Post-Class Quiz: Access Control Domain

Similar documents
90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

Protecting Information Assets - Week 10 - Identity Management and Access Control. MIS 5206 Protecting Information Assets

CompTIA Security+ (Exam SY0-401) Course 01 Security Fundamentals

EXAM - CAS-002. CompTIA Advanced Security Practitioner (CASP) Exam. Buy Full Product.

CS 356 Lecture 7 Access Control. Spring 2013

SECURITY PLAN DRAFT For Major Applications and General Support Systems

Full file at

Access Controls. CISSP Guide to Security Essentials Chapter 2

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

ISO/IEC Common Criteria. Threat Categories

Information Security Policy

Security Architecture

University of Sunderland Business Assurance PCI Security Policy

Security Policies and Procedures Principles and Practices

The Common Controls Framework BY ADOBE

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

(2½ hours) Total Marks: 75

HIPAA Compliance Checklist

Juniper Vendor Security Requirements

jk0-022 Exam Questions Demo CompTIA Exam Questions jk0-022

Operating systems and security - Overview

Operating systems and security - Overview

the SWIFT Customer Security

SECURITY & PRIVACY DOCUMENTATION

QuickBooks Online Security White Paper July 2017

CompTIA Security+(2008 Edition) Exam

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 10 Authenticating Users

CompTIA JK CompTIA Academic/E2C Security+ Certification. Download Full Version :

IBM Security Identity Manager Version Planning Topics IBM

A Security Admin's Survival Guide to the GDPR.

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC

SDR Guide to Complete the SDR

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Radius, LDAP, Radius, Kerberos used in Authenticating Users

State of Colorado Cyber Security Policies

CNIT 125: Information Security Professional (CISSP Preparation) Ch 6. Identity and Access Management

NIST Revision 2: Guide to Industrial Control Systems (ICS) Security

CSN11111 Network Security

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals

BOR3307: Intro to Cybersecurity

Secure Access & SWIFT Customer Security Controls Framework

COPYRIGHTED MATERIAL. Chapter. Accountability and Access Control THE CISSP EXAM TOPICS COVERED IN THIS CHAPTER INCLUDE:

Exam : Title : Security Solutions for Systems Engineers(SSSE) Version : Demo

Information Security in Corporation

ISC2. Exam Questions CISSP. Certified Information Systems Security Professional (CISSP) Version:Demo

Question: 1 DES - Data Encryption standard has a 128 bit key and is very difficult to break.

Top-Down Network Design


PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Chapter 12 Databases and Database Management Systems

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.

Software Development & Education Center Security+ Certification

Introduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview

Chapter 9: Database Security: An Introduction. Nguyen Thi Ai Thao

Hosted Testing and Grading

Security+ SY0-501 Study Guide Table of Contents

Introduction. Controlling Information Systems. Threats to Computerised Information System. Why System are Vulnerable?

ISSP Network Security Plan

Out-of-Band Management

Comptia.Certkey.SY0-401.v by.SANFORD.362q. Exam Code: SY Exam Name: CompTIA Security+ Certification Exam

ISC2 EXAM - SSCP. Systems Security Certified Practitioner. Buy Full Product.

Daxko s PCI DSS Responsibilities

POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND. October Table of Contents

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Network Security and Cryptography. 2 September Marking Scheme

Internal Audit Report DATA CENTER LOGICAL SECURITY

Xerox Audio Documents App

1. Federation Participant Information DRAFT

ISSUE N 1 MAJOR MODIFICATIONS. Version Changes Related Release No. PREVIOUS VERSIONS HISTORY. Version Date History Related Release No.

Information Technology Standard for PCI systems Syracuse University Information Technology and Services PCI Network Security Standard (Appendix 1)

ISO27001 Preparing your business with Snare

Security Requirements for Crypto Devices

Identity, Authentication and Authorization. John Slankas

CIS Controls Measures and Metrics for Version 7

Cloud Computing Lectures. Cloud Security

GDPR Draft: Data Access Control and Password Policy

GISF. GIAC Information Security Fundamentals.

A. The portal will function as an identity provider and issue an authentication assertion

Verteilte Systeme (Distributed Systems)

Instructor: Jinze Liu. Fall 2008

CIS Controls Measures and Metrics for Version 7

Cloud Computing. Faculty of Information Systems. Duc.NHM. nhmduc.wordpress.com

General Access Control Model for DAC

تاثیرفناوری اطالعات برسازمان ومدیریت جلسه هشتم و نهم

Security Information & Policies

FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Computer Security: Principles and Practice

Intruders, Human Identification and Authentication, Web Authentication

CIS Top 20 #13 Data Protection. Lisa Niles: CISSP, Director of Solutions Integration

CompTIA Security+ E2C (2011 Edition) Exam.

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

Information Technology General Control Review

Jérôme Kerviel. Dang Thanh Binh

E-Commerce Security Pearson Prentice Hall, Electronic Commerce 2008, Efraim Turban, et al.

Information Security for Mail Processing/Mail Handling Equipment

University of Pittsburgh Security Assessment Questionnaire (v1.7)

Transcription:

1. In order to perform data classification process, what must be present? A. A data classification policy. B. A data classification standard. C. A data classification procedure. D. All of the above. 2. What are the three types of access control? A. Administrative, physical, and technical B. Identification, authentication and authorization C. Mandatory, discretionary, and least privilege D. Access, management, and monitoring 3. Tokens, smart cards, and one-time password are using in what type of authentication? A. Something the subject knew B. Something the subject has C. Something the subject is D. None of the above. 4. In biometrics, the intersection of Type I Error Rate (False Rejection) and Type II Error Rate (False Acceptance) is called? A. Crossover Error Rate (CER) B. Intercept Error Rate (IER) C. Sensitivity and Error Ratio (SER) D. Complexity Ratio 5. Which of the following refers to a series of characters used to verify a user s identity? A. Token serial number B. Userid C. Password D. Security ticket CISSP CBK Review Page 1

6. Company X would like to place an in-line control devices that actively monitors the network traffic for anomalies and enforces access control to prevent distributed denial of service (DDoS) attacks in real-time. What type of device is this? A. Intrusion Prevention System (IPS) B. Intrusion Detection System (IDS) C. Firewall D. Router ACL 7. What type of access control allows owners to specify who can access their files? A. Mandatory B. Discretionary C. Relational D. Administrative 8. What is the best type of authentication that prevents session hijacking? A. Robust B. Dongles C. Continuous D. Tokens 9. Which of the following access control types gives UPDATE privileges on Structured Query Language (SQL) database objects to specific users or groups? A. Supplemental B. Discretionary C. Mandatory D. System 10. Role-based access control. A. is unique to mandatory access control B. is independent of owner input C. is based on user s job functions D. can be compromised by inheritance CISSP CBK Review Page 2

11. A major disadvantage of single sign-on (SSO) is: A. Consistent time-out enforcement across platforms B. A compromised password exposes all authorized resources C. Use of multiple passwords to remember D. Password change control 12. Programmed procedures, which ensure that valid transactions are processed accurately and only once in the current timescale, are referred to as? A. Data installation controls. B. Application controls. C. Operation controls. D. Physical controls. 13. Which of the following distinguishes misuse detection from intrusion detection? A. The perpetrator has no valid accounts on any of the systems in the network. B. It uses statistical measures to detect unusual behavior. C. The perpetrator has at least one valid account on one of the systems in the network. D. It uses a collection of known attacks to detect intrusion. 14. The three primary methods for authentication of a user to a system or network are? A. Passwords, tokens, and biometrics. B. Authorization, identification, and tokens. C. Passwords, encryption, and identification. D. Identification, encryption, and authorization. 15. Which one of the following can be identified when exceptions occur using operations security detective controls? A. Unauthorized people seeing printed confidential reports B. Unauthorized people destroying confidential reports C. Authorized operations people performing unauthorized functions D. Authorized operations people not responding to important console messages CISSP CBK Review Page 3

16. Why do vendors publish MD5 hash values when they provide software patches for their customers to download from the Internet? A. Recipients can verify the software s integrity after downloading. B. Recipients can confirm the authenticity of the site from which they are downloading the patch. C. Recipients can request future updates to the software by using the assigned hash value. D. Recipients need the hash value to successfully activate the new software. 17. An access system that grants users only those rights necessary for them to perform their work is operating on which security principle? A. Discretionary Access B. Least Privilege C. Mandatory Access D. Separation of Duties 18. Three principal schemes that provide a framework for managing access control are A. Discretionary Access Control (DAC), Mandatory Access Control (MAC), and Role Based Access Control (RBAC). B. Discretionary Access Control (DAC), Mandatory Access Control (MAC), and Layer Based Access Protocol (LBAP). C. Mandatory Access Control (MAC), Layer Based Access Protocol (LBAP), and Target Based Access Protocol (TBAP). D. Role Based Access Control (RBAC), Layer Based Access Protocol (LBAP), and Target Based Access Protocol (TBAP). 19. In terms of access control, separation of duties means A. A process is designed so that separate steps must be performed by different people. B. The critical task requires two people to complete. C. A policy that limits both the system s user and processes to access only those resources necessary to perform assigned functions. D. A business process that forces employees to take mandatory vacation. 20. What determines the assignment of data classifications in a mandatory access control philosophy? CISSP CBK Review Page 4

A. The analysis of the users in conjunction with the audit department B. The assessment by the information security department C. The user s evaluation of a particular information element D. The requirement of the organization s published security policy 21. In mandatory access control who determines the need-to-know? A. Information owner and system B. Information owner C. Subject and label D. System 22. Which one of the following can be used to increase the authentication strength of access control? A. Multi-party B. Two factor C. Mandatory D. Discretionary 23. Granularity is the level of detail to which? A. A trusted system can authenticate users. B. Imperfections of a trusted system can be measured. C. An access control system can be adjusted. D. Packets can be filtered. 24. Which of the following does a digital signature provide? A. It provides the ability to encrypt an individual s confidential data. B. It ensures an individual s privacy. C. It identifies the source and verifies the integrity of data. D. It provides a framework for law and procedures. 25. Separation of duties should be? A. Enforced in all organizational areas. B. Cost justified for the potential for loss. CISSP CBK Review Page 5

C. Enforced in the program testing phase of application development. D. Determined by the availability of trained staff. 26. What common attack can be used against a system that stores one-way encrypted passwords if a copy of the password file can be obtained? A. Birthday attack B. Dictionary attack C. Plaintext attack D. Smurf attack 27. When establishing a violation tracking and analysis process, which one of the following parameters is used to keep the quantity of data to manageable levels? A. Quantity baseline B. Maximum log size C. Circular logging D. Clipping levels 28. The accounting branch of a large organization requires an application to process expense vouchers. Each voucher must be input by one of many accounting clerks, verified by the clerk s applicable supervisor, then reconciled by an auditor before the reimbursement check is produced. Which access control technique should be built into the application to BEST serve these requirements? A. Mandatory Access Control (MAC) B. Password Security C. Role-based Access Control (RBAC) D. Terminal Access Controller Access System (TACACS) 29. What principle recommends the division of responsibilities so that one person cannot commit an undetected fraud? A. Separation of duties B. Mutual exclusion C. Need to know D. Least privilege 30. What is the best method of storing user passwords for a system? CISSP CBK Review Page 6

A. Password-protected file B. File restricted to one individual C. One-way encrypted file D. Two-way encrypted file 31. What role does biometrics have in logical access control? A. Certification B. Authorization C. Authentication D. Confirmation 32. What best describes two-factor authentication? A. Something you know B. Something you have C. Something you are D. A combination of two listed above 33. What are the five categories of access control? A. Detective, preventive, corrective, recovery, and directive B. Detective, corrective, monitoring, logging, and classification C. Authorization, authentication, identification, confidentiality, and integrity. D. Identification, authentication, least-privilege, need-to-know, and separation-ofduties. 34. Which of the following is not an issue for recording audit trail of system activities? A. Control of event details to manage data volume. B. Access control and preservation of audit logs in storage and archive. C. Training of personnel to identify non-conformance or illegal activitess. D. Define organizational policy for audit records. 35. An act of verifying and validating the system against a set of specified security requirements is called? A. A security audit CISSP CBK Review Page 7

B. A vulnerability assessment C. Penetration test D. System test. CISSP CBK Review Page 8