CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

414 Appendix ■ Answers


8 7. B. During the preservation phase, the organization ensures that information related to the
matter at hand is protected against intentional or unintentional alteration or deletion. The
identification phase locates relevant information but does not preserve it. The collection
phase occurs after preservation and gathers responsive information. The processing phase
performs a rough cut of the collected information for relevance.


  1. D. Nessus, OpenVAS, the EU-U.S. Privacy Shield scanner and manager, and SAINT are
    all vulnerability scanning tools. All provide port scanning capabilities as well but are more
    than simple port scanning tools.

  2. D. In the subject/object model, the object is the resource being requested by a subject. In
    this example, Harry would like access to the document, making the document the object
    of the request.

  3. C. The process of removing a header (and possibly a footer) from the data received from a
    previous layer in the OSI model is known as de-encapsulation. Encapsulation occurs when
    the header and/or footer are added. Payloads are part of a virus or malware package that
    are delivered to a target, and packet unwrapping is a made-up term.

  4. C. Metasploit is a tool used to exploit known vulnerabilities. Nikto is a web application
    and server vulnerability scanning tool, Ettercap is a man-in-the-middle attack tool, and
    THC Hydra is a password brute-force tool.

  5. C. Service Provisioning Markup Language (SPML) uses Requesting Authorities to issue
    SPML requests to a Provisioning Service Point. Provisioning Service Targets are often
    user accounts, and are required to be allowed unique identification of the data in its
    implementation. SAML is used for security assertions, SAMPL is an algebraic modeling
    language, and XACML is an access control markup language used to describe and process
    access control policies in an XML format.

  6. D. The use of a probability/impact matrix is the hallmark of a qualitative risk assessment
    It uses subjective measures of probability and impact, such as “high” and “low,” in place
    of quantitative measures.

  7. B. Mandatory access control systems can be hierarchical, where each domain is ordered
    and related to other domains above and below it; compartmentalized, where there is no
    relationship between each domain; or hybrid, where both hierarchy and compartments are
    used. There is no concept of bracketing in mandatory access control design.

  8. C. RAID level 5 is also known as disk striping with parity. RAID 0 is called disk striping.
    RAID 1 is called disk mirroring. RAID 10 is known as a stripe of mirrors.

  9. B. Category 5e and Category 6 UTP cable are both rated to 1000 Mbps. Cat 5
    (not Cat 5e) is only rated to 100 Mbps, whereas Cat 7 is rated to 10 Gbps. There is
    no Cat 4e.

  10. A. Developing a business impact assessment is an integral part of the business continuity
    planning effort. The selection of alternate facilities, activation of those facilities, and
    restoration of data from backup are all disaster recovery tasks.

Free download pdf