CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 2: Asset Security (Domain 2) 329



  1. C. A watermark is used to digitally label data and can be used to indicate ownership.
    Encryption would have prevented the data from being accessed if it was lost, while
    classification is part of the set of security practices that can help make sure the right
    controls are in place. Finally, metadata is used to label data and might help a data loss
    prevention system flag it before it leaves your organization.

  2. B. AES is a strong modern symmetric encryption algorithm that is appropriate for
    encrypting data at rest. TLS is frequently used to secure data when it is in transit. A
    virtual private network is not necessarily an encrypted connection and would be used for
    data in motion, while DES is an outdated algorithm and should not be used for data that
    needs strong security.

  3. A. Data loss prevention (DLP) systems can use labels on data to determine the appropriate
    controls to apply to the data. DLP systems won’t modify labels in real time and typically
    don’t work directly with firewalls to stop traffic. Deleting unlabeled data would cause big
    problems for organizations that haven’t labeled every piece of data!

  4. B. The value of the data contained on media often exceeds the cost of the media, making
    more expensive media that may have a longer life span or additional capabilities like
    encryption support a good choice. While expensive media may be less likely to fail, the
    reason it makes sense is the value of the data, not just that it is less likely to fail. In general,
    the cost of the media doesn’t have anything to do with the ease of encryption, and data
    integrity isn’t ensured by better media.

  5. C. Sanitization is a combination of processes that ensure that data from a system cannot
    be recovered by any means. Erasing and clearing are both prone to mistakes and technical
    problems that can result in remnant data and don’t make sense for systems that handled
    proprietary information. Destruction is the most complete method of ensuring that data
    cannot be exposed, and some organizations opt to destroy the entire workstation, but that
    is not a typical solution due to the cost involved.

  6. The US government’s classification levels from least to most sensitive are:


C. Unclassified
B. Confidential
A. Secret
D. Top S e c re t


  1. C. Data at rest is inactive data that is physically stored. Data in an IPsec tunnel or part of an
    e-commerce transaction is data in motion. Data in RAM is ephemeral and is not inactive.

  2. C. PCI DSS, the Payment Card Industry Data Security Standard, provides the set of
    requirements for credit card processing systems. The Microsoft, NSA, and CIS baseline
    are all useful for building a Windows 10 security standard, but the PCI DSS standard is a
    better answer.

  3. D. The CIS benchmarks are an example of a security baseline. A risk assessment would
    help identify which controls were needed, and proper system ownership is an important
    part of making sure baselines are implemented and maintained. Data labeling can help
    ensure that controls are applied to the right systems and data.

Free download pdf