CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 12: Practice Test 4 455


the waterfall and spiral models. The SDLC does not mandate the use of an iterative or
sequential approach; it allows for either approach.


  1. A. The Bell-LaPadula model includes the Simple Security Property, which prevents an
    individual from reading information that is classified at a level higher than the individual’s
    security clearance.

  2. C. Captive portals are designed to show a page that can require actions like accepting an
    agreement or recording an email address before connecting clients to the Internet. NAC is
    designed to verify whether clients meet a security profile, which doesn’t match the needs of
    most coffee shops. A wireless gateway is a tool to access a cellular or other network, rather
    than a way to interact with users before they connect, and 802.11 is the family of IEEE
    wireless standards.

  3. A. Active monitoring is also known as synthetic monitoring and relies on prerecorded or
    generated traffic to test systems for performance and other issues. Passive monitoring uses
    span ports, network taps, or similar technologies to capture actual traffic for analysis.
    Reactive monitoring is not a commonly used industry term.

  4. B. TCP headers can be 20 to 60 bytes long depending on options that are set.

  5. A. Cellular networks have the same issues that any public network does. Encryption
    requirements should match those that the organization selects for other public networks
    like hotels, conference Wi-Fi, and similar scenarios. Encrypting all data is difficult and
    adds overhead, so it should not be the default answer unless the company specifically
    requires it. WAP is a dated wireless application protocol and is not in broad use; requiring
    it would be difficult. WAP does provide TLS, which would help when in use.

  6. D. Fred’s best option is to use an encrypted, trusted VPN service to tunnel all of his data
    usage. Trusted Wi-Fi networks are unlikely to exist at a hacker conference, normal usage
    is dangerous due to the proliferation of technology that allows fake towers to be set up,
    and discontinuing all usage won’t support Fred’s business needs.

  7. B. Remote wipe tools are a useful solution, but they only work if the phone can access
    either a cellular or Wi-Fi network. Remote wipe solutions are designed to wipe data from
    the phone regardless of whether it is in use or has a passcode. Providers unlock phones for
    use on other cellular networks rather than for wiping or other feature support.

  8. C. The goal of business continuity planning exercises is to reduce the amount of time
    required to restore operations. This is done by minimizing the recovery time objective (RTO).

  9. D. NIST Special Publication 800-53 describes depth and coverage. Depth is the level of
    detail, rigor, and formality of artifacts produced during design and development. Coverage
    is the breadth and scope of the assessment conducted. If you encounter a question like
    this and are not familiar with the details of a standard like NIST 800-53, or may not
    remember them, focus on the meanings of each word and the details of the question. We
    can easily rule out affirmation, which isn’t a measure. Suitability is a possibility, but depth
    fits better than suitability or coverage.

Free download pdf