST Special Publication 800-53 describes depth and coverage. Depth is the level of
detail, rigor, and formality of artifacts produced during design and development. Coverage
is the breadth and scope of the assessment conducted. If you encounter a question like
this and are not familiar with the details of a standard like NIST 800-53, or may not
remember them, focus on the meanings of each word and the details of the question. We
can easily rule out affirmation, which isn’t a measure. Suitability is a possibility, but depth
fits better than suitability or coverage.