CISSP
CISSP
ACCURATE SOLUTIONS
A. An electromagnet
B. A credential reader
C. A door sensor
D. A biometric scanner - Precise Answer ✔✔d -An electronic access
control (EAC) lock comprises three elements: an electromagnet to keep
the door closed, a credential reader to authenticate subjects and to
disable the electromagnet, and a door-closed sensor to reenable the
electromagnet.
Which one of the following items is a characteristic of hot sites but not a
characteristic of warm sites?
a.Communications circuits
B. Workstations
C. Servers
D. Current data - Precise Answer ✔✔d- current data
What is the best way to understand the meaning of the term 100-year
flood plain?
A. A flood that occurs once every 100 years
B. A flood larger than any recorded in the past 100 years
C. A very serious but very unlikely flood event
D. A very serious flood that has a probability of 1 in 100 (1%) of
occurring in any single calendar year - Precise Answer ✔✔D-Flood
levels rated in years (100-year, 500-year, 1,000-year, and so forth)
basically reflect estimates of the probability of their occurrence. An area
rated as a 100-year flood plain has a 1 in 100 chance of occurring in any
given calendar year (1%), a 500-year flood has a 1 in 500 chance of
occurring in any given calendar year, and so forth. Options A and B
misrepresent the meaning of the 100-year interval mentioned, while
option C fails to address its probabilistic intent.
what is the most common cause of failure for water based fire
suppression systems?
a. water shortage
b. people
c. ioniziation detectors
d. placement of detectors in drop ceilings - Precise Answer ✔✔b- people
-humans turn off water after fire and forget to turn back on
What type of evidence refers to written documents that are brought into
court to prove a fact?
A. Best evidence
B. Payroll evidence
C. Documentary evidence
D. Testimonial evidence - Precise Answer ✔✔c- written documents
brought into court to prove the facts of a case are referred to as
documentary evidence.
What part of the Common Criteria specifies the claims of security from
the vendor that are built into a target of evaluation?
A. Protection profiles
B. Evaluation assurance level
C. Certificate authority
D. Security target - Precise Answer ✔✔D- Security targets (STs) specify
the claims of security from the vendor that are built into a TOE.
What form of password attack utilizes a preassembled lexicon of terms
and their permutations?
A. Rainbow tables
B. Dictionary word list
C. Brute force
D. Educated guess - Precise Answer ✔✔b-Dictionary word lists are
precompiled lists of common passwords and their permutations and
serve as the foundation for a dictionary attack on accounts.
What security protocol has become the de facto standard used to provide
secure e-commerce services?
A. S/MIME
B. TLS
C. SET
D. PGP - Precise Answer ✔✔B-Transport Layer Security (TLS), the
revised replacement for SSL, has become the de facto standard used to
provide secure e-commerce services. This is in spite of the attempts of
several credit card companies to promote alternate options, such as
Secure Electronic Transaction (SET).
Which of the following is a type of connection that can be described as a
logical circuit that always exists and is waiting for the customer to send
data?
A. ISDN
B. PVC
C. VPN
D. SVC - Precise Answer ✔✔B-A permanent virtual circuit (PVC) can
be described as a logical circuit that always exists and is waiting for the
customer to send data.
What regulation formalizes the prudent man rule that requires senior
executives to take personal responsibility for their actions?
A. CFAA
B. Federal Sentencing Guidelines
C. GLBA
D. Sarbanes-Oxley - Precise Answer ✔✔B- The Federal Sentencing
Guidelines released in 1991 formalized the prudent man rule, which
requires senior executives to take personal responsibility for ensuring the
due care that ordinary, prudent individuals would exercise in the same
situation.
A team that knows substantial information about its target, including on-
site hardware/software inventory and configuration details, is best
described as what?
A. Zero knowledge
B. Infinite knowledge
C. Absolute knowledge
D. Partial knowledge - Precise Answer ✔✔D -Partial-knowledge teams
possess a detailed account of organizational assets, including hardware
and software inventory, prior to a penetration test.
What BIA metric can be used to express the longest time a business
function can be unavailable without causing irreparable harm to the
organization?
A. SLE
B. EF
C. MTD
D. ARO - Precise Answer ✔✔c-The maximum tolerable downtime
(MTD) represents the longest period a business function can be
unavailable before causing irreparable harm to the business. This figure
is useful when determining the level of business continuity resources to
assign to a particular function.
Which one of the following is not a basic requirement for the reference
monitor?
A. It must be tamperproof.
B. The source code must be made public.
C. It must always be invoked.
D. It must be small enough for testing. - Precise Answer ✔✔b-There is
no requirement that the reference monitor's source code be available to
the public.
Which of the following is the best response after detecting and verifying
an incident?
A. Contain it.
B. Report it.
C. Remediate it.
D. Gather evidence. - Precise Answer ✔✔A -Containment is the first
step after detecting and verifying an incident. This limits the effect or
scope of an incident. Organizations report the incident based on policies
and governing laws, but this is not the first step. Remediation attempts to
identify the cause of the incident and steps that can be taken to prevent a
reoccurrence, but this is not the first step. It is important to protect
evidence while trying to contain an incident, but gathering the evidence
will occur after containment.
A team that initially knows nothing about its target before performing a
security analysis is known as what?
A. Absolute knowledge
B. Partial knowledge
C. Zero knowledge
D. Infinite knowledge - Precise Answer ✔✔c-Zero-knowledge teams
possess only primary information about an organization during a
security assessment or penetration test.
Adam recently ran a network port scan of a web server running in his
organization. He ran the scan from an external network to get an
attacker's perspective on the scan. Which one of the following results is
the greatest cause for alarm?
A. 80/open
B. 22/filtered
C. 443/open
D. 1433/open - Precise Answer ✔✔d-Only open ports represent
potentially significant security risks. Ports 80 and 443 are expected to be
open on a web server. Port 1433 is a database port and should never be
exposed to an external network.