CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

410 Appendix ■ Answers


4 9. C. Steganography is the art of using cryptographic techniques to embed secret messages
within other content. Steganographic algorithms work by making invisible alterations
to files, such as modifying the least significant bits of the many bits that make up image
files. VPNs may be used to obscure secret communications, but they provide protection in
transit and can’t be used to embed information in an image. Watermarking does embed
information in an image but with the intent of protecting intellectual property. A still
image would not be used for a covert timing channel because it is a fixed file.


  1. A. JavaScript is an interpreted language so the code is not compiled prior to execution,
    allowing Roger to inspect the contents of the code. C, C++, and Java are all compiled
    languages—a compiler produces an executable file that is not human-readable.

  2. D. When a system is configured to use shadowed passwords, the /etc/passwd file contains
    only the character x in the place of a password. It would not contain any passwords, in
    either plaintext, encrypted, or hashed form.

  3. C. SYN floods rely on the TCP implementation on machines and network devices to cause
    denial of service conditions.

  4. D. The due care principle states that an individual should react in a situation using the
    same level of care that would be expected from any reasonable person. It is a very broad
    standard. The due diligence principle is a more specific component of due care that
    states that an individual assigned a responsibility should exercise due care to complete it
    accurately and in a timely manner.

  5. B. ISDN, cable modems, DSL, and T1 and T3 lines are all examples of broadband
    technology that can support multiple simultaneous signals. They are analog, not digital,
    and are not broadcast technologies.

  6. C. Social engineering is the best answer, as it can be useful to penetration testers who are
    asked to assess whether staff members are applying security training and have absorbed
    the awareness messages the organization uses. Port and vulnerability scanning find
    technical issues that may be related to awareness or training issues but that are less likely
    to be directly related. Discovery can involve port scanning or other data-gathering efforts
    but is also less likely to be directly related to training and awareness.

  7. B. RAID level 5 is also known as disk striping with parity. It uses three or more disks,
    with one disk containing parity information used to restore data to another disk in the
    event of failure. When used with three disks, RAID 5 is able to withstand the loss of a
    single disk.

  8. D. The Physical layer deals with the electrical impulses or optical pulses that are sent as
    bits to convey data.

  9. A. In an IaaS server environment, the customer retains responsibility for most server
    security operations under the shared responsibility model. This includes managing OS
    security settings, maintaining host firewalls, and configuring server access control.
    The vendor would be responsible for all security mechanisms at the hypervisor layer
    and below.

Free download pdf