CISSP-ISSAP Topic 3
QUESTION NO: 101
John works as a security manager for SoftTech Inc. He is working with his team on the disaster recovery management plan. One of his team members has a doubt related to the most cost effective DRP testing plan. According to you, which of the following disaster recovery testing plans is the most cost-effective and efficient way to identify areas of overlap in the plan before conducting more demanding training exercises?
A. Evacuation drill
B. Walk-through drill
C. Structured walk-through test
D. Full-scale exercise
Answer: C
QUESTION NO: 102
Which of the following security protocols provides confidentiality, integrity, and authentication of network traffic with end-to-end and intermediate-hop security?
A. IPSec
B. SET
C. SWIPE
D. SKIP
Answer: C
QUESTION NO: 103
You are calculating the Annualized Loss Expectancy (ALE) using the following formula: ALE=AV * EF * ARO What information does the AV (Asset Value) convey?
A. It represents how many times per year a specific threat occurs.
B. It represents the percentage of loss that an asset experiences if an anticipated threat occurs.
C. It is an expected loss for an asset due to a risk over a one year period.
D. It represents the total cost of an asset, including the purchase price, recurring maintenance, expenses, and all other costs.
Answer: D
QUESTION NO: 104
You work as a Network Administrator for NetTech Inc. When you enter http://66.111.64.227 in the browser’s address bar, you are able to access the site. But, you are unable to access the site when you enter http://www.company.com. What is the most likely cause?
A. The site’s Web server is offline.
B. The site’s Web server has heavy traffic.
C. WINS server has no NetBIOS name entry for the server.
D. DNS entry is not available for the host name.
Answer: D
QUESTION NO: 105
In software development, which of the following analysis is used to document the services and functions that have been accidentally left out, deliberately eliminated or still need to be developed?
A. Gap analysis
B. Requirement analysis
C. Cost-benefit analysis
D. Vulnerability analysis
Answer: A
QUESTION NO: 106
Which of the following processes identifies the threats that can impact the business continuity of operations?
A. Function analysis
B. Risk analysis
C. Business impact analysis
D. Requirement analysis
Answer: C
QUESTION NO: 107
What are the benefits of using AAA security service in a network? Each correct answer represents a part of the solution. Choose all that apply.
A. It provides scalability.
B. It supports a single backup system.
C. It increases flexibility and control of access configuration.
D. It supports RADIUS, TACACS+, and Kerberos authentication methods.
Answer: A,C,D
QUESTION NO: 108
In which of the following SDLC phases are the software and other components of the system faithfully incorporated into the design specifications?
A. Programming and training
B. Evaluation and acceptance
C. Definition
D. Initiation
Answer: A
QUESTION NO: 109
Which of the following life cycle modeling activities establishes service relationships and message exchange paths?
A. Service-oriented logical design modeling
B. Service-oriented conceptual architecture modeling
C. Service-oriented discovery and analysis modelingD. Service-oriented business integration modeling
Answer: A
QUESTION NO: 110
Which of the following authentication methods support mutual authentication? Each correct answer represents a complete solution. Choose two.
A. MS-CHAP v2
B. NTLM
C. EAP-MD5
D. EAP-TLS
Answer: A,D
QUESTION NO: 111
Which of the following keys is derived from a preshared key and Extensible Authentication
Protocol (EAP)?
A. Pairwise Transient Key
B. Group Temporal Key
C. Private Key
D. Pairwise Master Key
Answer: D
QUESTION NO: 112
Which of the following schemes is used by the Kerberos authentication?
A. Public key cryptography
B. One time password
C. Private key cryptography
D. OPIE
Answer: C
QUESTION NO: 113
You are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers for the district they will need to be able to work from an alternate location. However, budget is an issue. Which of the following is most appropriate for this client?
A. Warm site
B. Cold site
C. Off site
D. Hot site
Answer: B
QUESTION NO: 114
Which of the following are the centralized administration technologies? Each correct answer represents a complete solution. Choose all that apply.
A. RADIUS
B. TACACS+
C. Media Access control
D. Peer-to-Peer
Answer: A,B
QUESTION NO: 115
You are implementing some security services in an organization, such as smart cards, biometrics, access control lists, firewalls, intrusion detection systems, and clipping levels. Which of the following categories of implementation of the access control includes all these security services?
A. Administrative access control
B. Logical access control
C. Physical access control
D. Preventive access control
Answer: B
QUESTION NO: 116
You work as a Network Administrator for Net World Inc. You are required to configure a VLAN for the company. Which of the following devices will you use to physically connect the computers in the VLAN? Each correct answer represents a complete solution. Choose two.
A. Switch
B. Router
C. Bridge
D. Hub E. Repeater
Answer: A,B
QUESTION NO: 117
Which of the following protocols work at the Network layer of the OSI model?
A. Routing Information Protocol (RIP)
B. File Transfer Protocol (FTP)
C. Simple Network Management Protocol (SNMP)
D. Internet Group Management Protocol (IGMP)
Answer: A,D
QUESTION NO: 118
Which of the following are used to suppress paper or wood fires? Each correct answer represents a complete solution. Choose two.
A. Soda acid
B. Kerosene
C. Water
D. CO2
Answer: A,C
QUESTION NO: 119
Mark works as a Network Administrator for NetTech Inc. He wants to connect the company’s headquarter and its regional offices using a WAN technology. For this, he uses packet-switched connection. Which of the following WAN technologies will Mark use to connect the offices? Each correct answer represents a complete solution. Choose two.
A. ISDN
B. X.25
C. Frame Relay
D. Leased line
Answer: B,C
QUESTION NO: 120 CORRECT TEXT
SIMULATION
Fill in the blank with the appropriate security method. ____________ is a system, which enables an authority to control access to areas and resources in a given physical facility, or computer based information system.
Answer:
Access control
QUESTION NO: 121
In which of the following types of tests are the disaster recovery checklists distributed to the members of the disaster recovery team and asked to review the assigned checklist?
A. Parallel test
B. Simulation test
C. Full-interruption test
D. Checklist test
Answer: D
QUESTION NO: 122
Which of the following heights of fence deters only casual trespassers?
A. 8 feet
B. 3 to 4 feet
C. 2 to 2.5 feet
D. 6 to 7 feet
Answer: B
QUESTION NO: 123
In which of the following cryptographic attacking techniques does an attacker obtain encrypted messages that have been encrypted using the same encryption algorithm?
A. Chosen plaintext attack
B. Ciphertext only attack
C. Chosen ciphertext attack
D. Known plaintext attack
Answer: B
QUESTION NO: 124
Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?
A. Safeguard
B. Annualized Rate of Occurrence (ARO)
C. Single Loss Expectancy (SLE)
D. Exposure Factor (EF)
Answer: B
QUESTION NO: 125
You work as a Chief Security Officer for Tech Perfect Inc. The company has a TCP/IP based network. You want to use a firewall that can track the state of active connections of the network and then determine which network packets are allowed to enter through the firewall. Which of the following firewalls has this feature?
A. Stateful packet inspection firewall
B. Proxy-based firewall
C. Dynamic packet-filtering firewall
D. Application gateway firewall
Answer: C
QUESTION NO: 126 CORRECT TEXT
SIMULATION
Fill in the blank with the appropriate security device. ___________ is a device that contains a physical mechanism or electronic sensor that quantifies motion that can be either integrated with or connected to other devices that alert the user of the presence of a moving object within the field of view.
Answer:
Motion detector
QUESTION NO: 127
Which of the following uses a Key Distribution Center (KDC) to authenticate a principle?
A. CHAP
B. PAP
C. Kerberos
D. TACACS
Answer: C
QUESTION NO: 128
Which of the following is a network service that stores and organizes information about a network users and network resources and that allows administrators to manage users’ access to the resources?
A. SMTP service
B. Terminal service
C. Directory service
D. DFS service
Answer: C
QUESTION NO: 129
You work as a Network Administrator for Net Soft Inc. You are designing a data backup plan for your company’s network. The backup policy of the company requires high security and easy recovery of data. Which of the following options will you choose to accomplish this?
A. Take a full backup daily and use six-tape rotation.
B. Take a full backup on Monday and a differential backup on each of the following weekdays. Keep
Monday’s backup offsite.
C. Take a full backup daily with the previous night’s tape taken offsite.
D. Take a full backup on alternate days and keep rotating the tapes.
E. Take a full backup on Monday and an incremental backup on each of the following weekdays.
Keep Monday’s backup offsite.
F. Take a full backup daily with one tape taken off site weekly.
Answer: C
QUESTION NO: 130
Which of the following are types of asymmetric encryption algorithms? Each correct answer represents a complete solution. Choose two.
A. RSA
B. AES
C. ECC
D. DES
Answer: A,C
QUESTION NO: 131
Which of the following attacks allows the bypassing of access control lists on servers or routers, and helps an attacker to hide? Each correct answer represents a complete solution. Choose two.
A. DNS cache poisoning
B. MAC spoofing
C. IP spoofing attack
D. DDoS attack
Answer: B,C
QUESTION NO: 132
You are the Network Administrator at a large company. Your company has a lot of contractors and other outside parties that come in and out of the building. For this reason you are concerned that simply having usernames and passwords is not enough and want to have employees use tokens for authentication. Which of the following is not an example of tokens?
A. Smart card
B. USB device with cryptographic data
C. CHAP
D. Key fob
Answer: C
QUESTION NO: 133
Which of the following LAN protocols use token passing for exchanging signals among various stations on the network? Each correct answer represents a complete solution. Choose two.
A. Ethernet (IEEE 802.3)
B. Token ring (IEEE 802.5)
C. Fiber Distributed Data Interface (FDDI)
D. Wireless LAN (IEEE 802.11b)
Answer: B,C
QUESTION NO: 134
Which of the following components come under the network layer of the OSI model? Each correct answer represents a complete solution. Choose two.
A. Routers
B. MAC addresses
C. Firewalls
D. Hub
Answer: A,C
QUESTION NO: 135
Which of the following are examples of physical controls used to prevent unauthorized access to sensitive materials?
A. Thermal alarm systems
B. Security Guards
C. Closed circuit cameras
D. Encryption
Answer: A,B,C
QUESTION NO: 136
At which of the following layers of the Open System Interconnection (OSI) model the Internet
Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?
A. The Physical layer
B. The Data-Link layer
C. The Network layer
D. The Presentation layer
Answer: C
QUESTION NO: 137
Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?
A. Twofish
B. Digital certificates
C. Public key
D. RSA
Answer: B,C
QUESTION NO: 138
Which of the following statements about Discretionary Access Control List (DACL) is true?
A. It specifies whether an audit activity should be performed when an object attempts to access a resource.
B. It is a unique number that identifies a user, group, and computer account.
C. It is a list containing user accounts, groups, and computers that are allowed (or denied) access to the object.
D. It is a rule list containing access control entries.
Answer: C
QUESTION NO: 139
Which of the following methods will allow data to be sent on the Internet in a secure format?
A. Serial Line Interface Protocol
B. Point-to-Point Protocol
C. Browsing
D. Virtual Private Networks
Answer: D
QUESTION NO: 140
Which of the following are used to suppress electrical and computer fires? Each correct answer represents a complete solution. Choose two.
A. Halon
B. Water
C. CO2
D. Soda acid
Answer: A,C
QUESTION NO: 141
Which of the following are natural environmental threats that an organization faces? Each correct answer represents a complete solution. Choose two.
A. Strikes
B. Floods
C. AccidentsD. Storms
Answer: B,D
QUESTION NO: 142
Which of the following keys are included in a certificate revocation list (CRL) of a public key infrastructure (PKI)? Each correct answer represents a complete solution. Choose two.
A. A foreign key
B. A private key
C. A public key
D. A primary key
Answer: B,C
QUESTION NO: 143
Which of the following SDLC phases consists of the given security controls: Misuse Case
Modeling Security Design and Architecture Review Threat and Risk Modeling Security
Requirements and Test Cases Generation
A. Design
B. Maintenance
C. Deployment
D. Requirements Gathering
Answer: A
QUESTION NO: 144
A company named Money Builders Inc., hires you to provide consultancy for setting up their Windows network. The company’s server room will be in a highly secured environment. You are required to suggest an authentication method for it. The CFO of the company wants the server to use thumb impressions for authentication. Which of the following authentication methods will you suggest?
A. Certificate
B. Smart card
C. Two-factor
D. Biometrics
Answer: D
QUESTION NO: 145
You are the Security Consultant and have been contacted by a client regarding their encryption and hashing algorithms. Their in-house network administrator tells you that their current hashing algorithm is an older one with known weaknesses and is not collision resistant.Which algorithm are they most likely using for hashing?
A. PKI
B. SHA
C. Kerberos
D. MD5
Answer: D
QUESTION NO: 146
You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. You need to configure a firewall for the company. The firewall should be able to keep track of the state of network connections traveling across the network. Which of the following types of firewalls will you configure to accomplish the task?
A. Stateful firewall
B. Host-based application firewall
C. A network-based application layer firewall
D. An application firewall
Answer: A
QUESTION NO: 147
Shoulder surfing is a type of in-person attack in which the attacker gathers information about the premises of an organization. This attack is often performed by looking surreptitiously at the keyboard of an employee’s computer while he is typing in his password at any access point such as a terminal/Web site. Which of the following is violated in a shoulder surfing attack?
A. Integrity
B. Availability
C. Authenticity
D. Confidentiality
Answer: D
QUESTION NO: 148
Which of the following plans is designed to protect critical business processes from natural or man-made failures or disasters and the resultant loss of capital due to the unavailability of normal business processes?
A. Disaster recovery plan
B. Contingency plan
C. Business continuity plan
D. Crisis communication plan
Answer: C
QUESTION NO: 149
Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?
A. Spoofing
B. Packet sniffing
C. Tunneling
D. Packet filtering
Answer: C
QUESTION NO: 150
You work as a Security Manager for Tech Perfect Inc. A number of people are involved with you in the DRP efforts. You have maintained several different types of plan documents, intended for different audiences. Which of the following documents will be useful for you as well as public relations personnel who require a non-technical perspective on the entire organization’s disaster recovery efforts?
A. Technical guide
B. Executive summary
C. Checklist
D. Department-specific plan
Answer: B