{"id":2558,"date":"2020-03-03T02:31:13","date_gmt":"2020-03-03T02:31:13","guid":{"rendered":"http:\/\/wiki.thomasandsofia.com\/?p=2558"},"modified":"2020-03-22T13:18:20","modified_gmt":"2020-03-22T13:18:20","slug":"cissp-d3-questions","status":"publish","type":"post","link":"https:\/\/wiki.thomasandsofia.com\/?p=2558","title":{"rendered":"CISSP D3 Questions"},"content":{"rendered":"<p><a href=\"https:\/\/quizlet.com\/167611061\/cissp-practice-questions-flash-cards\/\" target=\"_blank\" rel=\"noopener\">https:\/\/quizlet.com\/167611061\/cissp-practice-questions-flash-cards\/<\/a><\/p>\n<h4>25 What logical operation is described by the truth table shown here?<\/h4>\n<table>\n<tbody>\n<tr>\n<th>Input 1<\/th>\n<th>Input 2<\/th>\n<th>Output<\/th>\n<\/tr>\n<tr>\n<td>0<\/td>\n<td>0<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>0<\/td>\n<td>1<\/td>\n<td>1<\/td>\n<\/tr>\n<tr>\n<td>1<\/td>\n<td>0<\/td>\n<td>1<\/td>\n<\/tr>\n<tr>\n<td>1<\/td>\n<td>1<\/td>\n<td>0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>A. OR<br \/>\nB. AND<br \/>\n<strong>C. XOR<\/strong><br \/>\nD. NOR<\/p>\n<h4><\/h4>\n<h4>26. How many bits of keying material does the Data Encryption Standard (DES) use for encrypting information?<\/h4>\n<p><strong>A. 56<\/strong><br \/>\nB. 64<br \/>\nC. 128<br \/>\nD. 256<\/p>\n<ul>\n<li>Cracked in 1998<\/li>\n<li>Removed as a &#8216;Standard&#8217;<\/li>\n<li>Triple DES (3DES) uses the same algorithm, but 3 keys.\u00a0 Encrypt with K1, decrypt with K2 and re-encrypt with K3.<\/li>\n<\/ul>\n<h4><\/h4>\n<h4>27. In the figure shown here, Harry&#8217;s request to write to the data file is blocked.\u00a0 Harry has a Secret security clearance, and the data file has a Confidential classification.\u00a0 What principle of the Bell-LaPadula model blocked hist request?<\/h4>\n<p>A. Simple Security Property &#8211; a subject at a given security level may not read an object at a higher security level.<br \/>\nB. Simple Integrity Property &#8211; Biba: a subject at one level of integrity is not permitted to read an object of lower integrity.<br \/>\n<strong>C. *-Security Property &#8211; a subject at a given security level may not write to any object at a lower security level.<\/strong><br \/>\nD. Discretionary Security Property &#8211; Uses an Access Matrix (therefore, discretionary)<\/p>\n<ol>\n<li>Top Secret<\/li>\n<li>Secret<\/li>\n<li>Confidential<\/li>\n<\/ol>\n<h4><\/h4>\n<h4>28. Florian and Tobias would like to begin communicating using a symmetric cryptosystem, but they have no prearranged secrey and are not able to meet in person to exchange keys.\u00a0 What algorithm can they use to securely exchange the secret key?<\/h4>\n<p>A. IDEA &#8211; International Data Encryption Algorithm. (Cracked in 2011)<br \/>\n<strong>B. Diffie-Hellman &#8211; A system of creating a shared key without reveling your key<\/strong><br \/>\nC. RSA &#8211; Rivest\u2013Shamir\u2013Adleman- One key to encrypt, another to decrypt.<br \/>\nD. MD5 &#8211; (Message Digest 5)Hashing system for file integrity.<\/p>\n<p>Keyword: &#8216;Symmetric&#8217;<\/p>\n<h4><\/h4>\n<h4>29. Under the Common Criteria, what element describes the security requirements for a product?<\/h4>\n<p>A. TCSEC (The Trusted Computer System Evaluation Criteria aka Orange Book) American<br \/>\nB. ITSEC (Information Technology Security Evaluation Criteria) European structured set of criteria for evaluating computer security within products and systems.<br \/>\nC. PP (Protection Profile) A PP allows security requirements to be expressed using a template in an implementation-independent way, and is thus reusable.<br \/>\n<strong>D. ST (Security Target) contains a set of security requirements that can be stated explicitly. An ST includes detailed product-specific information. It can be viewed as a refinement of the PP, and forms the agreed-upon basis for evaluation.<\/strong><\/p>\n<h4><\/h4>\n<h4>30. Which one of the following is not one of the basic requirements for a cryptographic hash function?<\/h4>\n<p><strong>A. The function must work on a fixed length input. (Requires a fixed length output!)<\/strong><br \/>\nB. The function must be relatively easy to compute for any input.<br \/>\nC. The function must be one way. (Difficult to find the input based on the output)<br \/>\nD. The Function must be collision free. (Difficult to define two inputs that produce the same output.)<\/p>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Cryptographic_hash_function\" target=\"_blank\" rel=\"noopener\">https:\/\/en.wikipedia.org\/wiki\/Cryptographic_hash_function<\/a><\/p>\n<h4><\/h4>\n<h4>31. How many possible keys exist for a cipher that uses a key containing 5 bits?<\/h4>\n<p>A. 10<br \/>\nB. 16<br \/>\n<strong>C. 32 2<sup>5<\/sup> = 32<\/strong><br \/>\nD. 64<\/p>\n<h4><\/h4>\n<h4>32. What cryptographic principle stands behind the idea that cryptographic algorithms should be open to public inspection?<\/h4>\n<p>A. Security through obscurity &#8211; The presumption that &#8220;nobody will ever find it&#8221;.<br \/>\n<strong>B. Kerckhoffs&#8217; principle &#8211; A cryptosystem should be secure even if everything about the system, except the key, is public knowledge.<\/strong><br \/>\nC. Defense in depth &#8211; (aka <b>Castle Approach<\/b>) is a concept in which multiple layers of security controls (defense) are placed throughout a system.<br \/>\nH. Heisenburg principle &#8211; You cannot have complete security and privacy at the same time.\u00a0 If we allow our employees to encrypt their email, we cannot ensure that no confidential information is communicated to untrusted parties at the same time.\u00a0 If you &#8216;peek&#8217; at the emails to ensure security, you&#8217;ve lost privacy.<\/p>\n<p>&nbsp;<\/p>\n<h4>33. Referring to the figure shown here, what is the name of the security control indicated by the arrow?<\/h4>\n<p>(Chapter 10, pg 423)<\/p>\n<p><strong>A. Mantrap &#8211; a small space with two sets of interlocking doors, such that the first set of doors must close before the second set opens.<\/strong><br \/>\nB. Turnstyle &#8211; <span class=\"sb-0\"><span class=\"dt \"><span class=\"dtText\">a post with arms pivoted on the top set in a passageway so that persons can pass through only on foot one by one<\/span><\/span><\/span>.<br \/>\nC. Intrusion Prevention System &#8211; A network security\/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits.<br \/>\nD. Portal &#8211; a set of two interlocking doors where the first set of doors opens before the second set, causing the user to be contained in an enclosed area temporarily. The user must provide valid authorization to pass through the first set of doors into the portal, and may be required to provide secondary authorization credentials (often biometric) to pass through the second set of doors<\/p>\n<p>&nbsp;<\/p>\n<h4>34. Which one of the following does not describe a standard physical security requirement for wiring closets?<\/h4>\n<p>C10, p406<\/p>\n<p><strong>A. Place only in areas monitored by security guards.<\/strong><br \/>\nB. Do not store flammable items in the closet. True<br \/>\nC. Use sensors on doors to log entries. True<br \/>\nD. Perform regular inspections of the closet. True<\/p>\n<p>&nbsp;<\/p>\n<h4>35. In the figure shown here, Sally is blocked from writing to the data file by the Biba integrity model.\u00a0 Sally has a Secret security clearance and the file is classified Top Secret.\u00a0 What principle is preventing her from writing to the file?<\/h4>\n<p>A. Simple Security Property &#8211; A subject at a given security level may not read an object at a higher security level. (No read up)<br \/>\nB. Simple Integrity Property &#8211; A subject at one level of integrity is not permitted to read an object of lower integrity. (No read down)<br \/>\nC. *-Security Property &#8211; A subject at a given security level may not write to any object at a lower security level. (No write down)<br \/>\n<strong>D. *-Integrity Property &#8211; A subject at a given level of integrity must not write to data at a higher level of integrity (no write up)<\/strong><\/p>\n<p>Key: Integrity Principle writing to a higher clearance level.<\/p>\n<p>&nbsp;<\/p>\n<h4>36. Match each of these following numbered architecture security concepts with the appropriate lettered description:<\/h4>\n<p>1. Time of check<br \/>\n2. Covert channel<br \/>\n3. Time of use<br \/>\n4. Maintenance hooks<br \/>\n5. Parameter checking<br \/>\n6. Race condition<\/p>\n<p>A. A method used to pass information over a path not normally used for communication<br \/>\nB. The exploitation of the difference between time of check and time of use.<br \/>\nC. The time at which the subject checks whether an object is available<br \/>\nD. The time at which a subject can access an object<br \/>\nE. An access method known only to the developer of the system.<br \/>\nF. A method that can help prevent buffer overflow attacks<\/p>\n<p>Answers<\/p>\n<p>1 &#8211; C<br \/>\n2 &#8211; A<br \/>\n3 &#8211; D<br \/>\n4 &#8211; E<br \/>\n5 &#8211; F<br \/>\n6 &#8211; B<\/p>\n<p>&nbsp;<\/p>\n<h4>37. What is the minimum number of independent parties necessary to implement the Fair Cryptosystems approach to key escrow?<\/h4>\n<p>A. 1<br \/>\n<strong>B. 2<\/strong><br \/>\nC. 3<br \/>\nD. 4<\/p>\n<p>In the Fair Cryptosystems approach to key escrow, the secret keys used in communications are divided into two or more pieces, each of which is given to an independent third party.<\/p>\n<p>&nbsp;<\/p>\n<h4>38. In what state does a processor&#8217;s scheduler place a process when it is prepared to execute but the CPU is not currently available?<\/h4>\n<p><span style=\"color: #ff0000;\"><strong>A. Ready &#8211; State where a process has been assigned to a CPU.<\/strong><\/span><br \/>\nB. Running &#8211; State\u00a0when a process is executing on the CPU.<br \/>\nC. Waiting &#8211; State if it needs a currently unavailable resource, such as user input, or for a file to become available.<br \/>\nD. Stopped &#8211; State where a process waits to be removed from main memory.<\/p>\n<p><a href=\"http:\/\/wiki.thomasandsofia.com\/wp-content\/uploads\/2020\/03\/software-instruction-states.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2568\" src=\"http:\/\/wiki.thomasandsofia.com\/wp-content\/uploads\/2020\/03\/software-instruction-states.png\" alt=\"\" width=\"506\" height=\"237\" srcset=\"https:\/\/wiki.thomasandsofia.com\/wp-content\/uploads\/2020\/03\/software-instruction-states.png 506w, https:\/\/wiki.thomasandsofia.com\/wp-content\/uploads\/2020\/03\/software-instruction-states-300x141.png 300w, https:\/\/wiki.thomasandsofia.com\/wp-content\/uploads\/2020\/03\/software-instruction-states-150x70.png 150w\" sizes=\"auto, (max-width: 506px) 100vw, 506px\" \/><\/a><\/p>\n<h4>39. Alan is reviewing a system that has been assigned to EAL1 evaluation assurance level under the Common Criteria.\u00a0 What is the degree of assurance that he may have about the system?<\/h4>\n<p><strong>A. It has been functionally tested. (EAL1)<\/strong><br \/>\nB. It has been structurally tested. (EAL2)<br \/>\nC. It has been formally verified, designed and tested. (EAL7)<br \/>\nD. It has been methodically designed, tested and reviewed. (EAL4)<\/p>\n<p>&nbsp;<\/p>\n<h4>40. Which one of the following components is used to assign classifications to objects in a mandatory access control system?<\/h4>\n<p><strong>A. Security label<\/strong><br \/>\nB. Security token<br \/>\nC. Security descriptor<br \/>\nD. Security capability<\/p>\n<p>&nbsp;<\/p>\n<h4>41. What type of software program exposes the code to anyone who wishes to inspect it?<\/h4>\n<p>A. Closed source &#8211; Non-free computer software for which the software&#8217;s publisher or another person retains intellectual property rights.<br \/>\n<strong>B. Open source &#8211; Software that the general public can access and use and the source code is available for anyone to look at.<\/strong><br \/>\nC. Fixed source &#8211; <span style=\"color: #800080;\"><em>Same as Closed?<\/em><\/span><br \/>\nD. Unrestricted source &#8211; <em><span style=\"color: #800080;\">Whaatt?<\/span><\/em><\/p>\n<p>&nbsp;<\/p>\n<h4>42. Adam recently configured permissions on an NTFS filesystem to describe the access that different users may have to a file by listing each user individually.\u00a0 What did Adam create?<\/h4>\n<p><strong>A. An access control list &#8211; A list of access control entries<\/strong><br \/>\nB. An access control entry &#8211; Monitors access to an object by a specified trustee.<br \/>\nC. Role-based access control &#8211; Allows access to objects based on a job function.<br \/>\nD. Mandatory access control &#8211; a set of security policies constrained according to system classification, configuration and authentication. (MAC)<\/p>\n<p>&nbsp;<\/p>\n<h4>43. Betty is concerned about the use of buffer overflow attacks against a custom application developed for use in her organization.\u00a0 What security control would provide the strongest defense against these attacks?<\/h4>\n<p>A. Firewall &#8211; Device that allow or denies traffic to various systems based on IP addresses and Ports<br \/>\nB. Intrusion detection system &#8211; Network device that detects suspicious\/malicious traffic based on patterns\/activity<br \/>\n<strong>C. Parameter checking &#8211; A method that can help prevent buffer overflow attacks<\/strong><br \/>\nD. Vulnerability scanning &#8211; A security technique used to identify security weaknesses in a computer system.<\/p>\n<p>Hint: 2 of these simply detect.<\/p>\n<h4>44. Which of the following terms is not used to describe a privileged mode of systems operations?<\/h4>\n<p><strong>A. User mode<\/strong> &#8211; Mode set for non-privileged instructions<br \/>\nB. Kernel mode &#8211; Privileged &lt;CPU&gt; instructions can only be executed in Kernel mode.<br \/>\nC. Supervisory mode &#8211; aka Kernel mode<br \/>\nD. System mode &#8211; aka Kernel mode<\/p>\n<p>&nbsp;<\/p>\n<h4>45. James is working hard with a Dept. of Defense system that is authorized to simultaneously handle information classified at the Secret and Top Secret levels.\u00a0 What type of system is he using?<\/h4>\n<p>A. Single state &#8211; Systems that are dedicated to handle one security level at a time. All users must be certified to that security clearance.<br \/>\nB. Unclassified &#8211; Information that can be released to individuals without a clearance<br \/>\n<span style=\"color: #ff6600;\">C. Compartmented &#8211;\u00a0 ???<\/span><br \/>\n<strong>D. Multistate &#8211; Systems are certified to handle multiple security levels simultaneously by using specialized security mechanisms.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h4>46. Kyle is being granted access to a military computer system that uses System High mode.\u00a0 What is not true about Kyle&#8217;s security clearance requirements?<\/h4>\n<p>A. Each user must have a clearance for the highest level of classification processed by the system regardless of his access.<br \/>\nB. Each user must have access approval for all information processed by the system.<br \/>\nC. Each user must have a valid need to know for some information processed by the system but notnecessarily all information processed by the system.<br \/>\n<strong>D. Each user must have a valid security clearance.<\/strong><\/p>\n<p>Hint: A valid security clearance could be anything.<\/p>\n<p>&nbsp;<\/p>\n<h4>47. Gary intercepted a communication between two individuals and suspects that they are exchanging secret messages.\u00a0 The content of the communications appears to be the image shown here.\u00a0 What type of technique may the individuals use to hide messages inside this image?<\/h4>\n<p>A. Visual cryptography &#8211; Encrypting an image into <strong>multiple<\/strong> images such that each sub image is required to reconstruct the original image.<br \/>\n<strong>B. Steganography &#8211; the practice of concealing a file, message, image, or video within another file, message, image, or video.<\/strong><br \/>\nC. Cryptographic hashing &#8211; a string of random-looking characters that uniquely identifies the data in question. One way, used to validate the contents of a file.<br \/>\nD. Transport layer security &#8211; (TLS) a protocol that provides communication security between client\/server applications that communicate with each other over the Internet.<\/p>\n<p>&nbsp;<\/p>\n<p>48. Which of the following terms accurately describes the Caesar cipher?<\/p>\n<p>ABCDEFGHI J KLMNOPQRSTUVWXYZ<br \/>\nCDEFGHI J KLMNOPQRSTUVWXYZAB<br \/>\nHAIL CEASAR<br \/>\nJCKN EGCUCT<\/p>\n<p>A. Transposition cipher &#8211; a system of changing the positions of plain text.<br \/>\nB. Block cipher &#8211; Using a set key length to transpose blocks of similar length. These new blocks can then be used as keys to further encrypt additional blocks.<br \/>\n<strong>C. Shift cipher &#8211; Substitute each character for one x positions away.<\/strong><br \/>\nD. <span style=\"color: #ff6600;\">Strong cipher &#8211; Difficult to crack?<\/span><\/p>\n<p>Transposition example: WE ARE DISCOVERED FLEE AT ONCE<br \/>\nRail cypher:<\/p>\n<pre>W . . . E . . . C . . . R . . . L . . . T . . . E\r\n. E . R . D . S . O . E . E . F . E . A . O . C .\r\n. . A . . . I . . . V . . . D . . . E . . . N . .<\/pre>\n<pre>WECRL TEERD SOEEF EAOCA IVDEN<\/pre>\n<p>Route cypher:<\/p>\n<pre>W R I O R F E O E \r\nE E S V E L A N J \r\nA D C E D E T C X \r\n<\/pre>\n<pre>EJXCTEDEC DAEWRIORF EONALEVSE\r\n<\/pre>\n<p>&nbsp;<\/p>\n<h4>49. In the ring protection model shown here, what ring contains the operating system&#8217;s kernel?<\/h4>\n<p><a href=\"http:\/\/wiki.thomasandsofia.com\/wp-content\/uploads\/2020\/03\/Screenshot-from-2020-03-21-13-29-37.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2574\" src=\"http:\/\/wiki.thomasandsofia.com\/wp-content\/uploads\/2020\/03\/Screenshot-from-2020-03-21-13-29-37.png\" alt=\"\" width=\"321\" height=\"318\" srcset=\"https:\/\/wiki.thomasandsofia.com\/wp-content\/uploads\/2020\/03\/Screenshot-from-2020-03-21-13-29-37.png 321w, https:\/\/wiki.thomasandsofia.com\/wp-content\/uploads\/2020\/03\/Screenshot-from-2020-03-21-13-29-37-150x150.png 150w, https:\/\/wiki.thomasandsofia.com\/wp-content\/uploads\/2020\/03\/Screenshot-from-2020-03-21-13-29-37-300x297.png 300w\" sizes=\"auto, (max-width: 321px) 100vw, 321px\" \/><\/a><\/p>\n<p>A. Ring 3<br \/>\nB. Ring 2<br \/>\nC. Ring 1<br \/>\n<strong>D. Ring 0<\/strong><\/p>\n<ul>\n<li>Ring 0: OS Kernel\/Memory\n<ul>\n<li>Supervisory (Privileged) mode<\/li>\n<\/ul>\n<\/li>\n<li>Ring 1: Other OS components\n<ul>\n<li>Supervisory (Privileged) mode<\/li>\n<\/ul>\n<\/li>\n<li>Ring 2: Drivers, Protocols, etc.\n<ul>\n<li>Supervisory (Privileged) mode<\/li>\n<\/ul>\n<\/li>\n<li>Ring 4: User-Level programs and applications\n<ul>\n<li>User mode<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4>50. In an infrastructure as a service (IaaS) environment where a vendor supplies a customer with access to storage services, who is normally responsible for removing sensitive data from the drives that are taken out of service?<\/h4>\n<p>A. Customer&#8217;s security team<br \/>\nB. Customer&#8217;s storage team<br \/>\nC. Customer&#8217;s vendor management team<br \/>\n<strong>D. Vendor<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>https:\/\/quizlet.com\/167611061\/cissp-practice-questions-flash-cards\/ 25 What logical operation is described by the truth table shown here? Input 1 Input 2 Output 0 0 0 0 1 1 1 0 1 1 1 0 &nbsp; A. OR B. AND C. XOR D. NOR 26. How many bits of keying material does the Data Encryption Standard (DES) use for encrypting ..<\/p>\n<div class=\"clear-fix\"><\/div>\n<p><a href=\"https:\/\/wiki.thomasandsofia.com\/?p=2558\" title=\"read more...\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[54],"tags":[],"class_list":["post-2558","post","type-post","status-publish","format-standard","hentry","category-cissp"],"_links":{"self":[{"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=\/wp\/v2\/posts\/2558","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2558"}],"version-history":[{"count":13,"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=\/wp\/v2\/posts\/2558\/revisions"}],"predecessor-version":[{"id":2575,"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=\/wp\/v2\/posts\/2558\/revisions\/2575"}],"wp:attachment":[{"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2558"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2558"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}