CISSP v9.1 - Practice Exam
CISSP v9.1 - Practice Exam
®
CBK Review Seminar
Educational Item
Sample Test
2. Why is projection lighting mounted at the same height as the barbed wire topping
of a fence?
6. Important documents that have been soaked in water during fire suppression
efforts should be restored by
(A) User
(B) Security officer
(C) Group leader
(D) Owner
9. What is the purpose of the Encapsulating Security Payload (ESP) in the Internet
Protocol (IP) Security Architecture for Internet Protocol Security (IPSec)?
(A) log an exception when the exception is wrapped with another exception
and propagate.
(B) catch and log exceptions at every level in the software.
(C) catch and log exceptions only at points at which exceptions are actually
handled.
(D) disable debug level logging in a production environment.
11. What physical characteristics does a retinal scan biometric device measure?
(A) A description of the settings that will provide the highest level of security
(B) A brief high-level statement defining what is and is not permitted in the
operation of the system
(C) A definition of those items that must be denied on the system
(D) A listing of tools and applications that will be used to protect the system
13. To support legacy applications that rely on risky protocols (e.g., plain text
passwords), which one of the following can be implemented to mitigate the risks
on a corporate network?
14. What is the recommended frequency that a system recovery plan be tested in a
stable data processing environment?
ABZ Organization is constructing a new secure facility and has elected to install a two-
tier access control system, which will consist of proximity badges and biometric devices.
The system security professional is tasked with acquiring the access control systems. The
only requirements are to keep cost as low as possible and minimize system down time.
15. While evaluating the effectiveness of several new devices, the security
professional should expect that a biometric device becomes more sensitive when
(A) both the False Acceptance Rate (FAR) and False Rejection Rate (FRR)
increase.
(B) the FAR increases while the FRR decreases.
(C) the FAR decreases while the FRR increases.
(D) both the FAR and FRR decrease.
16. The point where the False Acceptance Rate (FAR) and False Rejection
Rate (FRR) is balanced is known as the
17. When the results of process execution depend on the behavior of other processes
on the system, the process may be vulnerable to
18. What type of networking model can be deployed for small, inexpensive, and less
secure networking?
19. Which of the following is the BEST reason for using an automated risk analysis
methodology?
(A) Spoofing
(B) Tampering
(C) Side channel
(D) Traffic analysis
23. What is the GREATEST vulnerability of relying solely on proximity cards for
access to a secure facility?
(A) A lost or stolen card may allow an unauthorized person to gain access.
(B) A proximity card is too easy to duplicate or forge.
(C) A proximity card does not record time of departure.
(D) An electrical power failure may deny access to all users.
25. Which of the following is TRUE for an effective Incident Response Plan?
(A) Conduct a Business Impact Analysis (BIA) prior to developing the plan.
(B) The plan should be part of a Disaster Recovery Plan (DRP).
(C) Establish a leader who has a thorough understanding of the plan.
(D) The plan should be developed by an outside consulting agency.
29. Which one of the following conditions is NOT necessary for a long dictionary
attack to succeed?
30. Wired Equivalent Privacy (WEP) uses which of the following ciphers?
31. Which one of the following is the BEST defense against worms?
(A) ensure that the entire environment is safe and free of problems and errors.
(B) help prepare for documentation for the auditors.
(C) help provide the statistics of changes to upper management for cost-
benefit analysis.
(D) provide feedback to the Information Technology (IT) support staff to
improve their technical skills.
34. What type of subsystem is an application program that operates outside the operating
system and carries out functions for a group of users, maintains some common data
for all users in the group, and protects the data from improper access by users in the
group?
(A) Access control concept that refers to an abstract machine that mediates all
accesses to objects by subjects
(B) Audit concept that refers to the monitoring and recording of all accesses to
objects by subjects
(C) Identification concept that refers to the comparison of material supplied by a
user with its reference profile
(D) Network control concept that distributes the authorization of subject accesses
to objects
36. Which one of the following describes a covert timing channel?
37. Which one of the following does NOT describe an information integrity model?
(A) Clark-Wilson
(B) Bell-LaPadula
(C) Biba
(D) Sutherland
38. The purpose of the Internet Protocol Security (IPSec) Authentication Header
(AH) is to provide
39. In which order are successful business continuity planning project process phases
accomplished?
(A) Plan development, testing, Business Impact Analysis (BIA), risk analysis,
and maintenance
(B) Requirement analysis, design, implementation, testing, and maintenance
(C) Plan design, requirement analysis, plan testing, implementation, and
maintenance
(D) Requirement analysis, recovery strategy selection, user training, and
maintenance
40. What technology interleaves data frames from multiple conversations into a single
data stream for transmission?
44. Which one of the following is NOT a valid X.509 V.3 certificate field?
45. Which one of the following represents an addition to a message digest (MD)
algorithm to increase its cryptographic strength?
47. Why does fiber optic communication technology have a significant security
advantage over other transmission technology?
48. What determines the correct classification of data in a Mandatory Access Control
(MAC) environment?
(A) The analysis of the users in conjunction with the audit department
(B) The assessment by the information security department
(C) The user’s evaluation of a particular information element
(D) The requirements of the organization’s published security policy
(A) Their transport can interrupt the secure distribution of World Wide Web
pages over the Internet by removing Secure Sockets Layer (SSL) and
Secure HyperText Transfer Protocol (S-HTTP).
(B) Client execution environment may not provide the ability to limit system
access that an applet could have on a client system.
(C) Executables from the Internet may attempt an unintentional attack when
they are downloaded on a client system because of bad programming.
(D) Client execution environment will check the bytecode at runtime or
provide other safety mechanisms for program isolation from the client
system.
53. Which one of the following is concerned with the frequency, length, and
origin-destination patterns of the communications between systems?
54. Which of the following is NOT a protection feature associated with Secure
Sockets Layer (SSL)?
55. When disposing of classified data, file wipe programs exist that actually overwrite
media that can be used on all media types EXCEPT
(A) Reviewing the system documentation will be enough for a successful audit
(B) Notify staff the week before the audit will be performed
(C) No additional work is needed if a continuous compliance program is in
place
(D) Implement a continuous compliance program right away
57. What is considered an industry standard for Internet Protocol Security (IPSec)
remote access Virtual Private Networks (VPN) key exchange?
58. Why can surge suppressors that protect stand-alone computers and peripherals
cause damage to computers and peripherals on a network?
(A) Stand-alone surge protectors are used only to filter electricity to the
computers plugged into it.
(B) Only stand-alone surge suppressors signal a warning so that orderly
shutdown can take place.
(C) Stand-alone surge suppressors divert the high surge voltage to the ground
where it can enter the network communications lines.
(D) Stand-alone surge suppressors could overload the electrical circuits during
a surge and result in a fire.
60. Verifying vendor compliance with their active security policies is typically
provided through
62. Which one of the following is used to provide authentication and confidentiality
for e-mail messages?
63. The MAIN reason for validating a vendor’s Information Technology (IT) security
policies and procedures is to verify the
64. Which one of the following is the FIRST step in auditing source code?
65. When establishing a process to track and analyze violations, which one of the
following is often used to keep the quantity of data to manageable levels?
68. When basic standards for software development are implemented within an
organization and are in common use (defined, established, and documented), the
organization has reached what level of the Capability Maturity Model Integration
(CMMI) for software engineering?
(A) Level 1
(B) Level 2
(C) Level 3
(D) Level 4
69. When a communication link is subject to monitoring, what advantage does end-
to-end encryption have over link encryption?
71. What two factors should a backup program track to ensure the serviceability of
backup tape media?
(A) The initial usage date of the media and the number of uses
(B) The physical characteristics and rotation cycle of the media
(C) The manufacturer and model number of the tape media
(D) The frequency of usage and magnetic composition
72. What is the PRIMARY objective for implementing a security awareness program?
74. When considering the Heating, Ventilation, and Air Conditioning (HVAC)
requirements for a data processing center, why should an information security
architect be concerned with the effect of humidity on data availability?
(A) Low humidity may cause condensation to occur, which could lead to data
loss through a short circuit.
(B) High humidity may lead to high electrostatic buildup, which could lead to
data loss through static discharge.
(C) High humidity may cause condensation to occur, which could lead to data
loss through a short circuit.
(D) Low humidity may lead to high electrostatic buildup, which could lead to
data loss through condensation.
76. In e-mail security, both Secure Multipurpose Internet Mail Extensions (S/MIME)
and Pretty Good Privacy (PGP) use Diffie-Hellman cipher. What is the purpose of
using Diffie-Hellman?
78. Why is it important that system owners categorize their information and systems
in conjunction with their initial Certification and Accreditation (C&A) efforts?
(A) To determine what level of protection is required and what controls are
needed to protect the system
(B) To determine the budget that is required to complete the initial
certification assessment
(C) To develop a better project plan and method for allowing changes to be
made to the system
(D) To determine whether their system is compatible with legacy systems in
their inventory
80. Comparing the starting and ending locations of partitions on a disk, as reported by
the partition table, is an example of
81. An Internet worm that causes several computer systems to become unresponsive
is seeking to reduce which of the following?
(A) Confidentiality
(B) Integrity
(C) Availability
(D) Denial of Service (DoS)
82. What is the company benefit, in terms of risk, for people taking a vacation of a
specified minimum length?
86. What is the PRIMARY benefit of capturing all network traffic during an attack,
as opposed to only capturing alerts?
89. When dealing with intellectual property rights for software between nations, it is
important to consider
(A) information concerning the overall foreign trade agreements between the
two nations.
(B) the governing law in the agreements between the two nations.
(C) foreign corrupt trading practices in the agreement between the two
nations.
(D) information about the specific product liabilities that the software has.
90. What is the MAIN purpose of periodically testing the Incident Response Plan?
(A) To identify flaws in the plan and make it effective over time by updating it
(B) To satisfy auditors as the test reports generated are required for
compliance
(C) To help the system administrators to identify any weaknesses present in
their applications in advance
(D) To help prevent the occurrence of security incidents in the future
93. Which of the following is the LEAST important information to record when
logging a security violation?
95. How can a user of digital signatures ensure non-repudiation of delivery of the
correct message?
(A) Sender encrypts the message with the recipient’s public key and signs it
with their own private key.
(B) Sender computes a digest of the message and sends it to a trusted third
party who signs it and stores it for later reference.
(C) Sender signs the message and sends it to the recipient and requests “return
receipt” of the e-mail.
(D) Sender gets a digitally signed acknowledgement from the recipient
containing a copy or digest of the message.
(A) The affected system Recovery Time Objective (RTO) because that is a
Business Impact Analysis issue and is irrelevant during an incident
response.
(B) The affected system Recovery Point Objective (RPO) because that only
deals with how long a system can go between backups.
(C) Alerting Law Enforcement because they may take over the investigation
and reduce workload on the organization.
(D) Monitoring the situation to assess the effectiveness of the press briefing at
controlling news reports that may disclose sensitive information.
98. Referring to the following diagram, which of the following statements is most
correct:
DMZ
Firewall Firewall
Network Switch
(A) Place the enterprise mail server in the DMZ area because a mail relay
would not provide adequate mail service.
(B) Place a router between the Internet and the first firewall to provide
appropriate warning that the firewall is under attack.
(C) VPN connections from a VPN concentrator should terminate at the
firewall closest to the network to minimize traffic in the DMZ area.
(D) A protocol based network Intrusion Detection System (IDS) could be
placed in the DMZ area.
99. In order to reduce the costs and complexity of providing fault tolerant processor
services, a certain number of the most recent transactions are allowed to be lost
during the recovery. The magnitude of this loss is specified in the
100. Feeding fake information into a phishing site with the intent to make the phisher’s
haul less valuable is referred to as
101. Which of the following is MOST true about Management’s overarching security
policy.
102. All of the following are basic components of a security policy EXCEPT the
(A) Threat
(B) Probability
(C) Vulnerability
(D) Loss expectancy
105. When conducting a risk assessment, which one of the following is NOT an
acceptable social engineering practice?
(A) Hardening.
(B) Segmenting.
(C) Aggregating.
(D) Kerneling.
107. What type of key distribution system allows two parties to establish a secure
session without exchanging any secret key?
108. The network topology that provides the MOST security and the least risk is:
110. Which of the following could BEST be utilized to validate the continued need for
access to system resources?
112. You are the Chief Information Security Officer for the United Nations.
Understanding the International challenges will be difficult. However, which of
the following will have the LEAST impact on your decision-making during risk
analysis?
113. Which risk management methodology uses the exposure factor multiplied by the
asset value to determine its outcome?
116. Which one of the following refers to a series of characters used to verify a user’s
identity?
117. Which of the following MUST be true before the least privilege principle applies?
119. IPSEC (IP Security), S-HTTP (Secure HTTP) and SSL (Secure Socket Layer) are
examples of ?
120. Which one of the following can be used to increase the authentication strength of
an access control system?
(A) Multi-party
(B) Two factor
(C) Mandatory
(D) Discretionary
121. What is the BEST method of storing user passwords for a system?
122. CISSPs may be faced with an ethical conflict between their company’s policies
and the (ISC)2 Code of Ethics. According to the (ISC)2 Code of Ethics, in which
order of priority should ethical conflicts be resolved?
124. Which of the following statements is true about traffic passing from the DMZ
interface to the inside interface?
125. Which one of the following evidence collection methods is MOST likely to be
acceptable in a court case?