20 Chapter 1 ■ Security and Risk Management (Domain 1)
- You discover that a user on your network has been using the Wireshark tool, as shown
here. Further investigation revealed that he was using it for illicit purposes. What pillar of
information security has most likely been violated?
A. Integrity
B. Denial
C. Availability
D. Confidentiality8 7. Alan is performing threat modeling and decides that it would be useful to decompose the
system into the key elements shown here. What tool is he using?UsersUser / Web Server
BoundaryWeb Server /
Database BoundaryDatabase
FilesDataDataWeb ServletAuthenticate User()Authenticate
User SQL
AuthenticateUser SQL Query
Pages Query ResultWeb
PagesAuthenticate User
ResultLogin RequestLogin
ProcessCollege
Library
DatabaseLogin ResponseImage reprinted from CISSP (ISC) 2 Certified Information Systems Security Professional Official Study
Guide, 7th Edition © John Wiley & Sons 2015, reprinted with permission.A. Vulnerability assessment
B. Fuzzing
C. Reduction analysis
D. Data modeling