CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

408 Appendix ■ Answers


3 3. A. Encrypting the files reduces the probability that the data will be successfully stolen, so
it is an example of risk mitigation. Deleting the files would be risk avoidance. Purchasing
insurance would be risk transference. Taking no action would be risk acceptance.


  1. C. Sampling should be done randomly to avoid human bias. Choosing a time frame may
    miss historic issues or only account for the current administrator’s processes. Sampling
    is an effective process if it is done on a truly random sample of sufficient size to provide
    effective coverage of the userbase.

  2. B. The EU-U.S. Privacy Shield principles are


■ (^) Notice
■ (^) Choice
■ (^) Accountability for Onward Transfer
■ (^) Security
■ (^) Data Integrity and Purpose Limitation
■ (^) Access
■ (^) Recourse, Enforcement, and Liability



  1. The testing methodologies match with the level of knowledge as follows:

    1. Black box: C. No prior knowledge of the system.

    2. White box: A. Full knowledge of the system.

    3. Gray box: B. Partial or incomplete knowledge.



  2. C. The file clearly shows HTTP requests, as evidenced by the many GET commands.
    Therefore, this is an example of an application log from an HTTP server.

  3. B. The US Trusted Foundry program helps to protect the supply chain for components
    and devices by ensuring that the companies that produce and supply them are secure.
    TEMPEST is the name of a program aimed at capturing data from electronic emissions,
    GovBuy is not a government program or supplier, and MITRE conducts research and
    development for the US government.

  4. B. Social engineering exploits humans to allow attacks to succeed. Since help desk employees
    are specifically tasked with being helpful, they may be targeted by attackers posing as
    legitimate employees. Trojans are a type of malware, whereas phishing is a targeted attack
    via electronic communication methods intended to capture passwords or other sensitive data.
    Whaling is a type of phishing aimed at high-profile or important targets.

  5. C. Identity proofing that relies on a type of verification outside the initial environment
    that required the verification is out-of-band identity proofing. This type of verification
    relies on the owner of the phone or phone number having control of it but removes the
    ability for attackers to use only Internet-based resources to compromise an account.
    Knowledge-based authentication relies on answers to preselected information, whereas
    dynamic knowledge–based authentication builds questions using facts or data about the
    user. Risk-based identity proofing uses risk-based metrics to determine whether identities
    should be permitted or denied access. It is used to limit fraud in financial transactions,
    such as credit card purchases. This is a valid form of proofing but does not necessarily use
    an out-of-band channel, such as SMS.

Free download pdf