CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

392 Appendix ■ Answers


1 01. D. The benefits of additional discovery must be proportional to the additional costs that
they will require. This prevents additional discovery requests from becoming inordinately
expensive, and the requester will typically have to justify these requests to the judge
presiding over the case.


  1. A. System Center Configuration Manager (SCCM) provides this capability and is designed
    to allow administrators to evaluate the configuration status of Windows workstations and
    servers, as well as providing asset management data. SCOM is primarily used to monitor
    for health and performance, Group Policy can be used for a variety of tasks including
    deploying settings and software, and custom PowerShell scripts could do this but should
    not be required for a configuration check.

  2. C. Physical destruction, an appropriate contract with certification, and secure wiping
    are all reasonable options. In each case, a careful inventory and check should be done to
    ensure that each drive is handled appropriately. Reformatting drives can leave remnant
    data, making this a poor data lifecycle choice for drives that contain sensitive data.

  3. A. A lessons learned document is often created and distributed to involved parties after a
    postmortem review to ensure that those who were involved in the incident and others who
    may benefit from the knowledge are aware of what they can do to prevent future issues
    and to improve response in the event that one occurs.

  4. B. While it may be tempting to tell her staff to simply not connect to any network, Susan
    knows that they will need connectivity to do their work. Using a VPN to connect their
    laptops and mobile devices to a trusted network and ensuring that all traffic is tunneled
    through the VPN is her best bet to secure their Internet usage. Susan may also want to
    ensure that they take “clean” laptops and devices that do not contain sensitive information
    or documents and that those systems are fully wiped and reviewed when they return.

  5. B. Quality of service is a feature found on routers and other network devices that can
    prioritize specific network traffic. QoS policies define which traffic is prioritized, and
    traffic is then handled based on the policy.

  6. A. John’s design provides multiple processing sites, distributing load to multiple regions.
    Not only does this provide business continuity and disaster recovery functionality, but it
    also means that his design will be more resilient to denial of service attacks.

  7. C. A whitelist of allowed applications will ensure that Lauren’s users can run only the
    applications that she preapproves. Blacklists would require her to maintain a list of every
    application that she doesn’t want to allow, which is an almost impossible task. Graylisting
    is not a technology option, and configuration management can be useful for making sure
    the right applications are on a PC but typically can’t directly prevent users from running
    undesired applications or programs.

  8. B. Duress, or being under threat of violence or other constraints, is a concern for
    organizations such as banks, jewelry stores, or other organizations where an attacker may
    attempt to force an employee to perform actions. Organizations that expect that a scenario
    like this may occur will often use duress code words that let others know that they are
    performing actions under threat.

Free download pdf