CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 11: Practice Test 3 439


review to peers. Pair programming requires two developers, only one of whom writes code
while both collaborate. IDE forcing is not a type of code review; an IDE is an integrated
development environment.


  1. A. The Time of Check to Time of Use (TOC/TOU) attack exploits timing differences
    between when a system verifies authorization and software uses that authorization to
    perform an action. It is an example of a race condition attack. The other three attacks
    mentioned do not depend on precise timing.


6 7. B. Encapsulation is a process that adds a header and possibly a footer to data received at
each layer before handoff to the next layer. TCP wrappers are a host-based network access
control system, attribution is determining who or what performed an action or sent data,
and data hiding is a term from object-oriented programming that is not relevant here.



  1. C. Salting adds random text to the password before hashing in an attempt to defeat
    automated password cracking attacks that use precomputed values. MD5 and SHA-1
    are both common hashing algorithms, so using them does not add any security. Double-
    hashing would only be a minor inconvenience for an attacker and would not be as effective
    as the use of salting.

  2. A. Guidelines provide advice based on best practices developed throughout industry and
    organizations, but they are not compulsory. Compliance with guidelines is optional.

  3. C. Usernames are an identification tool. They are not secret, so they are not suitable for
    use as a password.

  4. C. Regression testing ensures proper functionality of an application or system after it has
    been changed. Unit testing focuses on testing each module of a program instead of against
    its previous functional state. White and black box testing both describe the amount of
    knowledge about a system or application, rather than a specific type or intent for testing.

  5. C. Risk transference involves shifting the impact of a potential risk from the organization
    incurring the risk to another organization. Insurance is a common example of risk
    transference.

  6. A. The four canons of the (ISC)^2 code of ethics are to protect society, the common good,
    necessary public trust and confidence, and the infrastructure; act honorably, honestly,
    justly, responsibly, and legally; provide diligent and competent service to principals; and
    advance and protect the profession.

  7. C. A trust that allows one forest to access another’s resources without the reverse being
    possible is an example of a one-way trust. Since Jim doesn’t want the trust path to flow as
    the domain tree is formed, this trust has to be nontransitive.

  8. B. Susan’s team is performing static analysis, which analyzes nonrunning code. Dynamic
    analysis uses running code, whereas gray box assessments are a type of assessment done
    without full knowledge. Fuzzing feeds unexpected inputs to a program as part of dynamic
    analysis.

Free download pdf