1.
A potential problem related to the physical installation of the Iris Scanner in regards to the usage of the iris pattern within a biometric system is:
Correct Answer
D. The optical unit must be positioned so that the sun does not shine into the aperature
Explanation
The potential problem related to the physical installation of the Iris Scanner in regards to the usage of the iris pattern within a biometric system is that the optical unit must be positioned so that the sun does not shine into the aperture. This is important because direct sunlight can interfere with the accuracy of the iris recognition process and may result in false readings or errors. Therefore, it is necessary to ensure that the scanner is installed in a location where it is not exposed to direct sunlight to maintain the reliability and effectiveness of the iris scanning technology.
2.
In Mandatory Access Control, sensitivity labels attached to an object contain what information?
Correct Answer
B. The item's classification and category set
Explanation
In Mandatory Access Control, sensitivity labels attached to an object contain the item's classification and category set. This means that the labels not only indicate the item's classification (such as confidential, secret, or top secret), but also specify the category to which the item belongs. The category set helps in further defining the access control policies and determining which users or groups are authorized to access the object based on their security clearances and need-to-know information.
3.
Which of the following is true about Kerberos?
Correct Answer
C. It depends upon symmetric cipHers
Explanation
Kerberos is a network authentication protocol that relies on symmetric key cryptography. It uses a trusted third-party server, known as the Key Distribution Center (KDC), to authenticate users and provide them with tickets to access network resources. These tickets are encrypted using symmetric ciphers, which means that the same secret key is used for both encryption and decryption. This ensures secure communication between the client and the server. Therefore, the statement "it depends upon symmetric ciphers" is true about Kerberos.
4.
Which of the following authentication mechanisms creates a problem for mobile users?
Correct Answer
A. Mechanisms based on IP addresses
Explanation
Mechanisms based on IP addresses create a problem for mobile users because mobile devices often change their IP addresses as they move between different networks. This means that if an authentication mechanism relies on a specific IP address to verify a user's identity, the user may be denied access or face difficulties in authenticating when their IP address changes. Therefore, mechanisms based on IP addresses are not suitable for mobile users who frequently switch networks.
5.
Organizations should consider which of the following first before allowing external access to their LANs via the Internet?
Correct Answer
D. Plan for considering proper authentication options
Explanation
Before allowing external access to their LANs via the Internet, organizations should first consider planning for proper authentication options. This is important to ensure that only authorized users are granted access to the network, reducing the risk of unauthorized access and potential security breaches. Implementing strong authentication methods such as two-factor authentication or biometric authentication can help strengthen the security of the network and protect sensitive information from being accessed by unauthorized individuals.
6.
Kerberos can prevent which one of the following attacks?
Correct Answer
B. Playback (replay attack)
Explanation
In a Kerberos implementation that is configured to use an authenticator, the user sends to the
server her identification information, a timestamp, as well as sequence number encrypted with the
session key that they share. The server then decrypts this information and compares it with the
identification data the KDC sent to it regarding this requesting user. The server will allow the user
access if the data is the same. The timestamp is used to help fight against replay attacks.
7.
In discretionary access environments, which of the following entities is authorized to grant information access to other people?
Correct Answer
D. Data Owner
Explanation
The data owner is authorized to grant information access to other people in discretionary access environments. As the owner of the data, they have the authority to determine who can access the information and to what extent. They are responsible for ensuring that access is granted based on the appropriate permissions and security requirements. The system administrator, data custodian, and security manager may have roles in managing and securing the data, but it is ultimately the data owner who has the authority to grant access.
8.
Who developed one of the first mathematical models of a multilevel-security computer system?
Correct Answer
C. Bell and LaPadula
Explanation
The Bell-LaPadula model was the first mathematical model of a multilevel security policy used to
define the concept of a secure state machine and modes of access, and outlined rules of access.
9.
Which of the following is the most reliable authentication method for remote access?
Correct Answer
B. Synchronous token
Explanation
A Synchronous token generates a one-time password that is only valid for a short period of time.
Once the password is used it is no longer valid, and it expires if not entered in the acceptable time
frame.
10.
There are parallels between the trust models in Kerberos and Public Key Infrastructure (PKI). When we compare them side by side, Kerberos tickets correspond most closely to which of the following?
Correct Answer
C. Public-key certificates
Explanation
Public Key describes a system that uses certificates or the underlying public key cryptography on
which the system is based.
In the traditional public key model, clients are issued credentials or "certificates" by a Certificate
Authority (CA). The CA is a trusted third party. Public key certificates contain the user's name, the
expiration date of the certificate etc. The most common certificate format is X.509. Public key
credentials in the form of certificates and public-private key pairs can provide a strong distributed
authentication system.
The Kerberos and public key trust models are very similar. A Kerberos ticket is analogous to a
public key certificate (a Kerberos ticket is supplied to provide access to resources). However,
Kerberos tickets usually have lifetimes measured in days or hours rather than months or years.
11.
A company outsources payroll services to a third party company. Which of the following roles most likely applies to the third-party payroll company?
Correct Answer
D. Data processor
Explanation
The third-party payroll company most likely applies to the role of a data processor. As a data processor, they handle and process the payroll data on behalf of the company outsourcing the services. They are responsible for ensuring the accuracy and security of the data while performing the necessary payroll calculations and generating payslips for the employees. However, they do not have ownership or control over the data, and their actions are governed by a data processing agreement with the company.
12.
Which managerial role is responsible for the actual computers that house data, including the security of hardware and software components?
Correct Answer
D. System owner
Explanation
The correct answer is system owner. The system owner is responsible for the actual computers that house data, including the security of hardware and software components. They ensure that the system is maintained, updated, and protected from any potential threats or vulnerabilities. The system owner also oversees the overall functioning and performance of the system to ensure that it meets the organization's needs and objectives.
13.
What method destroys the integrity of magnetic media, such as tapes or disk drives, and the data they contain by exposing them to a strong magnetic field?
Correct Answer
B. Degaussing
Explanation
Degaussing is the method that destroys the integrity of magnetic media by exposing them to a strong magnetic field. This process effectively erases the data stored on the tapes or disk drives by neutralizing the magnetic particles. It is commonly used to ensure that sensitive information cannot be recovered from the media. Degaussing is a reliable and secure method for data destruction on magnetic media.
14.
What type of relatively expensive and fast memory uses small latches called "flip-flops" to store bits?
Correct Answer
C. SRAM
Explanation
SRAM = Static Random Access Memory (fast and expensive, contains switches)
DRAM = Dynamic Random Access Memory (slower and cheaper than SRAM, contains capacitors)
EPROM = Erasable Programmable Read Only Memory (can be flashed and written to multiple times)
SSD = Solid State Drive
15.
What type of memory stores bits in small capacitors (like small batteries)?
Correct Answer
A. DRAM
Explanation
DRAM = Dynamic Random Access Memory (slower and cheaper than SRAM, uses capacitors)
EPROM = Erasable Programmable Read Only Memory (can be flashed and written to multiple times)
SRAM = Static Random Access Memory (fast and expensive, uses switches)
SSD = Solid State Drive
16.
Your company sells Apple iPods online and has suffered many denial-of-service (DoS) attacks. Your company makes an average $20,000 profit per week, and a typical DoS attack lowers sales by 40%. You suffer seven DoS attacks on average per year. A DoS-mitigation service is available for a subscription fee of $10,000 per month. You have tested this service and believe it will mitigate the attacks. What is the ARO?
Correct Answer
C. 7
Explanation
ARO = Annual Rate of Occurrence; number of losses suffered per year
17.
Your company sells Apple iPods online and has suffered many denial-of-service (DoS) attacks. Your company makes an average $20,000 profit per week, and a typical DoS attack lowers sales by 40%. You suffer seven DoS attacks on average per year. A DoS-mitigation service is available for a subscription fee of $10,000 per month. You have tested this service and believe it will mitigate the attacks.What is the ALE of lost iPod sales due to the DoS attacks?
Correct Answer
D. $56,000
Explanation
ALE = Annualized Loss Expectancy; Single Loss Expectancy (SLE) * Annualized Rate of Occurrence (ARO)
SLE = amount lost per occurrence
ARO = number of occurrences per year
18.
Your company sells Apple iPods online and has suffered many denial-of-service (DoS) attacks. Your company makes an average $20,000 profit per week, and a typical DoS attack lowers sales by 40%. You suffer seven DoS attacks on average per year. A DoS-mitigation service is available for a subscription fee of $10,000 per month. You have tested this service and believe it will mitigate the attacks.Is the DoS mitigation service a good investment?
Correct Answer
C. No, the annual TCO is higher than the ALE
Explanation
TCO = Total Cost of ownership; $10,000 per month or $120,000 per year
ALE = Annualized Loss Expectancy; Single Loss Expectancy or SLE (40% of $20,000 = $8000) * Annualized Rate of Occurrence or ARO (7 times per year) = $56,000
TCO ($120,000) is greater than ARO ($56,000) so this would be a bad investment
19.
Which canon of The (ISC)2 Code of Ethics should be considered the most important?
Correct Answer
A. Protect society, the commonwealth, and the infrastructure
Explanation
The canons are applied in order, and Protect society, the commonwealth, and the infrastructure is the first canon listed
20.
Which of the following can be classified as objects?
Correct Answer(s)
A. Readme.txt file
B. Database table
E. 1099 Tax Form
Explanation
Object = any passive data within the system
Subject = an active entity on a data system
21.
Which of the following is true for digital signatures?
Correct Answer
B. The sender encrypts the hash with a private key
Explanation
To digitally sign a message the sender hashes the plaintext then encrypts the hash with his/her private key
22.
Under which type of cloud service level would Linux hosting be offered?
Correct Answer
A. IaaS
Explanation
IaaS = Infrastructure as a service; provides an entire virtualized operating systems, which the customer configures from the OS on up.
23.
A criminal deduces that an organization is holding an offsite meeting and there are few people in the building, based on the low traffic volume to and from the parking lot. The criminal uses the opportunity to break into the building to steal laptops. What type of attack has been launched?
Correct Answer
C. Inference
Explanation
Inference requires an attacker to “fill in the blanks” and deduce sensitive information from public information.
24.
EMI such as crosstalk primarily impact which aspect of security?
Correct Answer
B. Integrity
Explanation
Most common impact of crosstalk is availability
25.
Restricting Bluetooth device discovery relies on the secrecy of what?
Correct Answer
A. MAC address
Explanation
Restricting Bluetooth device discovery relies on the secrecy of the 48-bit Bluetooth MAC address.
26.
What is the most secure type of EAP?
Correct Answer
A. EAP-TLS
Explanation
EAP-TLS = Extensible Authentication Protocol-Transport Layer Security (uses PKI, establishes TLS tunnel)
EAP-TTLS = Extensible Authentication Protocol-Tunneled Transport Layer Security (establishes TLS tunnel without PKI)
LEAP = Lightweight Extensible Authentication Protocol (Cisco proprietary, insecure)
PEAP = Protected Extensible Authentication Protocol (Cisco, Microsoft, RSA version of EAP-TTLS)
27.
What is the most secure type of firewall?
Correct Answer
D. Application-layer proxy firewall
Explanation
Application-layer firewalls are most secure, they have ability to filter based on OSI Layers 3-7
Packet filter = filters traffic on basis of single packet; no concept of "state"
Stateful firewall = uses state table to compare current packets to previous ones
Circuit-layer firewall = operates at layer 5 and cannot filter based on application-layer data
28.
Accessing an IPv6 network via an IPv4 network is called what?
Correct Answer
D. Tunneling
Explanation
Tunneling is the correct answer because it refers to the process of encapsulating IPv6 packets within IPv4 packets, allowing them to be transmitted over an IPv4 network. This enables communication between an IPv6 network and an IPv4 network by creating a virtual tunnel between them.
29.
What access control method weighs additional factors, such as time of attempted access, before granting access?
Correct Answer
B. Context-dependent access control
Explanation
Context-dependent access control is an access control method that takes into consideration additional factors, such as the time of attempted access, before granting access. This means that access is granted based on the specific context or situation in which the access request is made. This method allows for more granular control over access permissions, as it considers various contextual factors to determine whether access should be granted or denied.
30.
What service is known as cloud identity, which allows organizations to leverage cloud service for identity management?
Correct Answer
B. IDaas
Explanation
IDaaS = Identity as a Service
IaaS = Infrastructure as a Service
PaaS = Platform as a Service
SaaS = Software as a Service
31.
What is an XML-based framework for exchanging security information, including authentication data?
Correct Answer
C. SAML
Explanation
SAML is an XML-based framework for exchanging security information, including authentication data.
Kerberos is a third-party authentication service that may be used to support single sign-on.
OpenID is a framework for exchanging authentication data, but it is not XML-based.
SESAME = Secure European System for Applications in a Multivendor Environment, a single sign-on system that supports heterogeneous environments
32.
What protocol is a common open protocol for interfacing and querying directory service information provided network operating systems using port 389 via TCP or UDP?
Correct Answer
B. LDAP
Explanation
LDAP = Lightweight directory access protocol is an open protocol for interfacing and querying directory service information from network operating systems using port 389 TCP or UDP.
CHAP, PAP, & RADIUS are authentication protocols:
CHAP = Challenge-Handshake Authentication Protocol
PAP = Password Authentication Protocol
RADIUS = Remote Authentication Dial-In User Service
33.
What technique would raise the false accept rate (FAR) and lower the false reject rate (FRR) in a fingerprint scanning system?
Correct Answer
A. Decrease the amount of minutiae that is verified
Explanation
Decreasing the amount of minutiae will make the accuracy of the system lower, which lower false rejects but raises false accepts.
Enrollment and Throughput time are not directly connected to FAR and FRR
34.
What can be done to ensure that software meets the customer's requirements?
Correct Answer
C. Acceptance testing
Explanation
Acceptance testing is designed to ensure the software meets the customer's operational requirements
Integration testing examines multiple software components as they are combined into a working system.
Installation testing examines software as it is installed and first operated
Unit testing is a low-level test of software components, such as functions, procedures, or objects
35.
What term describes a black-box testing method that seeks to identify and test all unique combinations of software inputs?
Correct Answer
A. Combinatorial software testing
Explanation
Combinatorial software testing is a black-box testing method that seeks to identify and test all unique combinations of software inputs.
Dynamic testing examines code while executing it.
Misuse case testing formally models how security would be impacted by an adversary abusing the application.
Static testing examines the code passively; the code is not running. This form of testing includes walkthroughs, syntax checking, and code reviews.
36.
You are the CISO (chief information security officer) of a large bank and have hired a company to provide an overall security assessment, as well as complete a penetration test of your organization. Your goal is to determine overall information security effectiveness. You are specifically interested in determining if theft of financial data is possible. Your bank has recently deployed a custom-developed, three-tier web application that allows customers to check balances, make transfers, and deposit checks by taking a photo with their smartphone and then uploading the check image. In addition to a traditional browser interface, your company has developed a smartphone app for both Apple iOS and Android devices.The contract has been signed, and both scope and rules of engagement have been agreed upon. A 24/7 operational IT contact at the bank has been made available in case of any unexpected developments during the penetration test, including potential accidental disruption of services.Assuming the penetration test is successful, what is the best way for the penetration testing firm to demonstrate the risk of theft of financial data?
Correct Answer
D. Place a harmless “flag” file in the same location as the financial data, and inform the penetration testing team to download the flag.
Explanation
A flag is a dummy file containing no regulated or sensitive data. It is placed in the same area of the system as the credit card data and protected with the same permissions. If the tester can read and/or write to that file, then they prove they could have done the same to the credit card data.
37.
You are the CISO (chief information security officer) of a large bank and have hired a company to provide an overall security assessment, as well as complete a penetration test of your organization. Your goal is to determine overall information security effectiveness. You are specifically interested in determining if theft of financial data is possible.Your bank has recently deployed a custom-developed, three-tier web application that allows customers to check balances, make transfers, and deposit checks by taking a photo with their smartphone and then uploading the check image. In addition to a traditional browser interface, your company has developed a smartphone app for both Apple iOS and Android devices.The contract has been signed, and both scope and rules of engagement have been agreed upon. A 24/7 operational IT contact at the bank has been made available in case of any unexpected developments during the penetration test, including potential accidental disruption of services.You would like to have the security firm test the new web application, but have decided not to share the underlying source code. What type of test could be used to help determine the security of the custom web application?
Correct Answer
B. Fuzzing
Explanation
Fuzzing is a black-box testing method that does not require access to source code.
38.
You are the CISO (chief information security officer) of a large bank and have hired a company to provide an overall security assessment, as well as complete a penetration test of your organization. Your goal is to determine overall information security effectiveness. You are specifically interested in determining if theft of financial data is possible.Your bank has recently deployed a custom-developed, three-tier web application that allows customers to check balances, make transfers, and deposit checks by taking a photo with their smartphone and then uploading the check image. In addition to a traditional browser interface, your company has developed a smartphone app for both Apple iOS and Android devices.The contract has been signed, and both scope and rules of engagement have been agreed upon. A 24/7 operational IT contact at the bank has been made available in case of any unexpected developments during the penetration test, including potential accidental disruption of services.During the course of the penetration test, the testers discover signs of an active compromise of the new custom-developed, three-tier web application. What is the best course of action?
Correct Answer
C. Quietly end the test, immediately call the operational IT contact, and escalate the issue
Explanation
Attackers will often act more maliciously if they believe they have been discovered, sometimes violating data and system integrity. The integrity of the system is at risk in this case, and the penetration tester should end the penetration test and immediately escalate the issue. The client must be notified immediately, as incident handling is not the penetration tester's responsibility.
39.
Which plan details the steps required to restore normal business operations after recovering from a disruptive event?
Correct Answer
B. Business Resumption Plan (BRP)
Explanation
Resumption Planning details the steps required to restore normal business operations after a recovering from a disruptive event.
Business Continuity Planning develops a long-term plan to ensure the continuity of business operations.
The Continuity of Operations Plan describes the procedures required to maintain operations during a disaster.
The Occupant Emergency Plan provides the response procedures for occupants of a facility in the event a situation poses a threat to the health and safety of personnel, the environment, or property.
40.
What metric describes how long it will take to recover a failed system?
Correct Answer
C. Mean Time to Repair (MTTR)
Explanation
The Mean Time to Repair (MTTR) describes how long it will take to recover a failed system. It is the best estimate for
Minimum Operating Requirements describe the minimum environmental and connectivity requirements in order to operate computer equipment.
Mean Time Between Failures quantifies how long a new or repaired system will run before failing.
The Recovery Point Objective (RPO) is the moment in time in which data must be recovered and made available to users in order to resume business operations.
41.
What metric describes the moment in time in which data must be recovered and made available to users in order to resume business operations?
Correct Answer
C. Recovery Point Objective (RPO)
Explanation
The Recovery Point Objective (RPO) is the moment in time in which data must be recovered and made available to users in order to resume business operations.
Mean Time Between Failures quantifies how long a new or repaired system will run before failing.
Mean Time to Repair describes how long it will take to recover a failed system.
Recovery Time Objective describes the maximum time allowed to recover business or IT systems.
42.
Maximum Tolerable Downtime (MTD) is comprised of which two metrics?
Correct Answer
C. Recovery Time Objective (RTO) and Work Recovery Time (WRT)
Explanation
The Recovery Time Objective (RTO, the time it takes bring a failed system back online) and Work Recovery Time (WRT, the time required to configure a failed system) are used to calculate the Maximum Tolerable Downtime. RTO + WRT = MTD.
Maximum Tolerable Downtime does not directly use Recovery Point Objective or Mean Time to Repair as metrics.
43.
Which level of RAID does NOT provide additional reliability?
Correct Answer
C. RAID 0
Explanation
RAID 0 provides only striping and is used simply for performance purposes. It offers no additional data redundancy or resiliency.
RAID 1: Mirrored Set
RAID 3: Striped set w/ parity (allows for failure of 1 drive)
RAID 5: Striped set w/ distributed parity (allows for failure of 1 drive)
44.
What describes a more agile development and support model, where developers directly support operations?
Correct Answer
A. DevOps
Explanation
DevOps is a more agile development and support model, where developers directly support operations.
Sashimi, spiral, and waterfall are software development methodologies that do not describe a model for developers directly supporting operations.
45.
Two objects with the same name have different data. What OOP concept does this illustrate?
Correct Answer
C. Polyinstantiation
Explanation
Polyinstantiation means “many instances,” such as two objects with the same names that have different data.
Delegation allows objects to delegate messages to other objects.
Inheritance means an object inherits capabilities from its parent class.
Polymorphism allows the ability to overload operators, performing different methods depending on the context of the input message.
46.
What type of testing determines whether software meets various end-state requirements from a user or customer, contract, or compliance perspective?
Correct Answer
A. Acceptance testing
Explanation
acceptance testing determines whether software meets various end-state requirements from a user or customer, contract, or compliance perspective.
Integration testing tests multiple software components as they are combined into a working system.
Regression testing tests software after updates, modifications, or patches.
Unit testing consists of low-level tests of software components, such as functions, procedures, or objects.
47.
A database contains an entry with an empty primary key. What database concept has been violated?
Correct Answer
A. Entity integrity
Explanation
Entity integrity means each tuple has a unique primary key that is not null.
Normalization seeks to make the data in a database table logically concise, organized, and consistent.
Referential integrity means that every foreign key in a secondary table matches a primary key in the parent table; if this is not true, referential integrity has been broken.
Semantic integrity means each attribute (column) value is consistent with the attribute data type.
48.
Which vulnerability allows a third party to redirect static content within the security context of a trusted site?
Correct Answer
A. Cross-site request forgery (CSRF)
Explanation
Cross-site request forgery (CSRF) allows a third party to redirect static content within the security context of a trusted site.
XSS is a third-party execution of web scripting languages, such as Javascript, within the security context of a trusted site. XSS is similar to CSRF; the difference is XSS uses active code.
PHP RFI alters normal PHP variables to reference remote content, which can lead to execution of malicious PHP code.
SQL injection manipulates a back-end SQL server via a front-end web server.
49.
Which of the following security controls is intended to avoid and incident from occurring?
Correct Answer
B. Preventative
Explanation
Preventive controls stop actions from taking place. It applies restrictions to what a possible user can do, whether the user is authorized or unauthorized.
50.
Which of the following was developed to address some of the weaknesses in Kerberos and uses public key cryptography for the distribution of secret keys and provides additional access control support?
Correct Answer
A. SESAME
Explanation
Secure European System for Applications in a Multi-vendor Environment (SESAME) was developed to address some of the weaknesses in Kerberos and uses public key cryptography for the distribution of secret keys and provides additional access control support.