20 Chapter 1 ■ Security and Risk Management (Domain 1)
- You discover that a user on your network has been using the Wireshark tool, as shown
here. Further investigation revealed that he was using it for illicit purposes. What pillar of
information security has most likely been violated?
A. Integrity
B. Denial
C. Availability
D. Confidentiality
8 7. Alan is performing threat modeling and decides that it would be useful to decompose the
system into the key elements shown here. What tool is he using?
Users
User / Web Server
Boundary
Web Server /
Database Boundary
Database
Files
Data
Data
Web Servlet
Authenticate User()
Authenticate
User SQL
AuthenticateUser SQL Query
Pages Query Result
Web
Pages
Authenticate User
Result
Login Request
Login
Process
College
Library
Database
Login Response
Image reprinted from CISSP (ISC) 2 Certified Information Systems Security Professional Official Study
Guide, 7th Edition © John Wiley & Sons 2015, reprinted with permission.
A. Vulnerability assessment
B. Fuzzing
C. Reduction analysis
D. Data modeling