Appendix A Answers to Assessment Questions
1. |
Which of the following choices is an incorrect description of a control?
|
|
2. |
Which of the following statements is accurate about the reasons to implement a layered security architecture?
|
|
3. |
Which of the following choices represents an application or system demonstrating a need for a high level of confidentiality protection and controls?
|
|
4. |
Which of the following choices is not a concern of policy development at the high level?
|
|
5. |
Which of the following choices is not an accurate statement about the visibility of IT security policy?
|
|
6. |
Which of the following statements is not accurate regarding the process of risk assessment?
|
|
7. |
Which of the following choices would not be considered an element of proper user account management?
|
|
8. |
Which of the following choices is not one of NIST’s 33 IT security principles?
|
|
9. |
How often should an independent review of the security controls be performed, according to OMB Circular A-130?
|
|
10. |
Which of the following choices best describes the difference between the System Owner and the Information Owner?
|
|
11. |
Which of the following choices is not a generally accepted benefit of security awareness, training, and education?
|
|
12. |
Who has the final responsibility for the preservation of the organization’s information?
|
|
13. |
Which of the following choices is not an example of an issue-specific policy?
|
|
14. |
Which of the following statements is not true about security awareness, training, and educational programs?
|
|
15. |
Which of the following choices is an accurate statement about standards?
|
|
16. |
Which of the following choices is a role of the Information Systems Security Officer?
|
|
17. |
Which of the following statements is not correct about safeguard selection in the risk analysis process?
|
|
18. |
Which of the following choices is usually the number-one used criterion to determine the classification of an information object?
|
|
19. |
What are high-level policies?
|
|
20. |
Which policy type is most likely to contain mandatory or compulsory standards?
|
|
21. |
What does an Exposure Factor (EF) describe?
|
|
22. |
What is the most accurate definition of a safeguard?
|
|
23. |
Which choice most accurately describes the differences between standards, guidelines, and procedures?
|
|
24. |
What are the detailed instructions on how to perform or implement a control called?
|
|
25. |
How is an SLE derived?
|
|
26. |
What are noncompulsory recommendations on how to achieve compliance with published standards called?
|
|
27. |
Which group represents the most likely source of an asset loss through inappropriate computer use?
|
|
28. |
Which choice most accurately describes the difference between the role of a data owner and the role of a data custodian?
|
|
29. |
What is an ARO?
|
|
30. |
Which formula accurately represents an Annualized Loss Expectancy (ALE) calculation?
|
|
31. |
Which of the following assessment methodologies below is a self-guided assessment implemented in a series of short workshops focusing on key organizational areas and conducted in three phases?
|
|
32. |
Which of the following assessment methodologies was developed by the National Security Agency to assist both assessment suppliers and consumers?
|
|
Answers
1. |
Answer: b The other three answers are correct descriptions of controls. |
2. |
Answer: c Security designs should consider a layered approach to increase the work-factor an attacker must expend to successfully attack the system. |
3. |
Answer: b Although elements of all the systems described could require specific controls for confidentiality, given the descriptions above, system b fits the definition most closely of a system requiring a very high level of confidentiality. Answer a is an example of a system requiring high availability. Answer c is an example of a system that requires medium integrity controls. Answer d is a system that requires only a low level of confidentiality. |
4. |
Answer: b Answers a, c, and d are elements of policy development at the highest level. Key business resources would have been identified during the risk assessment process. The various roles are then defined to determine the various levels of access to those resources. Answer d is the final step in the policy creation process and combines steps a and c. It determines which group gets access to each resource and what access privileges its members are assigned. Access to resources should be based on roles, not on individual identity. |
5. |
Answer: a The other three answers are correct statements about the visibility of IT security policy. |
6. |
Answer: d Risk assessment is the first process in the risk management methodology. |
7. |
Answer: a The other answers are elements of proper user account management. |
8. |
Answer: c Risk can never be totally eliminated. NIST IT security principle 4 states: “Reduce risk to an acceptable level.” |
9. |
Answer: b OMB Circular A-130 requires that a review of the security controls for each major government application be performed at least every three years. |
10. |
Answer: b A single system may utilize information from multiple Information Owners. |
11. |
Answer: c The other answers are generally accepted benefits of security awareness, training, and education. |
12. |
Answer: b Senior management has the final responsibility through due care and due diligence to preserve the capital of the organization and further its business model through the implementation of a security program. Although senior management does not have the functional role of managing security procedures, it has the ultimate responsibility to see that business continuity is preserved. |
13. |
Answer: c Answer c is an example of a system-specific policy - in this case the router’s access control lists. The other three answers are examples of issue-specific policy, as defined by NIST. |
14. |
Answer: b The other answers are correct statements about security awareness, training, and educational programs. |
15. |
Answer: c Answers a, b, and d describe policies. Procedures, standards, and guidelines are used to describe how these policies will be implemented within an organization. |
16. |
Answer: b Answer a is a responsibility of senior management. Answer c is a description of the role of auditing. Answer d is the role of the user, or consumer, of security in an organization. |
17. |
Answer: b Performing a cost-benefit analysis of the proposed safeguard before implementation is vital. The level of security afforded could easily fail to outweigh the cost of a proposed safeguard. Other factors need to be considered in the safeguard selection process, such as accountability, auditability, and the level of manual operations needed to maintain or operate the safeguard. |
18. |
Answer: a Value of the information asset to the organization is usually the first and foremost criterion used in determining its classification. |
19. |
Answer: c. High-level policies are senior management statements of recognition of the importance of security controls to the mission of the organization. |
20. |
Answer: c Answer b (advisory policies) might specify penalties for noncompliance, but regulatory policies are required to be followed by the organization. Answers a and d are informational or recommended policies only. |
21. |
Answer: c Answer a is an SLE, b is an ARO, and d is an ALE. |
22. |
Answer: c Answer a is a guideline, b is a procedure, and d is a distracter. |
23. |
Answer: d The other answers are incorrect. |
24. |
Answer: a |
25. |
Answer: b. A Single Loss Expectancy is derived by multiplying the Asset Value by its Exposure Factor. The other answers do not exist. |
26. |
Answer: c |
27. |
Answer: c Internal personnel far and away constitute the largest amount of dollar loss due to unauthorized or inappropriate computer use. |
28. |
Answer: a |
29. |
Answer: c Answer a is the definition of SLE, b is an ALE, and d is an EF. |
30. |
Answer: a Answer b is the formula for an SLE, and answers c and d are nonsense. |
31. |
Answer: b Carnegie Mellon University’s Software Engineering Institute (SEI) created the Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE). OCTAVE is a self-guided assessment implemented in a series of short workshops focusing on key organizational areas. It is conducted in three phases:
|
32. |
Answer: d The INFOSEC Assessment Methodology (IAM) is a detailed and systematic way of examining cyber vulnerabilities that was developed by the National Security Agency to assist both INFOSEC assessment suppliers and consumers requiring assessments. The IAM examines the mission, organization, security policies and programs, and information systems and the threat to these systems. |
1. |
The goals of integrity do not include:
|
|
2. |
Kerberos is an authentication scheme that can be used to implement:
|
|
3. |
The fundamental entity in a relational database is the:
|
|
4. |
In a relational database, security is provided to the access of data through:
|
|
5. |
In biometrics, a one-to-one search to verify an individual’s claim of an identity is called:
|
|
6. |
Biometrics is used for identification in the physical controls and for authentication in the:
|
|
7. |
Referential integrity requires that for any foreign key attribute, the referenced relation must have:
|
|
8. |
A password that is the same for each logon is called a:
|
|
9. |
Which one of the following is not an access attack?
|
|
10. |
An attack that uses a detailed listing of common passwords and words in general to gain unauthorized access to an information system is best described as:
|
|
11. |
A statistical anomaly–based intrusion detection system:
|
|
12. |
Which one of the following definitions best describes system scanning?
|
|
13. |
In which type of penetration test does the testing team have access to internal system code?
|
|
14. |
A standard data manipulation and relational database definition language is:
|
|
15. |
An attack that can be perpetrated against a remote user’s callback access control is:
|
|
16. |
The definition of CHAP is:
|
|
17. |
Using symmetric-key cryptography, Kerberos authenticates clients to other entities on a network and facilitates communications through the assignment of:
|
|
18. |
Three things that must be considered for the planning and implementation of access control mechanisms are:
|
|
19. |
In mandatory access control, the authorization of a subject to have access to an object is dependent upon:
|
|
20. |
The type of access control that is used in local, dynamic situations where subjects have the ability to specify what resources certain users can access is called:
|
|
21. |
Role-based access control is useful when:
|
|
22. |
Clipping levels are used to:
|
|
23. |
Identification is:
|
|
24. |
Authentication is:
|
|
25. |
An example of two-factor authentication is:
|
|
26. |
In biometrics, a good measure of the performance of a system is the:
|
|
27. |
In finger scan technology:
|
|
28. |
An acceptable biometric throughput rate is:
|
|
29. |
Which one of the following is not a type of penetration test?
|
|
30. |
Object-Oriented Database (OODB) systems:
|
|
31. |
A minimally configured information entry and retrieval device that relies on a remote server for its primary processing, security, storage, and printing functions is called a:
|
|
Answers
1. |
Answer: a Accountability is holding individuals responsible for their actions. Answers b, c, and d are the three goals of integrity. |
2. |
Answer: d Kerberos is a third-party authentication protocol that can be used to implement SSO. Answer a is incorrect because public-key cryptography is not used in the basic Kerberos protocol. Answer b is a public-key-based capability, and answer c is a one-way transformation used to disguise passwords or to implement digital signatures. |
3. |
Answer: b The fundamental entity in a relational database is the relation, in the form of a table. Answer a is the set of allowable attribute values, and answers c and d are distracters. |
4. |
Answer: b Views enable access to data in their underlying tables to be controlled. Candidate keys (answer a) are the set of unique keys from which the primary key is selected. Answer c Joins (answer c) are operations that can be performed on the database, and the attributes (answer d) denote the columns in the relational table. |
5. |
Answer: b Answer b is correct. Answer a is a review of audit system data, usually done after the fact. Answer c is holding individuals responsible for their actions, and answer d is obtaining higher-sensitivity information from a number of pieces of information of lower sensitivity. |
6. |
Answer: c The correct answer is c (logical controls). The other answers are different categories of controls where preventive controls attempt to eliminate or reduce vulnerabilities before an attack occurs; detective controls attempt to determine that an attack is taking place or has taken place; and corrective controls involve taking action to restore the system to normal operation after a successful attack. |
7. |
Answer: a The correct answer is a. Answers b and c are incorrect because a secondary key is not a valid term. Answer d is a distracter because referential integrity has a foreign key referring to a primary key in another relation. |
8. |
Answer: b The correct answer is b. In answer a, the password changes at each logon. A passphrase (answer c) is a long word or phrase that is converted by the system to a password. A one-time pad (answer d) consists of using a random key only once when sending a cryptographic message. |
9. |
Answer: d The correct answer is d, a distracter. A penetration test is conducted to obtain a high level evaluation of a system’s defense or to perform a detailed analysis of the information system’s weaknesses. A penetration test can determine how a system reacts to an attack, whether or not a system’s defenses can be breached, and what information can be acquired from the system. It is performed with the approval of the target organization. |
10. |
Answer: c In a dictionary attack (answer c), a dictionary of common words and passwords are applied to attempt to gain unauthorized access to an information system. In password guessing (answer a), the attacker guesses passwords derived from sources such as notes on the user’s desk, the user’s birthday, a pet’s name, applying social engineering techniques, and so on. Answer b refers to exploiting software vulnerabilities, and answer d, spoofing, is a method used by an attacker to convince an information system that it is communicating with a known, trusted entity. |
11. |
Answer: a A statistical anomaly–based intrusion detection system acquires data to establish a normal system operating profile. Answer b is incorrect because it is used in signature-based intrusion detection. Answer c is incorrect because a statistical anomaly–based intrusion detection system will not detect an attack that does not significantly change the system operating characteristics. Similarly, answer d is incorrect because the statistical anomaly–based IDS is susceptible to reporting an event that caused a momentary anomaly in the system. |
12. |
Answer: d Answer d is correct. Answer a describes a back door attack, answer b is a replay attack, and answer c refers to dumpster diving. |
13. |
Answer: c The correct answer is c, open-box testing. In closed-box testing (answer a), the testing team does not have access to internal system code. The other answers are distracters. |
14. |
Answer: b All answers other than SQL (b) do not apply. |
15. |
Answer: a The correct answer is a. A cracker can have a person’s call forwarded to another number to foil the callback system. Answer b is incorrect because it is an example of malicious code embedded in useful code. Answer c is incorrect because it might enable bypassing controls of a system through a means used for debugging or maintenance. Answer d is incorrect because it is a distracter. |
16. |
Answer: b |
17. |
Answer: b Session keys are temporary keys assigned by the KDC and used for an allotted period of time as the secret key between two entities. Answer a is incorrect because it refers to asymmetric encryption, which is not used in the basic Kerberos protocol. Answer c is incorrect because it is not a key, and answer d is incorrect because a token generates dynamic passwords. |
18. |
Answer: b Threats define the possible source of security policy violations; vulnerabilities describe weaknesses in the system that might be exploited by the threats; and the risk determines the probability of threats being realized. All three items must be present to meaningfully apply access control. Therefore, the other answers are incorrect. |
19. |
Answer: a Mandatory access controls use labels to determine whether subjects can have access to objects, depending on the subjects’ clearances. Answer b, roles, is applied in nondiscretionary access control, as is answer c, tasks. Answer d, identity, is used in discretionary access control. |
20. |
Answer: d Answer d is correct. Answers a and b require strict adherence to labels and clearances. Answer c is a made-up distracter. |
21. |
Answer: b Role-based access control is part of nondiscretionary access control. Answers a, c, and d relate to mandatory access control. |
22. |
Answer: c Clipping levels are used for reducing the amount of data to be evaluated by definition. Answer a is incorrect because clipping levels do not relate to letters in a password. Answer b is incorrect because clipping levels in this context have nothing to do with controlling voltage levels. Answer d is incorrect because they are not used to limit callback errors. |
23. |
Answer: d A user presents an ID to the system as identification. Answer a is incorrect because presenting an ID is not an authentication act. Answer b is incorrect because a password is an authentication mechanism. Answer c is incorrect because it refers to cryptography or authentication. |
24. |
Answer: a Answer a is correct. Answer b is incorrect because it is an identification act. Answer c is incorrect because authentication can be accomplished through the use of a password. Answer d is incorrect because authentication is applied to local and remote users. |
25. |
Answer: c The correct answer is c. These items are something you know and something you have. Answer a is incorrect because essentially, only one factor is being used - something you know (password). Answer b is incorrect for the same reason. Answer d is incorrect because only one biometric factor is being used. |
26. |
Answer: b Answer b is correct. The other items are made-up distracters. |
27. |
Answer: b In finger scan technology, the features extracted from the fingerprint are stored. Answer a is incorrect because the equivalent of the full finger-print is not stored in finger scan technology. Answers c and d are incorrect because the opposite is true of finger scan technology. |
28. |
Answer: c |
29. |
Answer: a The correct answer is a, a distracter. |
30. |
Answer: c Answer c is correct. The other answers are false because for answer a, relational databases are ideally suited to text-only information. For b and d, OODB systems have a steep learning curve and consume a large amount of system resources. |
31. |
Answer: c Answer c is correct. Answers a and b are computing systems with extensive storage and processing capabilities. Answer d is a made up distracter. |
1. |
Which of the following is not an element of a fiber-optic cable?
|
|
2. |
To what does 10Base5 refer?
|
|
3. |
Which of the following LAN transmission methods describes a packet sent from a single source to multiple specific destinations?
|
|
4. |
Which part of the 48-bit, 12-digit hexadecimal number known as the Media Access Control (MAC) address identifies the manufacturer of the network device?
|
|
5. |
Which of the following best describes coaxial cable?
|
|
6. |
Which of the following is not one of the legal IP address ranges specified by RFC1976 and reserved by the Internet Assigned Numbers Authority (IANA) for nonroutable private addresses?
|
|
7. |
Which of the following statements about the difference between analog and digital signals is incorrect?
|
|
8. |
Which of the following most accurately describes SSL?
|
|
9. |
Which IEEE protocol defines wireless transmission in the 5 GHz band with data rates up to 54 Mbps?
|
|
10. |
Which protocol is used to resolve a known IP address to an unknown MAC address?
|
|
11. |
Which TCP/IP protocol operates at the OSI Network Layer?
|
|
12. |
Which statement accurately describes the difference between 802.11b WLAN ad hoc and infrastructure modes?
|
|
13. |
Which of the following is true about the difference between TCP and UDP?
|
|
14. |
Which of the following denotes a packet-switched connectionless wide area network (WAN) technology?
|
|
15. |
Which of the following answers is true about the difference between FTP and TFTP?
|
|
16. |
Which of the following statements is correct regarding VLANs?
|
|
17. |
Which of the following statements about a VPN tunnel is incorrect?
|
|
18. |
Which of the following can create a server-spoofing attack?
|
|
19. |
What is a server cluster?
|
|
20. |
Which of the following attack types does not exploit TCP vulnerabilities?
|
|
21. |
What is probing used for?
|
|
22. |
Which of the following firewall types uses a dynamic state table to inspect the content of packets?
|
|
23. |
To what does logon abuse refer?
|
|
24. |
What type of firewall architecture employs two network cards and a single screening router?
|
|
25. |
To what does covert channel eavesdropping refer?
|
|
26. |
What is one of the most common drawbacks to using a dual-homed host firewall?
|
|
27. |
Which is not a property of a bridge?
|
|
28. |
Which IEEE protocol defines the Spanning Tree protocol?
|
|
29. |
What does the Data Encapsulation in the OSI model do?
|
|
30. |
Which of the following choices is not an element of IPSec?
|
|
31. |
Which of the following network attacks would not be considered a Denial of Service attack?
|
|
32. |
Which statement is not true about the SOCKS protocol?
|
|
33. |
Which of the following choices is not a way to get Windows NT passwords?
|
|
34. |
Which type of routing commonly broadcasts its routing table information to all other routers every minute?
|
|
35. |
A back door into a network refers to what?
|
|
36. |
What is the protocol that supports sending and receiving e-mail?
|
|
37. |
Which of the following protocols does not pertain to e-mail?
|
|
38. |
Which of the following does not relate to analog dial-up hacking?
|
|
39. |
Which of the following is the earliest and the most commonly found Interior Gateway Protocol?
|
|
40. |
What is the Network Layer of the OSI reference model primarily responsible for?
|
|
41. |
Which of the following is not a true statement about Network Address Translation (NAT)?
|
|
42. |
In the DoD reference model, which layer conforms to the OSI Transport Layer?
|
|
43. |
The IP address 178.22.90.1 is considered to be in which class of address?
|
|
44. |
What does TFTP stand for?
|
|
45. |
Which IEEE protocol offers two different protocols to address security issues with 802.11 products?
|
|
46. |
Which new wireless IEEE protocol combines multiple input, multiple output (MIMO) technology with multiple antennas to achieve raw data rates from 100 Mbps to 600 Mbps?
|
|
47. |
Which of the following choices is the best description of bluejacking?
|
|
48. |
Which choice is not a common ability of a keylogger?
|
|
49. |
Which choice is the best description of a spambot?
|
|
Answers
1. |
Answer: b A BNC refers to a Bayonet Neil Concelman RG58 connector for 10Base2. Fiber-optic cable has three basic physical elements: the core, the cladding, and the jacket. The core is the innermost transmission medium, which can be glass or plastic. The next outer layer, the cladding, is also made of glass or plastic, but it has different properties and helps to reflect the light back into the core. The outermost layer, the jacket, provides protection from heat, moisture, and other environmental elements. |
2. |
Answer: b Answer a refers to 10Base2; answer c refers to 10BaseF; and answer d refers to 100BaseT. |
3. |
Answer: b Unicast (answer a) describes a packet sent from a single source to a single destination. Answer c (broadcast) describes a packet sent to all nodes on the network segment. Answer d (anycast) refers to communication between any sender and the nearest of a group of receivers in a network. |
4. |
Answer: a The first three bytes (or first half) of the six-byte MAC address is the manufacturer’s identifier. This can be a good troubleshooting aid if a network device is acting up, because it will isolate the brand of the failing device. The other answers are distracters. |
5. |
Answer: b Coax consists of a hollow outer cylindrical conductor surrounding a single, inner wire conductor. Answer a describes UTP. Answer c is false because coax requires fixed spacing between connections, and answer d describes fiber-optic cable. |
6. |
Answer: b The other three address ranges can be used for Network Address Translation (NAT). Although NAT is, in itself, not a very effective security measure, a large network can benefit from using NAT with Dynamic Host Configuration Protocol (DHCP) to help prevent certain internal routing information from being exposed. The address 127.0.0.1 is called the loopback address. |
7. |
Answer: b The other answers are all properties of analog or digital signals. |
8. |
Answer: d The Secure Sockets Layer (SSL) sits between higher-level application functions and the TCP/IP stack and provides security to applications. It includes a variety of encryption algorithms to secure transmitted data, but the functionality must be integrated into the application. Answer a refers to the Secure/Multipurpose Internet Mail Extension (S/MIME). Most major email clients support S/MIME today. Answer b describes Secure Shell (SSH). Answer c refers to IPSec. IPSec enables security to be built directly into the TCP/IP stack, without requiring application modification. |
9. |
Answer: a IEEE 802.11a specifies high-speed wireless connectivity in the 5 GHz band using Orthogonal Frequency Division Multiplexing with data rates up to 54 Mbps. Answer b, IEEE 802.11b, specifies high-speed wireless connectivity in the 2.4 GHz ISM band up to 11 Mbps. Answer c, IEEE 802.11g, is a proposed standard that offers wireless transmission over relatively short distances at speeds from 20 Mbps up to 54 Mbps and operates in the 2.4 GHz range (and is therefore expected to be backward-compatible with existing 802.11b-based networks). Answer d, IEEE 802.15, defines Wireless Personal Area Networks (WPAN), such as Bluetooth, in the 2.4-2.5 GHz band. |
10. |
Answer: a The Address Resolution Protocol (ARP) sends a broadcast asking for the host with a specified IP address to reply with its MAC, or hardware address. This information is kept in the ARP Cache. The Reverse Address Resolution Protocol (RARP), answer b, is commonly used on diskless machines when the MAC is known but not the IP address. It asks a RARP server to provide a valid IP address, which is somewhat the reverse of ARP. The Internet Control Message Protocol (ICMP), answer c, is a management protocol for IP. The Trivial File Transfer Protocol (TFTP), answer d, is a stripped-down version of the File Transfer Protocol (FTP). |
11. |
Answer: b IP operates at the Network Layer of the OSI model and at the Internet layer of the TCP/IP model. FTP operates at the Application layer of the TCP/IP model, which is roughly similar to the top three layers of the OSI model: the Application, Presentation, and Session Layers. TCP and UDP both operate at the OSI Transport Layer, which is similar to the TCP/IP host-to-host layer. |
12. |
Answer: c Nodes on an IEEE 802.11b wireless LANs can communicate in one of two modes: ad hoc or infrastructure. In ad hoc mode, the wireless nodes communicate directly with each other, without establishing a connection to an access point on a wired LAN. In infrastructure mode, the wireless nodes communicate to an access point, which operates similarly to a bridge or router and manages traffic between the wireless network and the wired network. |
13. |
Answer: a As opposed to the Transmission Control Protocol (TCP), the User Datagram Protocol (UDP) is a connectionless protocol. It does not sequence the packets or acknowledge the receipt of packets and is referred to as an unreliable protocol. |
14. |
Answer: c Switched Multimegabit Data Service (SMDS) is a high-speed, connectionless, packet-switching public network service that extends LAN-like performance to a metropolitan area network (MAN) or a wide area network (WAN). It’s generally delivered over a SONET ring with a maximum effective service radius of around 30 miles. X.25, answer a, defines an interface to the first commercially successful connection-oriented packet-switching network, in which the packets travel over virtual circuits. Frame Relay, answer b, was a successor to X.25 and offers a connection-oriented packet-switching network. Asynchronous Transfer Mode (ATM), answer d, was developed from an outgrowth of ISDN standards and is a fast-packet, connection-oriented, cell-switching technology. |
15. |
Answer: c The Trivial File Transfer Protocol (TFTP) is considered less secure than the File Transfer Protocol (FTP) because authentication does not occur during session establishment. |
16. |
Answer: a A virtual local area network (VLAN) allows ports on the same or different switches to be grouped so that traffic is confined to members of that group only, and it restricts broadcast, unicast, and multicast traffic. Answer b is incorrect because a VLAN is segmented logically, rather than physically. Answer c is incorrect; when a VLAN is implemented with private port, or single-user, switching, it provides fairly stringent security because broadcast vulnerabilities are minimized. Answer d is incorrect, as a closed VLAN authenticates a user to an access control list on a central authentication server, where they are assigned authorization parameters to determine their level of network access. |
17. |
Answer: a IPSec-compatible and non-IPSec compatible devices are used to create VPNs. The other three answers are all ways in which VPNs can be created. |
18. |
Answer: b C2MYAZZ is a utility that enables server spoofing to implement a session hijacking or man-in-the-middle exploit. It intercepts a client LANMAN authentication logon and obtains the session’s logon credentials and password combination transparently to the user. DNS poisoning (answer a) is also known as cache poisoning. It is the process of distributing incorrect IP address information for a specific host with the intent to divert traffic from its true destination. Snort (answer c) is a utility used for network sniffing, is the process of gathering traffic from a network by capturing the data as it passes and storing it to analyze later. Back Orifice 2000 (BO2K), answer d, is an application-level Trojan horse used to give an attacker backdoor network access. |
19. |
Answer: b A server cluster is a group of servers that appears to be a single server to the user. Answer a refers to redundant servers. |
20. |
Answer: c The Ping of Death exploits the fragmentation vulnerability of large ICMP ECHO request packets by sending an illegal packet with more than 65K of data, creating a buffer overflow. A TCP sequence number attack (answer a) exploits the nonrandom predictable pattern of TCP connection sequence numbers to spoof a session. A TCP SYN attack (answer b) is a DoS attack that exploits the TCP three-way handshake. The attacker rapidly generates randomly sourced SYN packets filling the target’s connection queue before the connection can timeout. A land.c attack (answer d) is also a DoS attack that exploits TCP SYN packets. The attacker sends a packet that gives both the source and destination as the target’s address and uses the same source and destination port. |
21. |
Answer: b Probing is a procedure whereby the intruder runs programs that scan the network to create a network map for later intrusion. Answer a is spoofing, answer c is the objective of a DoS attack, and answer d describes passive eavesdropping. |
22. |
Answer: d A stateful-inspection firewall intercepts incoming packets at the Network level and then uses an Inspection Engine to extract state-related information from upper layers. It maintains the information in a dynamic state table and evaluates subsequent connection attempts. A packet-filtering firewall (answer a) is the simplest type of firewall commonly implemented on routers. It operates at the Network layer and offers good performance but is the least secure. An application-level firewall or application-layer gateway (answer b) is more secure because it examines the packet at the Application layer but at the expense of performance. A circuit-level firewall (answer c) is similar to the application-level firewall in that it functions as a proxy server, but it differs in that special proxy application software is not needed. |
23. |
Answer: b Logon abuse entails an otherwise proper user attempting to access areas of the network that are deemed off-limits. Answer a is called network intrusion, and d refers to backdoor remote access. |
24. |
Answer: a Like a dual-homed host, a screened-host firewall uses two network cards to connect to the trusted and untrusted networks, but it adds a screening router between the host and the untrusted network. A dualhomed host (answer b) has two NICs but not necessarily a screening router. A screened-subnet firewall, (answer c) also uses two NICs but has two screening routers with the host acting as a proxy server on its own network segment. One screening router controls traffic local to the network while the second monitors and controls incoming and outgoing Internet traffic. Answer d, application-level proxy, is unrelated to this question. |
25. |
Answer: a A covert channel is a connection intentionally created to transmit unauthorized information from inside a trusted network to a partner at an outside, untrusted node. Answer c is called masquerading. |
26. |
Answer: d A dual-homed host uses two NICs to attach to two separate networks, commonly a trusted network and an untrusted network. It’s important that the internal routing function of the host be disabled to create an Application-layer chokepoint and filter packets. Many systems come with routing enabled by default, such as IP forwarding, which makes the firewall useless. The other answers are distracters. |
27. |
Answer: c A bridge operates at Layer 2 and therefore does not use IP addressing to make routing decisions. |
28. |
Answer: d The 802.1D spanning tree protocol is an Ethernet link-management protocol that provides link redundancy while preventing routing loops. Because only one active path can exist for an Ethernet network to route properly, the STP algorithm calculates and manages the best loop-free path through the network. IEEE 802.5 (answer a) specifies a token-passing ring access method for LANs. IEEE 802.3 (answer b) specifies an Ethernet bus topology using Carrier Sense Multiple Access Control/ Carrier Detect (CSMA/CD). IEEE 802.11 (answer c) is the IEEE standard that specifies 1 Mbps and 2 Mbps wireless connectivity in the 2.4 MHz ISM (Industrial, Scientific, Medical) band. |
29. |
Answer: b Data Encapsulation attaches information from one layer to the packet as it travels from an adjoining layer. The OSI-layered architecture model creates seven layers. The TCP/IP protocol UDP provides best effort packet delivery, and a token-passing transmission scheme creates a deterministic network because it is possible to compute the maximum predictable delay. |
30. |
Answer: b The Layer Two Tunneling Protocol (L2TP) is a protocol that allows a host to establish a virtual connection. Although L2TP - an enhancement to Layer Two Forwarding Protocol (L2F), which supports some features of the Point to Point Tunneling Protocol (PPTP) - may coexist with IPSec, it is not natively an IPSec component. The Authentication Header (AH), answer a, is an authenticating protocol that uses a hash signature in the packet header to validate the integrity of the packet data and the authenticity of the sender. The Security Association (SA), answer c, is a component of the IPSec architecture that contains the information the IPSec device needs to process incoming and outbound IPSec packets. IPSec devices embed a value called the Security Parameter Index (SPI) in the header to associate a datagram with its SA and to store SAs in a Security Association Database (SAD). The Encapsulating Security Payload (ESP), answer d, is an authenticating and encrypting protocol that provides integrity, source authentication, and confidentiality services. |
31. |
Answer: c A brute force attack is an attempt to use all combinations of key patterns to decipher a message. The other three attacks are commonly used to create a Denial of Service (DoS). Ping of Death (answer a) exploits ICMP by sending an illegal ECHO packet of >65K octets of data, which can cause an overflow of system variables and lead to a system crash. SMURF (answer b) is a type of attack using spoofed ICMP ECHO requests to broadcast addresses, which the routers attempt to propagate, congesting the network. Three participants are required for a SMURF attack: the attacker, the amplifying network, and the victim. A TCP SYN flood attack (answer d) generates phony TCP SYN packets from random IP addresses at a rapid rate to fill up the connection queue and stop the system from accepting legitimate users. |
32. |
Answer: b The Encapsulating Security Payload (ESP) is a component of IPSec. Socket Security (SOCKS) is a Transport-layer, secure networking proxy protocol. SOCKS replaces the standard network systems calls with its own calls. These calls open connections to a SOCKS proxy server for client authentication, transparently to the user. Common network utilities, like Telnet or FTP, need to be SOCKS-ified or have their network calls altered to recognize SOCKS proxy calls. |
33. |
Answer: c The /etc/passwd file is a Unix system file. The NT Security Accounts Manager, SAM, contains the usernames and encrypted passwords of all local (and domain, if the server is a domain controller) users. The SAM uses an older, weaker LanManager hash that can be broken easily by tools like L0phtcrack. Physical access to the NT server and the rdisks must be controlled. The “Sam._” file in the repair directory must be deleted after creation of an rdisk. Pwdump and pwdump2 are utilities that allow someone with Administrator rights to target the Local Security Authority Subsystem, isass.exe, from a remote system. |
34. |
Answer: b Distance vector routing uses the Routing Information Protocol (RIP) to maintain a dynamic table of routing information that is updated regularly. It is the oldest and most common type of dynamic routing. Static routing (answer a) defines a specific route in a configuration file on the router and does not require the routers to exchange route information dynamically. Link state routers (answer c) function like distance vector routers but use first-hand information when building routing tables only by maintaining a copy of every other router’s Link State Protocol (LSP) frame. This helps to eliminate routing errors and considerably lessens convergence time. Answer d is a distracter. |
35. |
Answer: b Back doors are very hard to trace, as an intruder will often create several avenues into a network to be exploited later. The only real way to be sure these avenues are closed after an attack is to restore the operating system from the original media, apply the patches, and restore all data and applications. Social engineering (answer a) is a technique used to manipulate users into revealing information like passwords. An undocumented hook into an application to assist programmers with debugging (answer c) is known as a trap door. It serves as a back door into an application rather than a network. Although intended innocently, these can be exploited by intruders. Answer d is a “honey pot” or “padded cell.” A honey pot uses a dummy server with bogus applications as a decoy for intruders. |
36. |
Answer: b Simple Mail Transport Protocol (SMTP) queues and transfers e-mail. SNMP stands for Simple Network Management Protocol. ICMP stands for Internet Control Message Protocol. RARP stands for Reverse Address Resolution Protocol. |
37. |
Answer: c The Challenge Handshake Authentication Protocol (CHAP) is used at the startup of a remote link to verify the identity of a remote node. The Simple Mail Transfer Protocol (RFCs 821 and 1869), answer a, is used by a server to deliver email over the Internet. The Post Office Protocol (RFC 1939), answer b, enables users to read their email by downloading it from a remote server onto their local computer. The Internet Message Access Protocol (RFC 2060), answer d, allows users to read their email on a remote server without downloading the mail locally. |
38. |
Answer: b War walking (or war driving) refers to scanning for 802.11-based wireless network information by either driving or walking with a laptop, a wireless adapter in promiscuous mode, some type of scanning software such as NetStumbler or AiroPeek, and a Global Positioning System (GPS). War dialing (answer a) is a method used to hack into computers by using a software program to automatically call a large pool of telephone numbers to search for those that have a modem attached. Demon dialing, similar to war dialing (answer c) is a tool used to attack one modem using brute force to guess the password and gain access. Tone-Loc (answer d) was one of the first war-dialing tools used by phone phreakers. |
39. |
Answer: a The Routing Information Protocol (RIP) bases its routing path on the distance (number of hops) to the destination. RIP maintains optimum routing paths by sending out routing update messages if the network topology changes. For example, if a router finds that a particular link is faulty, it will update its routing table and then send a copy of the modified table to each of its neighbors. Open Shortest Path First (OSPF), answer b, is a link-state hierarchical routing algorithm intended as a successor to RIP. It features least-cost routing, multipath routing, and load balancing. The Internet Gateway Routing Protocol (IGRP), answer c, is a Cisco protocol that uses a composite metric as its routing metric, including bandwidth, delay, reliability, loading, and maximum transmission unit. The Extensible Authentication Protocol (EAP), answer d, is a general protocol for PPP authentication that supports multiple remote authentication mechanisms. |
40. |
Answer: a Although many routers can perform most of the functions above, the OSI Network Layer is primarily responsible for routing. Bridging (answer b) is a Data Link Layer function. Gateways (answer c) most commonly function at the higher layers. Signal regeneration and repeating (Answer d) are primarily Physical Layer functions. |
41. |
Answer: c Private addresses are not easily routable. |
42. |
Answer: b In the DoD reference model, the Host-to-Host layer parallels the function of the OSI’s Transport Layer. This layer contains the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP). The DoD Process/Application layer, (answer a) corresponds to the OSI’s top three layers: the Application, Presentation, and Session Layers. The DoD Internet layer (answer c) corresponds to the OSI’s Network Layer, and the DoD Network Access layer (answer d) is the equivalent of the Data Link and Physical Layers of the OSI model. |
43. |
Answer: b The class A address range is 1.0.0.0 to 126.255.255.255. The class B address range is 128.0.0.0 to 191.255.255.255. The class C address range is from 192.0.0.0 to 223.255.255.255. The class D address range is 244.0.0.0 to 239.255.255.255 and is used for multicast packets. |
44. |
Answer: c The other acronyms do not exist. |
45. |
Answer: d The 802.11i standard addresses security flaws in 802.11 products and presents an approach offering two different protocols: the TKIP protocol and the CCM protocol (CCMP). |
46. |
Answer: c 802.11n is a new standard operating in the 5GHz range, combining multiple antennas, faster encoding, and an optional doubling of spectrum to achieve raw data rates from 100 Mbps up to 600 Mbps. The standard employs multiple input, multiple output (MIMO) technology to achieve this speed. |
47. |
Answer: c. Bluejacking is a Bluetooth wireless hack that exploits BT’s discover mode to drop code unnoticed on the victim’s unit. |
48. |
Answer: b. A honey pot is configured to interact with potential hackers in such a way as to capture the details of their attacks. The other answers are all common uses for a keylogger. |
49. |
Answer: a A spambot is a program designed to collect, or harvest, e-mail addresses from the Internet in order to build mailing lists for sending spam. Choice b describes a pop-up download. Choice c describes a Trojan horse, and choice d describes a remote access Trojan. |
1. |
The Secure Hash Algorithm (SHA) is specified in the:
|
|
2. |
What does Secure Sockets Layer (SSL)/Transaction Security Layer (TSL) do?
|
|
3. |
What are MD4 and MD5?
|
|
4. |
Elliptic curves, which are applied to public-key cryptography, employ modular exponentiation, which characterizes the:
|
|
5. |
Which algorithm is used in the Clipper Chip?
|
|
6. |
The hashing algorithm in the Digital Signature Standard (DSS) generates a message digest of:
|
|
7. |
The protocol of the Wireless Application Protocol (WAP), which performs functions similar to SSL in the TCP/IP protocol stack, is called the:
|
|
8. |
A Security Parameter Index (SPI) and the identity of the security protocol (AH or ESP) are the components of:
|
|
9. |
When two different keys encrypt a plaintext message into the same ciphertext, this situation is known as:
|
|
10. |
What is the result of the Exclusive Or operation, 1 XOR 0?
|
|
11. |
A block cipher:
|
|
12. |
In most security protocols that support confidentiality, integrity, and authentication:
|
|
13. |
Which of the following is an example of a symmetric-key algorithm?
|
|
14. |
Which of the following is a problem with symmetric-key encryption?
|
|
15. |
Which of the following is an example of an asymmetric-key algorithm?
|
|
16. |
In public-key cryptography:
|
|
17. |
In a hybrid cryptographic system, usually:
|
|
18. |
What is the block length of the Rijndael Cipher?
|
|
19. |
A polyalphabetic cipher is also known as:
|
|
20. |
The classic Caesar cipher is a:
|
|
21. |
In steganography:
|
|
22. |
What is the key length of the Rijndael Block Cipher?
|
|
23. |
In a block cipher, diffusion:
|
|
24. |
The NIST Advanced Encryption Standard uses the:
|
|
25. |
The modes of DES do not include:
|
|
26. |
Which of the following is true?
|
|
27. |
The Rijndael Cipher employs a round transformation that is composed of three layers of distinct, invertible transformations. These transformations are also defined as uniform, which means that every bit of the State is treated the same. Which of the following is not one of these layers?
|
|
28. |
The Escrowed Encryption Standard describes the:
|
|
29. |
Theoretically, quantum computing offers the possibility of factoring the products of large prime numbers and calculating discrete logarithms in polynomial time. These calculations can be accomplished in such a compressed time frame because:
|
|
30. |
Which of the following characteristics does a one-time pad have if used properly?
|
|
31. |
The DES key is:
|
|
32. |
In a digitally signed message transmission using a hash function:
|
|
33. |
The strength of RSA public-key encryption is based on the:
|
|
34. |
Elliptic curve cryptosystems:
|
|
35. |
Which of the following is not a fundamental component of Identity-Based Encryption (IBE)?
|
|
Answers
1. |
Answer: b The correct answer is b. Answer a refers to DES, a symmetric encryption algorithm; answer c is a distracter - there is no such term; answer d is the Advanced Encryption Standard, which has replaced DES and is now the Rijndael algorithm. |
2. |
Answer: a The correct answer is a by definition. Answer b is incorrect because SSL/TLS operates above the Transport Layer; answer c is incorrect because authentication and integrity are provided also, and answer d is incorrect because it cites only confidentiality and SSL/TLS operates above the Transport Layer. |
3. |
Answer: c The correct answer is c. Answers a and b are incorrect because they are general types of encryption systems, and answer d is incorrect because hashing algorithms are not digital certificates. |
4. |
Answer: a The correct answer is a. Modular exponentiation in elliptic curves is the analog of the modular discrete logarithm problem. Answer b is incorrect because prime factors are involved with RSA public-key systems; answer c is incorrect because modular addition in elliptic curves is the analog of modular multiplication; and answer d is incorrect because the knapsack problem is not an elliptic curve problem. |
5. |
Answer: c The correct answer is c. Answers a, b, and d are other symmetric-key algorithms. |
6. |
Answer: b |
7. |
Answer: d The answer d is correct. SSL performs security functions in TCP/IP. The other answers refer to protocols in the WAP protocol stack also, but their primary functions are not security. |
8. |
Answer: b The correct answer is b. The SPI, AH and/or ESP, and the destination IP address are components of an IPSec Security Association (SA). The other answers describe protocols other than IPSec. |
9. |
Answer: c The answer c is correct. Answer a describes a type of cryptographic system using a public and a private key; answer b is the art/science of breaking ciphers; answer d is the conversion of a message of variable length into a fixed-length message digest. |
10. |
Answer: a An XOR operation results in a 0 if the two input bits are identical and a 1 if one of the bits is a 1 and the other is a 0. |
11. |
Answer: d The answer d is correct. Answer a describes a stream cipher; answer b is incorrect because a block cipher applies to symmetric-key algorithms; and answer c describes a hashing operation. |
12. |
Answer: a The answer a is correct. Answer b is incorrect because private-key cryptography does not create digital signatures; answer c is incorrect because DES is a private-key system and, therefore, follows the same logic as in b; and answer d is incorrect because digital signatures are implemented to obtain authentication and integrity. |
13. |
Answer: a The correct answer is a. The other answers are examples of asymmetric-key systems. |
14. |
Answer: d The answer d is correct. Answer a is incorrect because the opposite is true; answer b is incorrect because most symmetric-key algorithms are published; and answer c is incorrect because work factor is a function of key size. The larger the key is, the larger the work factor. |
15. |
Answer: d The answer d is correct. All the other answers refer to symmetric-key algorithms. |
16. |
Answer: d The answer d is correct. Answers a and b are incorrect because if one key encrypts, the other can decrypt. Answer c is incorrect because if the public key encrypts, it cannot decrypt. |
17. |
Answer: b The answer b is correct. Answer a is incorrect because public-key cryptography is usually used for the encryption and transmission of the secret session key. Answer c is incorrect because both public- and private-key encryption are used, and answer d is incorrect because digital certificates can be used (and normally are used). |
18. |
Answer: c The correct answer is c. The other answers with fixed numbers are incorrect. |
19. |
Answer: b The answer b is correct. Answer a is incorrect because a one-time pad uses a random key with length equal to the plaintext message and is used only once. Answer c is the process of sending a message with no indication that a message even exists. Answer d is incorrect because it applies to stream ciphers that are XORed with a random key string. |
20. |
Answer: b The answer b is correct. The Caesar cipher uses one alphabet shifted three places. Answers a and c are incorrect because in a polyalphabetic cipher (answer a), multiple alphabets are used, and in a transposition cipher (answer c), the letters of the message are transposed. Answer d is incorrect because code groups deal with words and phrases and ciphers deal with bits or letters. |
21. |
Answer: d The correct answer is d. The other answers are incorrect because neither algorithm is used. |
22. |
Answer: c |
23. |
Answer: b The answer b is correct. Answer a defines confusion; answer c defines how confusion is accomplished; and answer d is incorrect because it can be accomplished. |
24. |
Answer: b The correct answer is b. By definition, the others are incorrect. |
25. |
Answer: c The correct answer is c. There is no such encipherment mode. |
26. |
Answer: c The answer c is correct. The Meet-in-the-Middle attack has been successfully applied to double DES, and the work factor is equivalent to that of single DES. Thus, answer d is incorrect. Answer a is false because the work factor of triple DES is greater than that for double DES. In triple DES, three levels of encryption and/or decryption are applied to the message. The work factor of double DES is equivalent to the work factor of single DES. Answer b is false because the work factor of single DES is less than for triple DES. |
27. |
Answer: d The answer d is correct. This answer is a distracter and does not exist. |
28. |
Answer: b |
29. |
Answer: b In digital computers, a bit is in either a one or a zero state. In a quantum computer, through linear superposition, a quantum bit can be in both states, essentially simultaneously. Thus, computations consisting of trial evaluations of binary patterns can take place simultaneously in exponential time. The probability of obtaining a correct result is increased through a phenomenon called constructive interference of light, while the probability of obtaining an incorrect result is decreased through destructive interference. Answer a describes optical computing that is effective in applying Fourier and other transformations to data to perform high-speed computations. Light representing large volumes of data passing through properly shaped physical objects can be subjected to mathematical transformations and recombined to provide the appropriate results. However, this mode of computation is not defined as quantum computing. Answers c and d are diversionary answers that do not describe quantum computing. |
30. |
Answer: c If the one-time-pad is used only once and its corresponding key is truly random and does not have repeating characters, it is unbreakable. Answer a is incorrect because if used properly, the one-time-pad should be used only once. Answer b is incorrect because the key should be random. Answer d is incorrect because the key has to be of the same length as the message. |
31. |
Answer: c |
32. |
Answer: a The hash function generates a message digest. The message digest is encrypted with the private key of the sender. Thus, if the message can be opened with the sender’s public key, which is known to all, the message must have come from the sender. The message is not encrypted with the public key because the message is usually longer than the message digest and would take more computing resources to encrypt and decrypt. Because the message digest uniquely characterizes the message, it can be used to verify the identity of the sender. Answers b and d will not work because a message encrypted in the public key of the sender can be read only by using the private key of the sender. Because the sender is the only one who knows this key, no one else can read the message. Answer c is incorrect because the message is not encrypted; the message digest is encrypted. |
33. |
Answer: d The correct answer is d. Answer a applies to public-key algorithms such as Diffie-Hellman and Elliptic Curve. Answer b is incorrect because it is easy to multiply two large prime numbers. Answer c refers to symmetric-key encryption. |
34. |
Answer: a It is more difficult to compute elliptic curve discrete logarithms than conventional discrete logarithms or factoring. Smaller key sizes in the elliptic curve implementation can yield higher levels of security. Therefore, answer b is incorrect. Answers c and d are incorrect because elliptic curve cryptosystems can be used for digital signatures and encryption. |
35. |
Answer: d IBE is based on using an arbitrary string as an individual’s public key. It is based on public-key cryptography; therefore, a symmetric key is not involved in the process. |
1. |
What does the Bell-LaPadula model not allow?
|
|
2. |
In the * (star) security property of the Bell-LaPadula model:
|
|
3. |
The Clark-Wilson model focuses on data’s:
|
|
4. |
The * (star) property of the Biba model states that:
|
|
5. |
Which of the following does the Clark-Wilson model not involve?
|
|
6. |
The Take-Grant model:
|
|
7. |
The Biba model addresses:
|
|
8. |
Mandatory access controls first appear in the Trusted Computer System Evaluation Criteria (TCSEC) at the rating of:
|
|
9. |
In the access control matrix, the rows are:
|
|
10. |
What information security model formalizes the U.S. Department of Defense multilevel security policy?
|
|
11. |
A Trusted Computing Base (TCB) is defined as:
|
|
12. |
Memory space insulated from other running processes in a multiprocessing system is part of a:
|
|
13. |
The boundary separating the TCB from the remainder of the system is called the:
|
|
14. |
The system component that enforces access controls on an object is the:
|
|
15. |
Which one the following is not one of the three major parts of the Common Criteria (CC)?
|
|
16. |
A computer system that employs the necessary hardware and software assurance measures to enable it to process multiple levels of classified or sensitive information is called a:
|
|
17. |
For fault tolerance to operate, a system must be:
|
|
18. |
Which of the following choices describes the four phases of the National Information Assurance Certification and Accreditation Process (NIACAP)?
|
|
19. |
In the Common Criteria, an implementation-independent statement of security needs for a set of IT security products that could be built is called a:
|
|
20. |
The termination of selected, noncritical processing when a hardware or software failure occurs and is detected is referred to as:
|
|
21. |
Which one of the following is not a component of a CC Protection Profile?
|
|
22. |
Content-dependent control makes access decisions based on:
|
|
23. |
The term failover refers to:
|
|
24. |
Primary storage is:
|
|
25. |
In the Common Criteria, a Protection Profile:
|
|
26. |
Context-dependent control uses which of the following to make decisions?
|
|
27. |
The secure path between a user and the Trusted Computing Base (TCB) is called:
|
|
28. |
In a ring protection system, where is the security kernel usually located?
|
|
29. |
Increasing performance in a computer by overlapping the steps of different instructions is called:
|
|
30. |
Random-access memory is:
|
|
31. |
In the National Information Assurance Certification and Accreditation Process (NIACAP), a type accreditation performs which one of the following functions?
|
|
32. |
Processes are placed in a ring structure according to:
|
|
33. |
The MULTICS operating system is a classic example of:
|
|
34. |
What are the hardware, firmware, and software elements of a Trusted Computing Base (TCB) that implement the reference monitor concept called?
|
|
Answers
1. |
Answer: a The answer a is correct. The other options are not prohibited by the model. |
2. |
Answer: c The correct answer is c by definition of the star property. |
3. |
Answer: a The answer a is correct. The Clark-Wilson model is an integrity model. |
4. |
Answer: b |
5. |
Answer: c The answer c is correct. Answers a, b, and d are parts of the Clark-Wilson model. |
6. |
Answer: b |
7. |
Answer: d The answer d is correct. The Biba model is an integrity model. Answer a is associated with confidentiality. Answers b and c are specific to the Clark-Wilson model. |
8. |
Answer: c |
9. |
Answer: d The answer d is correct. Answer a is incorrect because the access control list is not a row in the access control matrix. Answer b is incorrect because a tuple is a row in the table of a relational database. Answer c is incorrect because a domain is the set of allowable values a column or attribute can take in a relational database. |
10. |
Answer: d The answer d is correct. The Bell-LaPadula model addresses the confidentiality of classified material. Answers a and c are integrity models, and answer b is a distracter. |
11. |
Answer: a The answer a is correct. Answer b is the security perimeter. Answer c is the definition of a trusted path. Answer d is the definition of a trusted computer system. |
12. |
Answer: a |
13. |
Answer: d The answer d is correct. Answers a and b deal with security models, and answer c is a distracter. |
14. |
Answer: c |
15. |
Answer: b The correct answer is b, a distracter. Answer a is Part 1 of the CC. It defines general concepts and principles of information security and defines the contents of the Protection Profile (PP), Security Target (ST), and the Package. The Security Functional Requirements, answer c, are Part 2 of the CC, which contains a catalog of well-defined standard means of expressing security requirements of IT products and systems. Answer d is Part 3 of the CC and comprises a catalog of a set of standard assurance components. |
16. |
Answer: c The correct answer is c, by definition of a trusted system. Answers a and b refer to open, standard information on a product as opposed to a closed or proprietary product. Answer d is a distracter. |
17. |
Answer: a The correct answer is a, the two conditions required for a fault-tolerant system. Answer b is a distracter. Answer c is the definition of fail-safe, and answer d refers to starting after a system shutdown. |
18. |
Answer: b |
19. |
Answer: c The answer c is correct. Answer a, ST, is a statement of security claims for a particular IT product or system. A Package, answer b, is defined in the CC as “an intermediate combination of security requirement compo-nents.” A TOE, answer d, is “an IT product or system to be evaluated.” |
20. |
Answer: c |
21. |
Answer: c The answer c is correct. Product-specific security requirements for the product or system are contained in the Security Target (ST). Additional items in the PP are:
|
22. |
Answer: a The answer a is correct. Answer b is context-dependent control. Answers c and d are distracters. |
23. |
Answer: a Failover means switching to a “hot” backup system that maintains duplicate states with the primary system. Answer b refers to fail-safe, and answers c and d refer to fail-soft. |
24. |
Answer: a The answer a is correct. Answer b refers to secondary storage. Answer c refers to virtual memory, and answer d refers to sequential memory. |
25. |
Answer: d The answer d is correct. Answer a is a distracter. Answer b is the product to be evaluated. Answer c refers to TCSEC. |
26. |
Answer: a The answer a is correct. Answer b refers to content-dependent characteristics, and answers c and d are distracters. |
27. |
Answer: b Answer a, trusted distribution, ensures that valid and secure versions of software have been received correctly. Trusted facility management, answer c, is concerned with the proper operation of trusted facilities as well as system administration and configuration. Answer d, the security perimeter, is the boundary that separates the TCB from the remainder of the system. Recall that the TCB is the totality of protection mechanisms within a computer system that are trusted to enforce a security policy. |
28. |
Answer: c |
29. |
Answer: d |
30. |
Answer: d RAM is volatile. The other answers are incorrect because RAM is volatile, randomly accessible, and not programmed by fusible links. |
31. |
Answer: c Answer a is the NIACAP system accreditation. Answer b is the Phase 2 or Verification phase of the Defense Information Technology Security Certification and Accreditation Process (DITSCAP). The objective is to use the SSAA to establish an evolving yet binding agreement on the level of security required before the system development begins or changes to a system are made. After accreditation, the SSAA becomes the baseline security configuration document. Answer d is the NIACAP site accreditation. |
32. |
Answer: a The correct answer is a. A process is placed in the ring that gives it the minimum privileges necessary to perform its functions. |
33. |
Answer: d MULTICS is based on the ring protection architecture. |
34. |
Answer: b |
1. |
Which of the following places the four systems security modes of operation in order, from the most secure to the least?
|
|
2. |
Why is security an issue when a system is booted into single-user mode?
|
|
3. |
An audit trail is an example of what type of control?
|
|
4. |
Which of the following media controls is the best choice to prevent data remanence on magnetic tapes or floppy disks?
|
|
5. |
Which of the following choices is not a security goal of an audit mechanism?
|
|
6. |
Which of the following tasks would normally be a function of the security administrator, not the system administrator?
|
|
7. |
Which of the following is a reason to institute output controls?
|
|
8. |
Which of the following statements is not correct about reviewing user accounts?
|
|
9. |
Which of the following terms most accurately describes the trusted computing base (TCB)?
|
|
10. |
Which of the following statements is accurate about the concept of object reuse?
|
|
11. |
Using prenumbered forms to initiate a transaction is an example of what type of control?
|
|
12. |
Which of the following choices is the best description of operational assurance?
|
|
13. |
Which of the following is not a proper media control?
|
|
14. |
Which of the following choices is considered the highest level of operator privilege?
|
|
15. |
Which of the following choices below most accurately describes a covert storage channel?
|
|
16. |
Which of the following would not be a common element of a transaction trail?
|
|
17. |
Which of the following would not be considered a benefit of employing incident-handling capability?
|
|
18. |
Which of the following is the best description of an audit trail?
|
|
19. |
Which of the following best describes the function of change control?
|
|
20. |
Which of the following is not an example of intentionally inappropriate operator activity?
|
|
21. |
Which book of the Rainbow Series addresses the Trusted Computer System Evaluation Criteria (TCSEC)?
|
|
22. |
Which term best describes the concept of least privilege?
|
|
23. |
Which of the following best describes a threat as defined in the Operations Security domain?
|
|
24. |
Which of the following is not a common element of user account administration?
|
|
25. |
Which of the following is not an example of using a social engineering technique to gain physical access to a secure facility?
|
|
26. |
Which statement about covert channel analysis is not true?
|
|
27. |
“Separation of duties” embodies what principle?
|
|
28. |
Convert Channel Analysis, Trusted Facility Management, and Trusted Recovery are parts of which book in the TCSEC Rainbow Series?
|
|
29. |
How do covert timing channels convey information?
|
|
30. |
Which of the following would be the best description of a clipping level?
|
|
31. |
Which of the following backup methods will probably require the backup operator to use the most number of tapes for a complete system restoration if a different tape is used every night in a five-day rotation?
|
|
32. |
Which level of RAID is commonly referred to as disk mirroring?
|
|
33. |
Which is not a common element of an e-mail?
|
|
34. |
Which of the following choices is the best description of a fax encryptor?
|
|
35. |
Which of the following statements is true about e-mail headers?
|
|
Answers
1. |
Answer: b Dedicated Mode, System-High Mode, Compartmented Mode, and Multilevel Mode |
2. |
Answer: a When the operator boots the system in single-user mode, the user front-end security controls are not loaded. This mode should be used only for recovery and maintenance procedures, and all operations should be logged and audited. |
3. |
Answer: c An audit trail is a record of events to piece together what has happened and allow enforcement of individual accountability by creating a reconstruction of events. They can be used to assist in the proper implementation of the other controls, however. |
4. |
Answer: b Degaussing is recommended as the best method for purging most magnetic media. Answer a is not recommended because the application may not completely overwrite the old data properly. Answer c is a rarely used method of media destruction, and acid solutions should be used in a well-ventilated area only by qualified personnel. Answer d is wrong. |
5. |
Answer: b Answer b is a distracter; the other answers reflect proper security goals of an audit mechanism. |
6. |
Answer: c Reviewing audit data should be a function separate from the day-to-day administration of the system. |
7. |
Answer: b In addition to being used as a transaction control verification mechanism, output controls are used to ensure that output, such as printed reports, is distributed securely. Answer a is an example of change control, c is an example of application controls, and d is an example of recovery controls. |
8. |
Answer: a Reviews can be conducted by, among others, in-house systems personnel (a self-audit), the organization’s internal audit staff, or external auditors. |
9. |
Answer: d The Trusted Computing Base (TCB) represents totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination of which is responsible for enforcing a security policy. Answer a describes the reference monitor concept, answer b refers to a sensitivity label, and answer c describes formal verification. |
10. |
Answer: b Object reuse mechanisms ensure system resources are allocated and assigned among authorized users in a way that prevents the leak of sensitive information, and they ensure that the authorized user of the system does not obtain residual information from system resources. Answer a is incorrect, answer c is incorrect, and answer d refers to authorization: the granting of access rights to a user, program, or process. |
11. |
Answer: b Prenumbered forms are an example of preventative controls. They can also be considered a transaction control and input control. |
12. |
Answer: c Operational assurance is the process of reviewing an operational system to see that security controls, both automated and manual, are functioning correctly and effectively. Operational assurance addresses whether the system’s technical features are being bypassed or have vulnerabilities and whether required procedures are being followed. Answer a is a description of an audit trail review, answer b is a description of a benefit of incident handling, and answer d describes a personnel control. |
13. |
Answer: d Sanitization is the process of removing information from used data media to prevent data remanence. Different media require different types of sanitization. All the others are examples of proper media controls. |
14. |
Answer: c The three common levels of operator privileges, based on the concept of “least privilege,” are:
Answer d is a distracter. |
15. |
Answer: d A covert storage channel typically involves a finite resource (e.g., sectors on a disk) that is shared by two subjects at different security levels. Answer a is a partial description of a covert timing channel, and answer b is a generic definition of a channel. A channel may also refer to the mechanism by which the path is affected. Answer c is a higher-level definition of a covert channel. While a covert storage channel fits this definition generically, answer d is the proper specific definition. |
16. |
Answer: c Why the transaction was processed is not initially a concern of the audit log, but it will be investigated later. The other three elements are all important information that the audit log of the transaction should record. |
17. |
Answer: a The primary benefits of employing an incident-handling capability are containing and repairing damage from incidents and preventing future damage. Answer a is a benefit of employing “separation of duties” controls. |
18. |
Answer: a An audit trail is a set of records that collectively provide documentary evidence of processing used to aid in tracing from original transactions forward to related records and reports and/or backward from records and reports to their component source transactions. Answer b is a description of a multilevel device, and answer c refers to a network reference monitor. Answer d is incorrect because audit trails are detective, and answer d describes a preventative process - access control. |
19. |
Answer: a Answer b describes least privilege, answer c describes record retention, and answer d describes separation of duties. |
20. |
Answer: a Although operator error (answer a) is most certainly an example of a threat to a system’s integrity, it is considered unintentional loss, not an intentional activity. |
21. |
Answer: b |
22. |
Answer: a The least privilege principle requires that each subject in a system be granted the most restrictive set of privileges (or lowest clearance) needed for the performance of authorized tasks. Answer b describes separation of privilege, answer c describes a security level, and answer d is a distracter. |
23. |
Answer: a Answer b describes a vulnerability, answer c describes an asset, and answer d describes risk management. |
24. |
Answer: b For proper separation of duties, the function of user account establishment and maintenance should be separated from the function of initiating and authorizing the creation of the account. User account management focuses on identification, authentication, and access authorizations. |
25. |
Answer: d Answers a, b, and c denote common tactics used by an intruder to gain either physical access or system access. The salami fraud is an automated fraud technique. In the salami fraud, a programmer will create or alter a program to move small amounts of money into his personal bank account. The amounts are intended to be so small as to be unnoticed, such as rounding in foreign currency exchange transactions; hence the name, a reference to slicing a salami. |
26. |
Answer: c Orange Book B2 class systems do not need to be protected from covert timing channels. Covert channel analysis must be performed for B2-level class systems to protect against only covert storage channels. B3 class systems need to be protected from both covert storage channels and covert timing channels. |
27. |
Answer: d Separation of duties means that the operators are prevented from generating and verifying transactions alone, for example. A task might be divided into different smaller tasks to accomplish this, or in the case of an operator with multiple duties, the operator makes a logical, functional job change when performing such conflicting duties. Answer a is need-to-know, answer b is dual-control, and c is job rotation. |
28. |
Answer: b The Red Book (answer a) is the Trusted Network Interpretation (TNI) summary of network requirements (described in the Telecommunications and Network Security domain); the Green Book (answer c) is the Department of Defense (DoD) Password Management Guideline; and the Dark Green Book (answer d) is The Guide to Understanding Data Remanence in Automated Information Systems. |
29. |
Answer: d A covert timing channel alters the timing of parts of the system to enable it to be used to communicate information covertly (outside the normal security function). Answer a is the description of the use of a covert storage channel, answer b is a technique to combat the use of covert channels, and answer c is the Orange Book requirement for B3, B2, and A1 evaluated systems. |
30. |
Answer: a This description of a clipping level is the best. Answer b is not correct because one reason to create clipping levels is to prevent auditors from having to examine every error. Answer c is a common use for clipping levels but is not a definition. Answer d is a distracter. |
31. |
Answer: c Most backup methods use the Archive file attribute to determine whether the file should be backed up. The backup software determines which files need to be backed up by checking to see whether the Archive file attribute has been set and then resets the Archive bit value to null after the backup procedure. The Incremental backup method backs up only files that have been created or modified since the last backup was made because the Archive file attribute is reset. This can result in the backup operator needing several tapes to do a complete restoration, because every tape with changed files as well as the last full backup tape will need to be restored. A full or complete backup (answer a) backs up all files in all directories stored on the server regardless of when the last backup was made and whether the files have already been backed up. The Archive file attribute is changed to mark that the files have been backed up, and the tape or tapes will have all data and applications on it. This is an incorrect answer for this question, however, as it’s assumed that answers b and c will additionally require differential or incremental tapes. The Differential backup method (answer b) backs up only files that have been created or modified since the last backup was made, like an incremental backup. However, the difference between an incremental backup and a differential backup is that the Archive file attribute is not reset after the differential backup is completed; therefore, the changed file is backed up every time the differential backup is run. The backup set grows in size until the next full backup as these files continue to be backed up during each subsequent differential backup. The advantage of this backup method is that the backup operator should need only the full backup and the one differential backup to restore the system. Answer d is a distracter. |
32. |
Answer: b Redundant Array of Inexpensive Disks (RAID) is a method of enhancing hard disk fault tolerance, which can improve performance. RAID 1 maintains a complete copy of all data by duplicating each hard drive. Performance can suffer in some implementations of RAID 1, and twice as many drives are required. Novell developed a type of disk mirroring called disk duplexing, which uses multiple disk controller cards, increasing both performance and reliability. RAID 0 (answer a) gives some performance gains by striping the data across multiple drives but reduces fault tolerance, because the failure of any single drive disables the whole volume. RAID 3 (answer c) uses a dedicated error-correction disk called a parity drive, and it stripes the data across the other data drives. RAID 5 (answer d) uses all disks in the array for both data and error correction, increasing both storage capacity and performance. |
33. |
Answer: c E-mails have three basic parts: attachments, contents, and headers. Both the contents and attachments are areas of vulnerability. |
34. |
Answer: b A fax encryptor is a encryption mechanism that encrypts all fax transmissions at the Data Link layer and helps ensure that all incoming and outgoing fax data is encrypted at its source. |
35. |
Answer: c The header may point back to the hijacked spambot’s mail server. Email headers can be spoofed, fraudulent e-mail not always identified by the headers, and the header doesn’t always point back to the original spammer. |
1. |
What is a data warehouse?
|
|
2. |
What does normalizing data in a data warehouse mean?
|
|
3. |
What is a neural network?
|
|
4. |
A neural network learns by using various algorithms to:
|
|
5. |
The SEI Software Capability Maturity Model is based on the premise that:
|
|
6. |
In configuration management, a configuration item is:
|
|
7. |
In an object-oriented system, polymorphism denotes:
|
|
8. |
The simplistic model of software life cycle development assumes that:
|
|
9. |
What is a method in an object-oriented system?
|
|
10. |
What does the Spiral model depict?
|
|
11. |
In the software life cycle, verification:
|
|
12. |
In the software life cycle, validation:
|
|
13. |
In the modified Waterfall model:
|
|
14. |
Cyclic redundancy checks, structured walk-throughs, and hash totals are examples of what type of application controls?
|
|
15. |
In a system life cycle, information security controls should be:
|
|
16. |
The software maintenance phase controls consist of:
|
|
17. |
In configuration management, what is a software library?
|
|
18. |
What is configuration control?
|
|
19. |
What is searching for data correlations in the data warehouse called?
|
|
20. |
The security term that is concerned with the same primary key existing at different classification levels in the same database is:
|
|
21. |
What is a data dictionary?
|
|
22. |
Which of the following is an example of mobile code?
|
|
23. |
Which of the following is not true regarding software unit testing?
|
|
24. |
The definition “the science and art of specifying, designing, implementing, and evolving programs, documentation, and operating procedures whereby computers can be made useful to people” is that of:
|
|
25. |
In software engineering, the term verification is defined as:
|
|
26. |
The discipline of identifying the components of a continually evolving system for the purposes of controlling changes to those components and maintaining integrity and traceability throughout the life cycle is called:
|
|
27. |
The basic version of the Construction Cost Model (COCOMO), which proposes quantitative life cycle relationships, performs what function?
|
|
28. |
A refinement to the basic Waterfall model that states that software should be developed in increments of functional capability is called:
|
|
29. |
The Spiral model of the software development process uses which of the following metrics relative to the spiral?
|
|
30. |
In the Capability Maturity Model (CMM) for software, the definition “describes the range of expected results that can be achieved by following a software process” is that of:
|
|
Answers
1. |
Answer: b A data warehouse is a repository of information from heterogeneous databases. Answers a and d describe physical facilities for backup and recovery of information systems, and answer c describes a relation in a relational database. |
2. |
Answer: a The correct answer is a, removing redundant data. |
3. |
Answer: d A neural network is a hardware or software system that emulates the functioning of biological neurons. Answer a refers to an expert system, and answers b and c are distracters. |
4. |
Answer: a A neural network learns by using various algorithms to adjust the weights applied to the data. Answers b, c, and d are terminology referenced in expert systems. |
5. |
Answer: c The quality of a software product is a direct function of the quality of its associated software development and maintenance processes. Answer a is false because the SEI Software CMM relates the production of good software to having the proper processes in place in an organization and not to expert programs or heroes. Answer b is false because the Software CMM provides means to measure the maturity of an organization’s software processes. Answer d is false for the same reason as answer b. |
6. |
Answer: b A configuration item is a component whose state is to be recorded and against which changes are to be progressed. Answers a, c, and d are incorrect by the definition of a configuration item. |
7. |
Answer: a Polymorphism refers to objects of many different classes that are related by some common superclass that are able to respond to some common set of operations, defined for the superclass, in different ways depending on their particular subclasses. Answers b, c, and d are incorrect by the definition of polymorphism. |
8. |
Answer: b The simplistic model assumes that each step can be completed and finalized without any effect from the later stages that might require rework. Answer a is incorrect because no iteration is allowed for in the model. Answer c is incorrect because it applies to the modified Waterfall model. Answer d is incorrect because no iteration or reworking is considered in the model. |
9. |
Answer: c A method in an object-oriented system is the code that defines the actions that the object performs in response to a message. Answer a is incorrect because it defines a message. Answer b is a distracter, and answer d refers to multiple inheritance. |
10. |
Answer: a The spiral in the Spiral model incorporates various phases of software development. The other answers are distracters. |
11. |
Answer: d In the software life cycle, verification evaluates the product in development against the specification. Answer a defines validation. Answers b and c are distracters. |
12. |
Answer: a In the software life cycle, validation is the work product satisfying the real-world requirements and concepts. The other answers are distracters. |
13. |
Answer: b The modified Waterfall model was reinterpreted to have phases end at project milestones. Answer a is false because unlimited backward iteration is not permitted in the modified Waterfall model. Answer c is a distracter, and answer d is false because verification and validation are included. |
14. |
Answer: c Cyclic redundancy checks, structured walkthroughs, and hash totals are examples of detective accuracy controls. The other answers do not apply by the definition of the types of controls. |
15. |
Answer: c In the system life cycle, information security controls should be part of the feasibility phase. The other answers are incorrect because the basic premise of information system security is that controls should be included in the earliest phases of the software life cycle and not added later in the cycle or as an afterthought. |
16. |
Answer: a The software maintenance phase controls consist of request control, change control, and release control, by definition. The other answers are, therefore, incorrect. |
17. |
Answer: b In configuration management, a software library is a controlled area, accessible only to approved users who are restricted to the use of approved procedure. Answer a is incorrect because it defines a build list. Answer c is incorrect because it defines a backup storage facility. Answer d is a distracter. |
18. |
Answer: b Configuration control consists of controlling changes to the configuration items and issuing versions of configuration items from the software library. Answer a is the definition of configuration identification. Answer c is the definition of configuration status accounting, and answer d is the definition of configuration audit. |
19. |
Answer: b Searching for data correlations in the data warehouse is called data mining. Answer a is incorrect because data warehousing is creating a repository of information from heterogeneous databases that is available to users for making queries. Answer c is incorrect because a data dictionary is a database for system developers. Answer d is incorrect because configuration management is the discipline of identifying the components of a continually evolving system for the purposes of controlling changes to those components and maintaining integrity and traceability throughout the life cycle. |
20. |
Answer: d The security term that is concerned with the same primary key existing at different classification levels in the same database is polyinstantiation. Answer a is incorrect because polymorphism is defined as objects of many different classes that are related by some common superclass so that any object denoted by this name is able to respond in its own way to some common set of operations. Answer b is incorrect because normalization refers to removing redundant or incorrect data from a database. Answer c is incorrect because inheritance refers to methods from a class inherited by a subclass. |
21. |
Answer: a A data dictionary is a database for system developers. Answers b, c, and d are distracters. |
22. |
Answer: c Examples of mobile code are Java applets and ActiveX controls downloaded into a Web browser from the World Wide Web. Answers a, b, and d are incorrect because they are types of code that are not related to mobile code. |
23. |
Answer: c Live or actual field data are not recommended for use in testing, because they do not thoroughly test all normal and abnormal situations, and the test results are not known beforehand. Answers a, b, and d are true of testing. |
24. |
Answer: b The definition of software engineering in answer b is a combination of popular definitions of engineering and software. One definition of engineering is “the application of science and mathematics to the design and construction of artifacts that are useful to people.” A definition of software is that it “consists of the programs, documentation and operating procedures by which computers can be made useful to people.” Answer a, SA/SD, deals with developing specifications that are abstractions of the problem to be solved and are not tied to any specific programming languages. Thus, SA/SD, through data flow diagrams (DFDs), shows the main processing entities and the data flow between them without any connection to a specific programming language implementation. An object-oriented system (answer c) is a group of independent objects that can be requested to perform certain operations or exhibit specific behaviors. These objects cooperate to provide the system’s required functionality. The objects have an identity and can be created as the program executes (dynamic lifetime). To provide the desired characteristics of object-oriented systems, the objects are encapsulated (i.e., they can be accessed only through messages sent to them to request performance of their defined operations). The object can be viewed as a black box whose internal details are hidden from outside observation and cannot normally be modified. Objects also exhibit the substitution property, which means that objects providing compatible operations can be substituted for each other. In summary, an object-oriented system contains objects that exhibit the following properties:
Answer d, functional programming, uses only mathematical functions to perform computations and solve problems. This approach is based on the assumption that any algorithm can be described as a mathematical function. Functional languages have the characteristics that:
|
25. |
Answer: a In the Waterfall model (W. W. Royce, “Managing the Development of Large Software Systems: Concepts and Techniques,” Proceedings, WESCON, August 1970), answer b defines the term requirements. Similarly, answer c defines the term validation, and answer d is the definition of product design. In summary, the steps of the Waterfall model are:
In this model, each phase finishes with a verification and validation (V&V) task that is designed to eliminate as many problems as possible in the results of that phase. |
26. |
Answer: d Answer d is correct, as is demonstrated in Configuration Management of Computer-Based Systems (British Standards Institution, 1984). Answers a, b, and c are components of the maintenance activity of software life cycle models. In general, one can look at the maintenance phase as the progression from request control, through change control, to release control. Request control (answer b) is involved with the users’ requests for changes to the software. Change control (answer a) involves the analysis and understanding of the existing code, the design of changes, and the corresponding test procedures. Release control (answer c) involves deciding which requests are to be implemented in the new release, performing the changes, and conducting testing. |
27. |
Answer: b The Basic COCOMO Model, set forth in Software Engineering Economics, B. W. Boehm (Prentice-Hall, 1981), proposes two equations that compute the number of man-months and the development schedule in months needed to develop a software product, given the number of thousands of delivered source instructions (KDSI) in the product. In addition, Boehm has developed an intermediate COCOMO Model that takes into account hardware constraints, personnel quality, use of modern tools, and other attributes and their aggregate impact on overall project costs. A detailed COCOMO Model, also by Boehm, accounts for the effects of the additional factors used in the intermediate model on the costs of individual project phases. Answer b describes a function point measurement model that does not require the user to estimate the number of delivered source instructions. The software development effort is determined using the follow-ing five user functions:
These functions are tallied and weighted according to complexity and used to determine the software development effort. Answer c describes the Rayleigh curve applied to software development cost and effort estimation. A prominent model using this approach is the Software Life Cycle Model (SLIM) estimating method. In this method, estimates based on the number of lines of source code are modified by the following two factors:
Answer d is a distracter. |
28. |
Answer: d The advantages of incremental development include the ease of testing increments of functional capability and the opportunity to incorporate user experience into a successively refined product. Answers a, b, and c are distracters. |
29. |
Answer: d The radial dimension represents cumulative cost, and the angular dimension represents progress made in completing each cycle of the spiral. The Spiral model is actually a meta-model for software development processes. A summary of the stages in the spiral is as follows:
Answers a, b, and c are distracters. |
30. |
Answer: b A software process is a set of activities, methods, and practices that are used to develop and maintain software and associated products. Software process capability is a means of predicting the outcome of the next software project conducted by an organization. Software process performance (answer c) is the result achieved by following a software process. Thus, software capability is aimed at expected results while software performance is focused on results that have been achieved. Software process maturity (answer d) is the extent to which a software process is:
Software process maturity, then, provides for the potential for growth in capability of an organization. An immature organization develops software in a crisis mode, usually exceeds budgets and time schedules, and develops software processes in an ad hoc fashion during the project. In a mature organization, the software process is effectively communicated to staff, the required processes are documented and consistent, software quality is evaluated, and roles and responsibilities are understood for the project. Answer a is a distracter, but it is discussed in question 24. |
1. |
Which of the following choices is the first priority in an emergency?
|
|
2. |
Which of the following choices is not considered an appropriate role for senior management in the business continuity and disaster recovery process?
|
|
3. |
Why is it so important to test disaster recovery plans frequently?
|
|
4. |
Which of the following types of tests of disaster recovery/emergency management plans is considered the most cost-effective and efficient way to identify areas of overlap in the plan before conducting more demanding training exercises?
|
|
5. |
Which type of backup subscription service will allow a business to recover quickest?
|
|
6. |
Which of the following represents the most important first step in creating a business resumption plan?
|
|
7. |
What could be a major disadvantage to a mutual aid or reciprocal type of backup service agreement?
|
|
8. |
In developing an emergency or recovery plan, which of the following would not be considered a short-term objective?
|
|
9. |
When is the disaster considered to be officially over?
|
|
10. |
When should the public and media be informed about a disaster?
|
|
11. |
What is the number one priority of disaster response?
|
|
12. |
Which of the following is the best description of the criticality prioritization goal of the Business Impact Assessment (BIA) process?
|
|
13. |
Which of the following most accurately describes a business impact analysis (BIA)?
|
|
14. |
What is considered the major disadvantage to employing a hot site for disaster recovery?
|
|
15. |
Which of the following is not considered an appropriate role for Financial Management in the business continuity and disaster recovery process?
|
|
16. |
Which of the following is the most accurate description of a warm site?
|
|
17. |
Which of the following is not one of the five disaster recovery plan testing types?
|
|
18. |
Which of the following choices is an example of a potential hazard due to a technological event, rather than a human event?
|
|
19. |
Which of the following is not considered an element of a backup alternative?
|
|
20. |
Which of the following choices refers to a business asset?
|
|
21. |
Which of the following statements is not correct regarding the role of the recovery team during the disaster?
|
|
22. |
Which of the following choices is incorrect regarding when a BCP, DRP, or emergency management plan should be evaluated and modified?
|
|
23. |
When should security isolation of the incident scene start?
|
|
24. |
Which of the following is not a recommended step to take when resuming normal operations after an emergency?
|
|
25. |
Which of the following would not be a good reason to test the disaster recovery plan?
|
|
26. |
Which of the following statements is not true about the post-disaster salvage team?
|
|
27. |
Which of the following is the most accurate statement about the results of the disaster recovery plan test?
|
|
28. |
Which statement is true regarding the disbursement of funds during and after a disruptive event?
|
|
29. |
Which statement is true regarding company/employee relations during and after a disaster?
|
|
30. |
Which of the following choices is the correct definition of a Mutual Aid Agreement?
|
|
31. |
Which of the following most accurately describes a business continuity program?
|
|
32. |
Which of the following would best describe a cold backup site?
|
|
33. |
Which of the following would best describe a tertiary site?
|
|
Answers
1. |
Answer: c Life safety, or protecting the health and safety of everyone in the facility, is the first priority in an emergency or disaster. |
2. |
Answer: d The tactical assessment of information security is a role of information management or technology management, not senior management. |
3. |
Answer: b A plan is not considered functioning and viable until a test has been performed. An untested plan sitting on a shelf is useless and might even have the reverse effect of creating a false sense of security. Although the other answers, especially a, are good reasons to test, b is the primary reason. |
4. |
Answer: c In a table-top exercise, members of the emergency management group meet in a conference room setting to discuss their responsibilities and how they would react to emergency scenarios. |
5. |
Answer: a Warm and cold sites require more work after the event occurs to get them to full operating functionality. A mobile backup site might be useful for specific types of minor outages, but a hot site is still the main choice of backup processing site. |
6. |
Answer: b The business resumption, or business continuity plan, must have total, highly visible senior management support. |
7. |
Answer: c The site might not have the capacity to handle the operations required during a major disruptive event. Mutual aid might be a good system for sharing resources during a small or isolated outage, but a major natural or other type of disaster can create serious resource contention between the two organizations, both of which may be affected simultaneously. |
8. |
Answer: d The organization’s strategic plan is considered a long-term goal. |
9. |
Answer: c The disaster is officially over when all the elements of the business have returned to normal functioning at the original site. It’s important to remember that a threat to continuity exists when processing is being returned to its original site after salvage and cleanup has been done. |
10. |
Answer: a When an emergency occurs that could potentially have an impact outside the facility, the public must be informed, regardless of whether there is any immediate threat to public safety. |
11. |
Answer: b The number one function of all disaster response and recovery is the protection of the safety of people; all other concerns are vital to business continuity but are secondary to personnel safety. |
12. |
Answer: a The three primary goals of a BIA are criticality prioritization, maximum downtime estimation, and identification of critical resource requirements. Answer d is a distracter. |
13. |
Answer: b A business impact analysis (BIA) measures the effect of resource loss and escalating losses over time in order to provide the entity with reliable data upon which to base decisions on hazard mitigation and continuity planning. Answer a is a definition of a disaster/emergency management program. Answer c describes a mutual aid agreement. Answer d is the definition of a recovery program. |
14. |
Answer: b A hot site is commonly used for those extremely time-critical functions that the business must have up and running to continue operating, but the expense of duplicating and maintaining all the hardware, software, and application elements is a serious resource drain to most organizations. |
15. |
Answer: b Monitoring employee morale and guarding against employee burnout during a disaster recovery event is the proper role of human resources. |
16. |
Answer: b |
17. |
Answer: c |
18. |
Answer: b A financial collapse is considered a technological potential hazard, whereas the other three are human events. |
19. |
Answer: d A checklist is a type of disaster recovery plan test. Electronic vaulting is the batch transfer of backup data to an offsite location. Remote journaling is the parallel processing of transactions to an alternate site. A warm site is a backup processing alternative. |
20. |
Answer: c Answer a is a definition for a threat. Answer b is a description of mitigating factors that reduce the effect of a threat, such as an uninterruptible power supply (UPS), sprinkler systems, or generators. Answer d is a distracter. |
21. |
Answer: a The recovery team performs different functions from the salvage team. The recovery team’s primary mandate is to get critical processing reestablished at an alternate site. The salvage team’s primary mandate is to return the original processing site to normal processing environmental conditions. |
22. |
Answer: a Emergency management plans, business continuity plans, and disaster recovery plans should be regularly reviewed, evaluated, modified, and updated. At a minimum, the plan should be reviewed at an annual audit. |
23. |
Answer: a Isolation of the incident scene should begin as soon as the emergency has been discovered. |
24. |
Answer: a Reoccupying the site of a disaster or emergency should not be undertaken until a full safety inspection has been done, an investigation into the cause of the emergency has been completed, and all damaged property has been salvaged and restored. |
25. |
Answer: b The other three answers are good reasons to test the disaster recovery plan. |
26. |
Answer: a Salvage cannot begin until all physical danger has been removed or mitigated and emergency personnel have returned control of the site to the organization. |
27. |
Answer: c The purpose of the test is to find weaknesses in the plan. Every plan has weaknesses. After the test, all parties should be advised of the results, and the plan should be updated to reflect the new information. |
28. |
Answer: d Authorized, signed checks should be stored securely off-site for access by lower-level managers in the event senior-level or financial management is unable to disburse funds normally. |
29. |
Answer: a The organization has an inherent responsibility to its employees and their families during and after a disaster or other disruptive event. The company must be insured to the extent it can properly compensate its employees and families. Alternatively, employees do not have the right to obtain compensatory damages fraudulently if the organization cannot compensate. |
30. |
Answer: c A mutual aid agreement is used by two or more parties to provide for assistance if one of the parties experiences an emergency. Answer a describes a business continuity plan. Answer b describes a damage assessment, and answer d describes risk mitigation. |
31. |
Answer: a A business continuity program is an ongoing process supported by senior management and funded to ensure that the necessary steps are taken to identify the impact of potential losses, maintain viable recovery strategies and recovery plans, and ensure continuity of services through personnel training, plan testing, and maintenance. Answer b describes a disaster/emergency management program. Answer c describes a damage assessment. Answer d is a distracter. |
32. |
Answer: b A computer facility with electrical power and HVAC, with workstations and servers not present (but available to be brought on-site when the event begins) and no applications installed, is a cold site. Answer a is a hot site, and d is a warm site. Answer c is just an empty room. |
33. |
Answer: b A “tertiary site” is a secondary backup site that can be used in case the primary backup site is not available. |
1. |
According to the Internet Architecture Board (IAB), an activity that causes which of the following is considered a violation of ethical behavior on the Internet?
|
|
2. |
Which of the following best defines social engineering?
|
|
3. |
Because the development of new technology usually outpaces the law, law enforcement uses which traditional laws to prosecute computer criminals?
|
|
4. |
Which of the following is not a category of law under the Common Law System?
|
|
5. |
A trade secret:
|
|
6. |
Which of the following is not a European Union (EU) principle?
|
|
7. |
The Federal Sentencing Guidelines:
|
|
8. |
What does the prudent-man rule require?
|
|
9. |
Information Warfare is:
|
|
10. |
The chain of evidence relates to:
|
|
11. |
The Kennedy-Kassebaum Act is also known as:
|
|
12. |
Which of the following refers to a U.S. government program that reduces or eliminates emanations from electronic equipment?
|
|
13. |
Imprisonment is a possible sentence under:
|
|
14. |
Which one of the following conditions must be met if legal electronic monitoring of employees is conducted by an organization?
|
|
15. |
Which of the following is a key principle in the evolution of computer crime laws in many countries?
|
|
16. |
The concept of due care states that senior organizational management must ensure that:
|
|
17. |
Liability of senior organizational officials relative to the protection of the organization’s information systems is prosecutable under:
|
|
18. |
Responsibility for handling computer crimes in the United States is assigned to:
|
|
19. |
In general, computer-based evidence is considered:
|
|
20. |
Investigating and prosecuting computer crimes is made more difficult because:
|
|
21. |
Which of the following criteria are used to evaluate suspects in the commission of a crime?
|
|
22. |
Which one of the following U.S. government entities was assigned the responsibility for improving government efficiency through the application of new technologies and for developing guidance on information security for government agencies by the Paperwork Reduction Act of 1980, 1995?
|
|
23. |
What is enticement?
|
|
24. |
Which of the following is not a computer investigation issue?
|
|
25. |
Conducting a search without the delay of obtaining a warrant if destruction of evidence seems imminent is possible under:
|
|
26. |
Which one of the following items is not true concerning the Platform for Privacy Preferences (P3P) developed by the World Wide Web Consortium (W3C)?
|
|
27. |
The 1996 Information Technology Management Reform Act (ITMRA), or Clinger-Cohen Act, did which one of the following?
|
|
28. |
Which one of the following U.S. Acts prohibits trading, manufacturing, or selling in any way that is intended to bypass copyright protection mechanisms?
|
|
29. |
Which of the following actions by the U.S. government is not permitted or required by the U.S. PATRIOT Act, signed into law on October 26, 2001?
|
|
30. |
Which Act required U.S. government agencies to do the following?
|
|
Answers
1. |
Answer: a The correct answer is a. Answers b, c, and d are ethical considerations of other organizations. |
2. |
Answer: c The correct answer is c: using people skills to obtain proprietary information. Answer a is software piracy, answer b is dumpster diving, and answer d is a violation of integrity. |
3. |
Answer: b The answer b is correct. Answer a is not a law, answer c is not applicable because it applies to obtaining visas and so on, and answer d is not correct because the laws in answer b are more commonly used to prosecute computer crimes. |
4. |
Answer: d The correct answer, d, is a distracter. All the other answers are categories under common law. |
5. |
Answer: c Answer c defines a trade secret. Answer a refers to a patent. Answer b refers to a copyright. Answer d refers to a trademark. |
6. |
Answer: b The transmission of data to locations where equivalent personal data protection cannot be ensured is not permissible for the EU. The other answers are EU principles. |
7. |
Answer: a The answer a is correct. Answer b is part of the U.S. Computer Fraud and Abuse Act. Answer c is part of the U.S. Electronic Communications Privacy Act. Answer d is part of the U.S. Computer Security Act. |
8. |
Answer: b The answer b is correct. Answer a is a distracter and is not part of the prudent man rule. Answer c is incorrect because it is not possible to guarantee that breaches of security can never occur. Answer d is incorrect because the prudent-man rule does not refer to a specific government standard but relates to what other prudent persons would do. |
9. |
Answer: a The answer a is correct. Answer b is a distracter and has to do with weapon systems development. Answer c is not applicable. Answer d is the conventional acquisition of information from radio signals. |
10. |
Answer: c The answer c is correct. Answer a relates to physical security, answer b is a type of biological testing, and answer d is part of the act of gathering evidence. |
11. |
Answer: c The answer c is correct. The others refer to other laws or guidelines. |
12. |
Answer: d The answer d is correct. Answer a refers to the U.S. government Escrow Encryption Standard. Answer b refers to the large-scale monitoring of RF transmissions. Answer c is a distracter. |
13. |
Answer: b Answer b is the only one of the choices in which imprisonment is possible. |
14. |
Answer: d The answer d is correct. Answer a is incorrect because employees must be made aware of the monitoring if it is to be legal; answer b is incorrect because employees do not have to agree with the policy; and answer c is incorrect because the results of monitoring may be used against the employee if the corporate policy is violated. |
15. |
Answer: c The answer c is correct. Answer a is incorrect because all nations do not agree on the definition of computer crime and corresponding punishments. Answer b is incorrect because the existing laws can be applied against computer crime. Answer d is incorrect because in some countries, possession without intent to sell is considered a crime. |
16. |
Answer: b The answer b is correct. Answer a is incorrect because all risks to information systems cannot be eliminated; answer c is incorrect because senior management cannot delegate its responsibility for information system security under due care; and answer d is incorrect because the cost of implementing safeguards should be less than or equal to the potential resulting losses relative to the exercise of due care. |
17. |
Answer: b |
18. |
Answer: a The correct answer is a, making the other answers incorrect. |
19. |
Answer: d The answer d is correct. Answer a refers to incontrovertible evidence; answer b refers to inference from other, intermediate facts; and answer c refers to a copy of evidence or oral description of its content. |
20. |
Answer: b The answer b is correct. Answer a is incorrect because if backups are done, they usually can be located. Answer c is incorrect because evidence can be preserved using the proper procedures. Answer d is incorrect because there are exceptions to the hearsay rule. |
21. |
Answer: d |
22. |
Answer: c |
23. |
Answer: c Answer c is the definition of enticement. Answer a is the definition of entrapment. Answers b and d are distracters. |
24. |
Answer: a The correct answer is a. In many instances, evidence is difficult to obtain in computer crime investigations. Answers b, c, and d are computer investigation issues. |
25. |
Answer: c The answer c is correct. The other answers refer to other principles, guidelines, or rules. |
26. |
Answer: c In addition to the capabilities in answers a, b, and d, P3P does provide the site privacy practices to users in machine-readable format. |
27. |
Answer: a The answer a is correct. The other answers are distracters. |
28. |
Answer: b Answers a and d are distracters. Answer c, the 1998 Sonny Bono Copyright Term Extension Act, amends the provisions concerning duration of copyright protection. The Act states that the terms of copyright are generally extended for an additional 20 years. |
29. |
Answer: d Wire and cash transfers of $10,000 or more in a single transaction must be reported to government officials. Actions in answers a, b, and c are permitted under the PATRIOT Act. In answers a and b, the government has new powers to subpoena electronic records and to monitor Internet traffic. In monitoring information, the government can require the assistance of ISPs and network operators. This monitoring can extend even into individual organizations. In the PATRIOT Act, Congress permits investigators to gather information about electronic mail without having to show probable cause that the person to be monitored had committed a crime or was intending to commit a crime. In answer c, the items cited now fall under existing search and seizure laws. A new twist is delayed notification of a search warrant. Under the PATRIOT Act, if it is suspected that notification of a search warrant would cause a suspect to flee, a search can be conducted before notification of a search warrant is given. In a related matter, the United States and numerous other nations have signed the Council of Europe’s Cybercrime Convention. In the United States, participation in the Convention has to be ratified by the Senate. In essence, the Convention requires the signatory nations to spy on their own residents, even if the action being monitored is illegal in the country in which the monitoring is taking place. |
30. |
Answer: d |
1. |
Which of the following is not a type of motion-detection system?
|
|
2. |
Which of the following is a type of personnel control that helps prevent piggybacking?
|
|
3. |
Which of the following choices most accurately describes the prime benefit of using guards?
|
|
4. |
The recommended optimal relative humidity range for computer operations is:
|
|
5. |
How many times should a diskette be formatted to comply with TCSEC Orange Book object reuse recommendations?
|
|
6. |
Which of the following more closely describes the combustibles in a Class B-rated fire?
|
|
7. |
Which of the following is not the proper suppression medium for a Class B fire?
|
|
8. |
What does an audit trail or access log usually not record?
|
|
9. |
A brownout can be defined as a:
|
|
10. |
Which of the following statements is not accurate about smoke damage to electronic equipment?
|
|
11. |
A surge can be defined as a(n):
|
|
12. |
Which is not a type of a fire detector?
|
|
13. |
Which of the following is not considered an acceptable replacement for Halon discharge systems?
|
|
14. |
Which type of fire extinguishing method contains standing water in the pipe and therefore generally does not enable a manual shutdown of systems before discharge?
|
|
15. |
Which of the following types of control is not an example of a physical security access control?
|
|
16. |
Which is not a recommended way to dispose of unwanted used data media?
|
|
17. |
According to the NFPA, which of the following choices is not a recommended risk factor to consider when determining the need for protecting the computing environment from fire?
|
|
18. |
Which of the following choices is not an example of a halocarbon agent?
|
|
19. |
Which of the following statements most accurately describes a dry pipe sprinkler system?
|
|
20. |
The theft of a laptop poses a threat to which tenet of the C.I.A. triad?
|
|
21. |
Which is a benefit of a guard over an automated control?
|
|
22. |
Which is not considered a preventative security measure?
|
|
23. |
Which is not a PC security control device?
|
|
24. |
Which of the following is not an example of a clean fire-extinguishing agent?
|
|
25. |
What is the recommended height of perimeter fencing to keep out casual trespassers?
|
|
26. |
Why should extensive exterior perimeter lighting of entrances or parking areas be installed?
|
|
27. |
Which of the following is not a form of data erasure?
|
|
28. |
Which is not considered a physical intrusion detection method?
|
|
29. |
Which of the following statements represents the best reason to control the humidity in computer operations areas?
|
|
30. |
Which of the following terms refers to a standard used in determining the fire safety of a computer room?
|
|
31. |
Which of the following choices is not a common use for a proximity smart card?
|
|
32. |
Which of the following is the best description of PIDAS fencing?
|
|
33. |
Which of the following statements about bollards is incorrect?
|
|
Answers
1. |
Answer: c Host-based intrusion-detection systems are used to detect unauthorized logical access to network resources, not the physical presence of an intruder. |
2. |
Answer: a The other three answers are not personnel or physical controls but are technical threats or vulnerabilities. Back doors (answer b) commonly refers to Trojan horses used covertly to give an attacker backdoor network access. Hackers install back doors to gain network access at a later time. Brute force (answer c) is a cryptographic attack attempting to use all combinations of key patterns to decipher a message. Maintenance hooks (answer d) are undocumented openings into an application to assist programmers with debugging. Although intended innocently, these can be exploited by intruders. |
3. |
Answer: b The prime advantage to using human guards is that they can exercise discretionary judgment when the need arises. For example, during an emergency guards can switch roles from access control to evacuation support, something guard dogs or automated systems cannot. |
4. |
Answer: c 40% to 60% relative humidity is recommended for safe computer operations. Too low humidity can create static discharge problems, and too high humidity can create condensation and electrical contact problems. |
5. |
Answer: c Most computer certification and accreditation standards recommend that diskettes be formatted seven times to prevent any possibility of data remanence. |
6. |
Answer: c Paper is described as a common combustible and is therefore rated a class A fire. An electrical fire is rated Class C. Gas is not defined as a combustible. |
7. |
Answer: d Water is not a proper suppression medium for a class B fire. The other three are commonly used. |
8. |
Answer: a The other three answers are common elements of an access log or audit trail. |
9. |
Answer: c Answer a, prolonged power loss, is a blackout; answer b, momentary low voltage, is a sag; and d, momentary high voltage, is a spike. |
10. |
Answer: d Immediate smoke exposure to electronic equipment does little damage. However, the particulate residue left after the smoke has dissipated contains active by-products that corrode metal contact surfaces in the presence of moisture and oxygen. |
11. |
Answer: a Answer b, initial surge of power at start or power on, is called an inrush; c, momentary power loss, is a fault; and d, a steady interfering disturbance, is called noise. |
12. |
Answer: b Gas-discharge is a type of fire extinguishing system, not a fire detection system. |
13. |
Answer: c Existing installations are encouraged to replace Halon 1301 with one of the substitutes listed. |
14. |
Answer: b The other three are variations on a dry pipe discharge method with the water not standing in the pipe until a fire is detected. |
15. |
Answer: d |
16. |
Answer: d While this method might overwrite the older files, recoverable data might exist past the file end marker of the new file if the new data file is smaller than the older data file. |
17. |
Answer: c Although the distance of the computing facility from a fire station should be considered when initially determining the physical location of a computing facility (as should police and hospital proximity), it is not considered a primary factor in determining the need for internal fire suppression systems. |
18. |
Answer: c IG-541 is an inert gas agent, not a halocarbon agent. |
19. |
Answer: b In a dry pipe system, air pressure is maintained until the sprinkler head seal is ruptured. Answer a is incorrect because wet pipe is the most commonly used sprinkler system, dry pipe is second. Answer c describes a preaction pipe, which sounds an alarm and delays the water release. A preaction pipe may or may not be a dry pipe, but not all dry pipes are preaction. Answer d is incorrect because a dry pipe is a water release system. |
20. |
Answer: d Confidentiality, because the data can now be read by someone outside of a monitored environment; availability, because the user has lost the computing ability provided by the unit; and integrity, because the data residing on and any telecommunications from the portable are now suspect. |
21. |
Answer: a Guards can use discriminating judgment. Guards are typically more expensive than automated controls, need training as to the protection requirements of the specific site, and need to be screened and bonded. |
22. |
Answer: c Audit trails are detective rather than preventative, because they are used to piece together the information of an intrusion or intrusion attempt after the fact. |
23. |
Answer: d A cable lock is used to attach the PC to a desk; a switch control is used to prevent powering a unit off; and a port control (such as a diskette drive lock) is used to prevent data from being downloaded from the PC. |
24. |
Answer: a CO2, carbon dioxide, leaves a corrosive residue and is therefore not recommended for computer facility fire suppression systems. |
25. |
Answer: b 3′ to 4′-high fencing is considered minimal protection, for restricting only casual trespassers. Answers c and d are better protection against intentional intruders. |
26. |
Answer: c The other answers have nothing to do with lighting. |
27. |
Answer: b Remanance is what data erasure is intended to prevent. Clearing (answer a) refers to the overwriting of data media intended to be reused in the same organization. Purging (answer c) refers to degaussing or overwriting media intended to be removed from the organization. Destruction (answer d) refers to completely destroying the media. |
28. |
Answer: d Line supervision is the monitoring of the alarm signaling transmission medium to detect tampering. Audio detectors (answer a) monitor a room for any abnormal soundwave generation. Photoelectric sensors (answer b) receive a beam of light from a light-emitting device. Wave pattern motion detectors (answer c) generate a wave pattern and send an alarm if the pattern is disturbed. |
29. |
Answer: b Electrostatic discharges from static electricity can damage sensitive electronic equipment, even in small amounts. |
30. |
Answer: b Answer a, noncombustible, means material that will not aid or add appreciable heat to an ambient fire. Answer c, fire retardant, describes material that lessens or prevents the spread of a fire. Fire retardant coatings are designed to protect materials from fire exposure damage. Answer d, nonflammable, describes material that will not burn. |
31. |
Answer: a A proximity smart card is not commonly used for verifying on-line pur-chases. The other answers are all common uses of a proximity smart card. |
32. |
Answer: b Perimeter Intrusion Detection and Assessment System (PIDAS) fencing has intrusion detection sensors on the fence and attempts to detect an intruder scaling the fence or cutting through it. By initiating an alarm when the cable vibrates, however, PIDAS’s sensitivity can cause a high rate of false alarms, as the alarm is often triggered by animals or weather elements such as high wind. |
33. |
Answer: c Bollards are concrete pillars designed to deter drivers from driving vehicles into a building, and may contain exterior lighting to make them more functional and decorative. |
1. |
Which of the following is not a standard phase in the System Authorization Process?
|
|
2. |
Which of the following would be an accurate description of the role of the ISSO in the C&A process?
|
|
3. |
The British Standard BS7799 was the basis for which of the following standards?
|
|
4. |
How many phases are defined in the DIACAP process?
|
|
5. |
Which is not a common responsibility of the user representative?
|
|
6. |
Which statement is not true about the SAA?
|
|
7. |
Which C&A role is also referred to as the accreditor?
|
|
8. |
Which is not a C&A role?
|
|
9. |
Which is not a NIACAP accreditation type?
|
|
10. |
Which statement is not true about the Designated Approving Authority (DAA)?
|
|
11. |
Which statement is not true about the certification agent?
|
|
12. |
What is the task of the certifier at the completion of the certification effort?
|
|
13. |
Which choice most accurately defines a user representative?
|
|
14. |
Which statement about certification and accreditation (C&A) is not correct?
|
|
15. |
The DAA accreditation decision is made at the last step of which phase?
|
|
16. |
If the DAA does not accredit the system, what happens?
|
|
17. |
What is the main purpose of the post-accreditation phase?
|
|
18. |
How long does Phase 4 last?
|
|
19. |
Which policy document determines that all federal government departments and agencies establish and implement programs mandating the certification and accreditation (C&A) of national security systems under their operational control?
|
|
20. |
Which of the following assessment methodologies defines a six-step comprehensive C&A?
|
|
21. |
What is the order of phases in a DITSCAP assessment?
|
|
Answers
1. |
Answer: c The correct answer is c, Post-Certification. The SAP comprises four phases:
|
2. |
Answer: d The ISSO is responsible to the DAA for ensuring that security is provided for and implemented throughout the life cycle of an AS from the beginning of the system concept development phase through its design, development, operation, maintenance, and secure disposal. |
3. |
Answer: b The correct answer is b, ISO/IEC 17799. ISO/IEC 154508 defines the Common Criteria; ICO/ICE 17799 is nonexistent. |
4. |
Answer: c The DIACAP process is expected to consist of five phases: Initiate and Plan IA C&A; Implement and Validate Assigned IA Controls; Make Certification Determination and Accreditation Decisions; Maintain Authority to Operate and Conduct Reviews; Decommission System. |
5. |
Answer: c Determining whether a system is ready for certification and conducting the certification process are tasks for the certifier. As noted in the SSAA, the user representative:
|
6. |
Answer: c The SSAA is used throughout the entire C&A process. After accreditation, the SSAA becomes the baseline security configuration document and is maintained during Phase 4. |
7. |
Answer: b The Designated Approving Authority (DAA) is also referred to as the accreditor. |
8. |
Answer: c Answer c is a distracter; the other answers are all C&A roles. |
9. |
Answer: b Answer c is a distracter; the NIACAP applies to each of the other three accreditation types and may be tailored to meet the specific needs of the organization and IS. A site accreditation (answer a) evaluates the applications and systems at a specific, self-contained location. A type accreditation (answer b) evaluates an application or system that is distributed to multiple locations. A system accreditation (answer c) evaluates a major application or general support system. |
10. |
Answer: a The certifier, not the DAA, determines the existing level of residual risk and makes the accreditation recommendation. The DAA determines the acceptable, not existing, level of risk for a system. The other answers about the DAA are true. |
11. |
Answer: b The DAA, not the certifier, determines the acceptable level of residual risk for a system and must have the authority to oversee the budget and IS business operations of systems under his or her purview. The other statements about the certifier are true. |
12. |
Answer: a At the completion of the certification effort, the certifier reports the status of certification and makes a recommendation to the DAA. The other answers are tasks assigned to the program manager. |
13. |
Answer: b The operational interests of system users are vested in the user representative. In the C&A process, the user representative is concerned with system availability, access, integrity, functionality, performance, and confidentiality as they relate to the mission environment. Users and their representative are found at all levels of an agency. The other answers are qualities of the DAA. |
14. |
Answer: b NSTISSP No. 6 establishes the requirement for federal departments and agencies to implement a C&A process for national security systems. The requirements of the NSTISSI No. 6 apply to all U.S. government executive branch departments, agencies, and their contractors and consultants. The other three answers are correct statements about C&A. |
15. |
Answer: c, Phase 3. After receipt of the certifier’s recommendation, the DAA reviews the SSAA and makes an accreditation determination. This determination is added to the SSAA. The final SSAA accreditation package includes the certifier’s recommendation, the DAA authorization to operate, and supporting documentation. The SSAA must contain all information necessary to support the certifier’s recommended decision, including security findings, deficiencies, risks to operation, and actions to resolve any deficiencies. |
16. |
Answer: a If the decision is made to not authorize the system to operate, the NIACAP process reverts to Phase 1, and the DAA, certifier, program manager, and user representative must agree to proposed solutions to meet an acceptable level of risk. The decision must state the specific reasons for denial and, if possible, provide suggested solutions. |
17. |
Answer: b Phase 4, post-accreditation, contains activities required to continue to operate and manage the system so that it will maintain an acceptable level of residual risk. Post-accreditation activities must include ongoing maintenance of the SSAA, system operations, security operations, change management, and compliance validation. The other answers relate to Phase 1. |
18. |
Answer: c Phase 4 continues until the information system is removed from service (decommissioned), undergoes major revisions, or requires a periodic compliance validation. The other answers are distracters. |
19. |
Answer: d NSTISSP No. 6 determines that all federal government departments and agencies establish and implement programs mandating the certification and accreditation (C&A) of national security systems under their operational control. These C&A programs must ensure that information processed, stored, or transmitted by national security systems is adequately protected for confidentiality, integrity, and availability. |
20. |
Answer: a The Federal Information Processing Standard (FIPS) 102, the Guideline for Computer Security Certification and Accreditation, is a comprehensive guide explaining how to establish a C&A program and execute a complete C&A. FIPS 102 details a 6-step approach:
|
21. |
Answer: b The DITSCAP phases are:
|
1. |
Which one of the following documents requires the development and maintenance of minimum controls to protect Federal information and information systems?
|
|
2. |
FISMA charges which one of the following agencies with the responsibility of overseeing the security policies and practices of all agencies of the executive branch of the Federal government?
|
|
3. |
NIST Special Publication (SP) 800-53, “Recommended Security Controls for Federal Information Systems,” defines the term assurance as:
|
|
4. |
Which one of the following publications requires Federal agencies to review the security controls in their information systems and perform security accreditation?
|
|
5. |
Which one of the following publications provides direction for each government agency in developing and implementing an agencywide information security program according to the FISMA requirements?
|
|
6. |
FISMA assigned the responsibility for developing standards to be used by all Federal agencies to categorize all information and information systems to which one of the following organizations?
|
|
7. |
Which publication categorizes information and information systems as part of the FISMA mandate?
|
|
8. |
FIPS Publication 199 defines three levels of potential impact to the compromise of confidentiality, integrity, and availability. These levels are:
|
|
9. |
Which one of the following best describes FIPS 199 security categories?
|
|
10. |
The general formula for categorization of an information type developed in FIPS Publication 199, “Standards for Security Categorization of Federal Information and Information Systems,” is which one of the following?
|
|
11. |
In order to determine the security category (SC) for an information system, the potential impact values assigned to the security objectives of confidential, integrity, and availability must be which one of the following?
|
|
12. |
NIST SP 800-30, “Risk Management Guide for Information Technology Systems,” defines a term as “either (1) intent and method targeted at the intentional exploitation of a vulnerability or (2) a situation and method that may accidentally trigger a vulnerability.” Which one of the following items is the term in the definition?
|
|
13. |
Impact is defined by NIST SP 800-30 as which one of the following?
|
|
14. |
NIST SP 800-30 includes threat identification, control analysis, likelihood determination, impact analysis, and control recommendations as components of which one of the following activities?
|
|
15. |
Hackers, computer criminals, terrorists, floods, tornadoes, and strikes are examples of:
|
|
16. |
What NIST document provides a questionnaire and checklist through which systems can be evaluated for compliance against specific control objectives?
|
|
17. |
Initiation, development and acquisition, implementation and installation, operational maintenance, and disposal are components of what activity?
|
|
18. |
The term ST&E stands for:
|
|
19. |
Which one of the following lists describes different types of penetration tests?
|
|
20. |
FIPS Publication 199 defines three levels of potential impact to the compromise of confidentiality, integrity, and availability. Which one of the following statements taken from FIPS 199 describes a moderate level of impact on confidentiality?
|
|
21. |
The definition “All components of an information system to be accredited by an authorizing official and excludes separately accredited systems, to which the information system is connected” taken from NIST SP 800-37 refers to which one of the following terms?
|
|
22. |
Which activity referred to in OMB Circular A-130 has to consider legal liability issues resulting from omissions and errors, failure to exercise due care in the operation of an information system, and unauthorized disclosure, modification, or destruction of data?
|
|
23. |
What NIST Special Publication provides guidance in the selection and configuration of security controls for Federal information systems?
|
|
24. |
Which one of the following NIST publications links to SP 800-53 and specifies minimum security requirements for information systems, including access control, awareness and training, configuration management, and personnel security?
|
|
25. |
The Security Controls of NIST SP 800-53 are organized into which three classes?
|
|
26. |
If AC represents the Access Control family in NIST SP 800-53, what does AC-15 denote?
|
|
27. |
The control structure in NIST SP 800-53 comprises three parts. Which one of the following is the correct listing of the three parts?
|
|
28. |
A description of one element of the access control family listed in NIST SP 800-53 is LOW AC-17, MOD AC-17 (1) (2) (3), HIGH AC-17 (1) (2) (3) for low-impact, moderate-impact, and high-impact information systems, based on FIPS 199. What do the terms in parentheses represent?
|
|
29. |
The security certification and accreditation process comprises which one of the following sets of phases?
|
|
30. |
NIST SP 800-53 defines a term as “the grounds for confidence that the security controls implemented within an information system are effective in their application.” Which one of the following is that term?
|
|
31. |
A set of security controls that is applicable to a number of information systems in an organization is called:
|
|
32. |
In the certification and accreditation process, a plan must be developed that outlines the information system security requirements and associated planned and existing controls. This plan is called:
|
|
33. |
The security accreditation package comprises which one of the following sets of items?
|
|
Answers
1. |
Answer: c Development and maintenance of these controls is one of the four prime directives of FISMA, Title III of the E-Government Act of 2002. |
2. |
Answer: a FISMA charges the Director of OMB with those responsibilities. |
3. |
Answer: c Answer c addresses how well security controls function. |
4. |
Answer: b OMB Circular A-130, Appendix III, imposes this requirement. |
5. |
Answer: a NIST SP 800-37 provides this direction. |
6. |
Answer: b The correct answer is b, NIST. FISMA also assigned to NIST the responsibility for developing guidelines recommending the types of information and information systems to be included in each security category and the minimum information security requirements. |
7. |
Answer: d |
8. |
Answer: b |
9. |
Answer: d |
10. |
Answer: d |
11. |
Answer: a |
12. |
Answer: c |
13. |
Answer: b |
14. |
Answer: c |
15. |
Answer: a |
16. |
Answer: c |
17. |
Answer: a |
18. |
Answer: c |
19. |
Answer: a The answer a is correct. The other answers are made-up distracters. |
20. |
Answer: a The answer a is correct. Answer b refers to a low impact on integrity, answer c refers to moderate impact on availability, and answer d refers to a high impact on confidentiality. |
21. |
Answer: d The correct answer is d, accreditation boundary. The other answers are made-up distracters. |
22. |
Answer: b |
23. |
Answer: c The correct answer is c, “Recommended Security Controls for Federal Information Systems” |
24. |
Answer: d |
25. |
Answer: b |
26. |
Answer: a |
27. |
Answer: d |
28. |
Answer: b |
29. |
Answer: c |
30. |
Answer: c |
31. |
Answer: a The correct answer is a, common security controls. Controls that are not defined as common to a number of information systems are defined as system-specific. |
32. |
Answer: c |
33. |
Answer: b |
1. |
Which choice best describes DITSCAP Phase 1, Definition?
|
|
2. |
Which is not an activity in DITSCAP Phase 2?
|
|
3. |
Which is not an activity in DITSCAP Phase 1?
|
|
4. |
According to NIST 800-37, which of the following subtasks does not belong to the Security Certification Phase?
|
|
5. |
Which of the following is not a good description of the goal of the C&A Certification Phase?
|
|
6. |
Which choice is not an objective of the security control assessment task?
|
|
7. |
The acronym RTM refers to what?
|
|
8. |
The SSAA is the product of which DITSCAP phase?
|
|
9. |
What is the primary purpose of the RTM?
|
|
10. |
In which DITSCAP phase is the RTM developed?
|
|
11. |
What is the primary purpose of the SSAA?
|
|
12. |
In which DITSCAP phase is the SSAA developed?
|
|
13. |
What is the overall goal of the DITSCAP Phase 2?
|
|
14. |
Which of the following is not an example of a DITSCAP Phase 2 process activity?
|
|
15. |
Which choice is not an example of an Initial Certification Analysis task?
|
|
16. |
What is the purpose of the Initial Certification Analysis?
|
|
17. |
What role would commonly be in charge of preparing the Action Plan?
|
|
18. |
What choice is the best description of the DAA?
|
|
19. |
In what role resides the final accreditation decision?
|
|
20. |
Which choice is not a use for the SSAA?
|
|
Answers
1. |
Answer: c Phase 1, Definition, is focused on understanding the IS business case, environment, and architecture to determine the security requirements and level of effort necessary to achieve certification and accreditation. The objective of Phase 1 is to agree on the security requirements, C&A boundary, schedule, level of effort, and resources required. Answer a describes the objectives of Phase 2. Answer b describes the objectives of Phase 3. Answer d describes the objectives of Phase 4. |
2. |
Answer: d Negotiation is a Phase 1 activity. The other three are the Phase 2 activities. |
3. |
Answer: b Initial Certification Analysis is a Phase 2 activity. The other three are the Phase 1 activities. |
4. |
Answer: a Presenting the accreditation recommendation to the DAA is a function of the Accreditation Phase. |
5. |
Answer: c Answer c describes the goal of the Accreditation Phase. The goal of the Certification Phase is to determine how well the information system security controls are implemented, if they are operating as intended, and if the controls are meeting the security requirements for the system. |
6. |
Answer: b The RTM is used to organize and track the security requirements of the target system to be accredited. The other three choices are all objectives of the security control assessment task. |
7. |
Answer: b The acronym RTM refers to Requirements Traceability Matrix. |
8. |
Answer: a The product of the DITSCAP Phase 1 is the System Security Authorization Agreement. |
9. |
Answer: b The RTM is used to organize and track the security requirements of the target system to be accredited. It is commonly part of the SSAA as an addendum. |
10. |
Answer: a In DITSCAP, the RTM is developed in the requirements gathering phase, which is a subtask of Phase 1. |
11. |
Answer: d The objective of the SSAA is to establish an evolving yet binding agreement on the level of security required before the system development begins or changes to a system are made. It’s a formal agreement between the DAA, the CA, the user representative, and the program manager. |
12. |
Answer: a The SSAA is developed in Phase 1 and updated in each phase as new information becomes available. |
13. |
Answer: c The goal of Phase 2 is to obtain a fully integrated system for certification testing and accreditation, to allow the process to proceed to Phase 3. |
14. |
Answer: c Phase 2 consists of those process activities that occur between the signing of the initial version of the SSAA and the formal C&A of the system. Document Mission Need is the first subtask of DITSCAP Phase 1. |
15. |
Answer: d “Assist in the development of test scripts for the System Test and Evaluation (ST&E)” is one of the purposes of the RTM. |
16. |
Answer: d The initial certification analysis determines whether the IS is ready to be evaluated and tested under Phase 3. The other three choices are uses for the RTM. |
17. |
Answer: b The Information System Owner prepares the Plan of Action and Milestones Document. |
18. |
Answer: b The DAA represents the interests of mission need, controls the operating environment, and defines the system level security requirements. Choice a describes the User Representative; choice c, the Certification Agent; and choice d, the Information Security Officer. |
19. |
Answer: a Only the DAA (or Authorizing Official) can grant the accreditation, grant an Interim Approval to Operate (IATO), or determine that the system’s risks are not at an acceptable level and it is not ready to be operational. |
20. |
Answer: b Answer b is a description of the concept of CONOPS. |
1. |
What happens to the SSAA after the DITSCAP accreditation?
|
|
2. |
Which choice best describes DITSCAP Phase 3, Accreditation?
|
|
3. |
During which DITSCAP phase does the Security Test and Evaluation (ST&E) occur?
|
|
4. |
What does DATO refer to?
|
|
5. |
Which of the following choices is the best description of IATO?
|
|
6. |
Which choice is the best description of the objective of the Security Accreditation Decision task?
|
|
7. |
Which choice is not a responsibility of the ISSO during DITSCAP Phase 4?
|
|
8. |
Which choice best describes the final security accreditation decision letter?
|
|
9. |
Change management is initiated under which phase?
|
|
10. |
Why would the DAA issue an accreditation determination of Not Authorized (NA)?
|
|
11. |
Which choice is the best definition of the DIACAP Interim Approval to Test (IATT) accreditation determination?
|
|
12. |
Which of the following best describes the objective of the Security Test and Evaluation (ST&E)?
|
|
13. |
Who makes the final accreditation decision?
|
|
14. |
Penetration Testing is part of which DITSCAP phase?
|
|
15. |
Which choice is the best description of the purpose of the Security Accreditation Phase?
|
|
16. |
SSAA maintenance continues under which phase?
|
|
17. |
How many determination options does the authorizing official have in a DIACAP process?
|
|
18. |
How many levels of certification does NIACAP specify to ensure that the appropriate C&A is performed for varying schedule and budget limitations?
|
|
19. |
Which choice is the best description of DIACAP residual risk?
|
|
20. |
Which choice is not an accreditation decision the DITSCAP DAA can make?
|
|
21. |
When does the DAA make the accreditation determination?
|
|
Answers
1. |
Answer: a After accreditation, the SSAA becomes the baseline security configuration document. Phase 4 involves ongoing review of the SSAA to ensure it remains current. The user representative, DAA, certifier, and program manager must approve revisions to the SSAA. On approval, the necessary changes to the mission, environment, and architecture are documented in the SSAA. |
2. |
Answer: d Phase 3, Validation, validates compliance of the fully integrated system with the security policy and requirements stated in the SSAA. The objective of Phase 3 is to produce the required evidence to support the DAA in making an informed decision to grant approval to operate the system. Answer a describes the objectives of Phase 2. Answer b describes the objectives of Phase 1. Answer c describes the objectives of Phase 4. |
3. |
Answer: c The Security Test and Evaluation (ST&E) is a major activity in Phase 3. |
4. |
Answer: b DIACAP’s Denial of Approval to Operate (DATO) is a determination that a DoD information system cannot operate because of an inadequate IA design or failure to implement assigned IA controls. |
5. |
Answer: d If the DAA deems that the agency-level risk is unacceptable, but there is an important mission-related need to place the information system into operation, an Interim Authorization to Operate (IATO) may be issued. The IATO is a limited authorization under specific terms and conditions, which include corrective actions to be taken by the information system owner and a required time frame for completion of those actions. |
6. |
Answer: c The objective of the Security Accreditation Decision task is to determine the risk to agency operations, agency assets, or individuals and determine whether the agency-level risk is acceptable. |
7. |
Answer: c The user representative, DAA, certifier, and program manager must approve revisions to the SSAA. The ISSO is responsible for:
|
8. |
Answer: c The accreditation decision letter indicates to the information system owner whether the system is authorized to operate (ATO), authorized to operate on an interim basis under strict terms and conditions (IATO), or not authorized to operate (NA). |
9. |
Answer: d After an IS is approved for operation in a specific computing environment, changes to the IS and the computing environment must be controlled. Although changes may adversely affect the overall security posture of the infrastructure and the IS, change is ongoing as it responds to the needs of the user and new technology developments. As the threats become more sophisticated or focused on a particular asset, countermeasures must be strengthened or added to provide adequate protection. Therefore, change management is required to maintain an acceptable level of residual risk. |
10. |
Answer: b If the DAA deems that the agency-level risk is unacceptable, the information system is not authorized for operation and is not accredited. The DAA must consider many factors when deciding whether the risk is acceptable, such as balancing security considerations with mission and operational needs. |
11. |
Answer: a In DIACAP, the Interim Approval to Test (IATT) accreditation determination is temporary approval to conduct system testing based on an assessment of the implementation status of the assigned IA controls. Choice b describes IATO, and choice c describes DATO. |
12. |
Answer: d The objective of the ST&E is to assess the technical implementation of the security design; to ascertain that security software, hardware, and firmware features affecting confidentiality, integrity, availability, and accountability have been implemented as documented in the SSAA; and that the features perform properly. ST&E validates the correct implementation of identification and authentication, audit capabilities, access controls, object reuse, trusted recovery, and network connection rule compliance. The other answers are distracters. |
13. |
Answer: d. The DAA renders his or her accreditation decision after reviewing all the relevant information and consulting with key agency officials. |
14. |
Answer: c Penetration testing assesses the system’s ability to withstand intentional attempts to circumvent system security features by exploiting technical security vulnerabilities. Penetration testing may include insider and outsider penetration attempts based on common vulnerabilities for the technology being used. |
15. |
Answer: b The purpose of the Security Accreditation Phase is to determine whether the remaining known vulnerabilities in the information system pose an acceptable level of risk to agency operations, agency assets, or individuals. |
16. |
Answer: d Phase 4 involves ongoing review of the SSAA to ensure that it remains current. The user representative, DAA, certifier, and program manager must approve revisions to the SSAA. On approval, the necessary changes to the mission, environment, and architecture are documented in the SSAA. |
17. |
Answer: c In DIACAP, the DAA or other authorizing official issues one of four accreditation determinations:
|
18. |
Answer: c NIACAP has four levels of certification to ensure that the appropriate C&A is performed for varying schedule and budget limitations. To determine the appropriate level of certification, the certifier must analyze the system’s business functions; national, departmental, and agency security requirements; criticality of the system to the organizational mission; software products; computer infrastructure; the types of data processed by the system, and types of users. The levels are as follows:
|
19. |
Answer: a DIACAP describes residual risk as the risk remaining after risk mitigation has occurred (i.e., application of countermeasures, security controls, or the implementation of corrective actions). |
20. |
Answer: c The DITSCAP DAA issues one of three accreditation determinations: Authorization to Operate (ATO), Interim Authorization to Operate (IATO), or Not Authorized (NA). |
21. |
Answer: a The DAA renders the accreditation decision after reviewing all the relevant information and consulting with key agency officials. |
1. |
“Continuously observing and evaluating the information system security controls during the system life cycle to determine whether changes have occurred that will negatively impact the system security” best describes which process in the certification and accreditation methodology?
|
|
2. |
Which one of the following activities is not a component of the continuous monitoring process?
|
|
3. |
Which one of the following publications provides details of the continuous monitoring process?
|
|
4. |
Which one of the following best describes when continuous monitoring takes place?
|
|
5. |
Which one of the following questions is not asked as part of the continuous monitoring process?
|
|
6. |
In configuration management and control, if necessary, updates have to be made to which of the following documents?
|
|
7. |
Which one of the following documents should report progress made on the current outstanding items and address vulnerabilities in the information system discovered during the security impact analysis or security control monitoring?
|
|
8. |
What process should be initiated when changes to the information system negatively impact the security of the system or when a period of time has elapsed as specified by agency or federal policy?
|
|
9. |
What course of action is recommended when it is not feasible or possible to continuously monitor the entirety of security controls in an information system?
|
|
10. |
Selecting controls to be monitored can be best aided by what document?
|
|
11. |
What document provides a standard approach to the assessment of NIST SP 800-53 security controls?
|
|
12. |
Appendix D of NIST SP 800-53A describes what three basic types of assessment methods?
|
|
13. |
NIST SP 800-53A defines which of the following three types of interviews, depending on the level of assessment conducted?
|
|
14. |
What NIST SP 800-53A assessment method is used to review, inspect, and analyze assessment objects such as polices, plans, requirements, designs, hardware, firmware, and security activities to determine the effectiveness of information system security controls?
|
|
15. |
Observing or conducting the operation of physical devices, hardware, software, and firmware and determining whether they exhibit the desired and expected behavior describes what type of SP 800-53A assessment method?
|
|
16. |
In continuous monitoring, tracking of proposed or actual changes to the information system, including operating system patches, hardware, software, and firmware is called:
|
|
17. |
Determination of the effect of changes to the information system on the security of the information system is called:
|
|
18. |
Who is responsible for monitoring the information system environment for factors that can potentially negatively impact the security of the system and its accreditation?
|
|
19. |
Which of the following items are types of factors that can potentially negatively impact the security of the system and its accreditation?
|
|
20. |
What guidance document is useful in determining the impact level of a particular threat on agency systems?
|
|
21. |
Documentation is an important part of continuous monitoring. In this context, documentation comprises which of the following activities?
|
|
22. |
As part of the documentation process, reports are usually sent to which of the following personnel in the agency?
|
|
23. |
In continuous monitoring, what personnel will normally be using the updated plans in the documentation report to guide future assessment activities?
|
|
24. |
The frequency of generating the system security plan and the plan of action and milestones is at the discretion of which of the following personnel?
|
|
25. |
Generating the system security plan and plan of action and milestones should be done at what frequency?
|
|
26. |
Who determines whether a security reaccreditation is required after reviewing the plan of actions and milestones?
|
|
27. |
The following events are used to determine whether which activity has to be initiated?
|
|
28. |
Continuous monitoring documentation reports are also used to meet which one of the following reporting requirements?
|
|
29. |
Power failures, floods, earthquakes, and sabotage are examples of what types of events?
|
|
30. |
NIST SP 800-53A defines a form of testing as one that “assumes (some) explicit knowledge of the internal structure of the item under assessment (e.g., low-level design, source code implementation representation).” Which one of the following items is that form of testing?
|
|
31. |
What are the types of assessment tests addressed in NIST SP 800-53A?
|
|
32. |
A test methodology in which assessors, using all available documentation (e.g., system design, source code, manuals) and working under no constraints, attempt to circumvent the security features of an information system is defined in NIST SP 800-53A as what type of test?
|
|
33. |
In the continuous monitoring examination assessment method, three examination depth levels are defined in NIST SP 800-53A. The definition “examinations that consist of brief, high-level reviews, observations, or inspections of selected specifications, mechanisms, or activities associated with the security control being assessed using a limited body of evidence or documentation” refers to which one of the following examination assessment types?
|
|
Answers
1. |
Answer: a The answer a is correct. The other answers are distracters. |
2. |
Answer: a Operation/maintenance is a component of the system development life cycle (SDLC) and is not one of the elements of continuous monitoring. |
3. |
Answer: c Answer c, NIST SP 80-37 “Guide for the Security Certification and Accreditation of Federal Information Systems,” is correct. NIST 800-14, “Generally Accepted Principles and Practices for Securing Information Technology” (answer a) lists eight principles for securing information technology systems and 14 security practices. NIST SP 800-42 (answer b) is the “Guideline on Network Security Testing,” and NIST SP 800-41 (answer d) provides “Guidelines on Firewalls and Firewall Policy.” |
4. |
Answer: b Continuous monitoring is aimed at determining whether any changes have occurred to the information system security posture following the initial system certification. |
5. |
Answer: c Answers a, b, and d are the three questions asked in NIST SP 800-37. |
6. |
Answer: b The system security plan and the plan of action and milestones are the documents that may have to be updated. Answer d is a made up distracter. |
7. |
Answer: a |
8. |
Answer: c The information system should be reaccredited because new vulnerabilities have been found that are not adequately protected by existing security control mechanisms. |
9. |
Answer: d The answer d is correct. Answers a and b are incorrect because, at this stage, it has not yet been determined whether new vulnerabilities have been exposed. The controls have to be monitored first. Answer c is a made-up distracter. |
10. |
Answer: a FIPS 199 security categories can be used to identify elements that are most critical to the organization and the corresponding security controls that, if compromised, would result in the most damage to the system. |
11. |
Answer: b NIST SP 800-53A (answer b) is the “ Guide for Assessing the Security Controls in Federal Information Systems.” FIPS 199 (answer a) provides guidelines for security categorizations; SP 800-30 (answer c) delineates guidelines for risk management; and NIST SP 800-66 (answer d,) is the “Introductory Resource Guide for Implementing the HIPAA Security Rule.” |
12. |
Answer: a The answer a is correct. The other answers are made-up distracters. |
13. |
Answer: b The answer b is correct. The other answers are made-up distracters. |
14. |
Answer: c The correct answer is c, examination, by definition. |
15. |
Answer: b The answer b, testing, is correct. Answer a, examination, is another SP 800-53A assessment method, and answers c and d are made-up distracters. |
16. |
Answer: c The correct answer is c, by definition. |
17. |
Answer: c The correct answer is c, by definition. |
18. |
Answer: a The correct answer is a, the information system owner. |
19. |
Answer: d |
20. |
Answer: a FIPS 199, (answer is a) is the “Standard for Security Categorization of Federal Information Systems.” The categories of FIPS 199 provide the framework for determining the impact level of specific threats. NIST SP 800-53 (answer b) is the “Recommended Security Controls for Federal Information Systems; NIST 800-14 (answer c) is “Generally Accepted Principles and Practices for Securing Information Technology,” which lists eight principles for securing information technology systems and 14 security practices. NIST SP 800-41 (answer d) which provides “Guidelines on Firewalls and Firewall Policy.” |
21. |
Answer: d Documentation includes both making changes to the security plan that address any changes or proposed changes to the information system and updating the plan of action and milestones. |
22. |
Answer: b The documentation report should be sent to the authorizing official and senior agency information security officer on a regular basis. |
23. |
Answer: d All these personnel will be involved in planning future assessment activities. |
24. |
Answer: b The information system owner has discretion over how frequently these documents are generated. |
25. |
Answer: b The frequency of plan generation is at the discretion of the information system owner. |
26. |
Answer: c If the decision is that reaccreditation is necessary, the authorizing official will inform the information system owner of the decision. |
27. |
Answer: a Any of these events makes reaccredidation necessary. |
28. |
Answer: b |
29. |
Answer: a The answer a is correct. Relative to answers b and c, these types of events are taken into account during impact analysis and risk analysis. Answer d is incorrect because risk can never be completely eliminated. |
30. |
Answer: c |
31. |
Answer: a The answer a is correct. In the other answers, evaluation and validation types are made-up distracters. Black-box testing is another word for functional testing. |
32. |
Answer: d |
33. |
Answer: b |
Appendix C
1. |
Which one of the following is not one of the types of information comprised in requirements?
|
|
2. |
What are the two major problem categories in the requirements analysis process?
|
|
3. |
Which one of the high-level design processes includes verified design specifications, requirements traceability, control structures, and data structures?
|
|
4. |
Which one of the following requirements categories stipulates customer-driven constraints such as hardware and software compatibility issues, operating systems, and protocols?
|
|
5. |
Which one of the following activities is not an approach to developing design architecture?
|
|
6. |
Which one of the following processes provides the necessary and sufficient information for the correct design and valid implementation of a system?
|
|
7. |
The design architecture derives from which one of the following:
|
|
8. |
Requirements analysis addresses which of the following issues?
|
|
9. |
Which one of the following requirements addresses issues such as budget control, delivery schedules, training, and acceptance testing?
|
|
10. |
What is a critical component in verifying and validating the completed system?
|
|
Answers
1. |
Answer: d The design architecture derives from the system specifications. |
2. |
Answer: a Answers b, c, and d are distracters. |
3. |
Answer: a Answers b, c, and d are distracters. |
4. |
Answer: c The answer is c, by definition. |
5. |
Answer: b Answer b is a made-up distracter. |
6. |
Answer: a Answers b, c, and d are distracters. |
7. |
Answer: d |
8. |
Answer: b |
9. |
Answer: b |
10. |
Answer: a |
Appendix D
1. |
Which one of the following is not one of the five system life cycle planning phases as defined in NIST SP 800-14?
|
|
2. |
Which one of the following sets of activities best describes a subset of the Acquisition Cycle phases as given in NIST SP 800-64, “Security Considerations in the Information System Development Life Cycle”?
|
|
3. |
The IATF document 3.1 stresses that information assurance relies on three critical components. Which one of the following answers correctly lists these components?
|
|
4. |
In the 14 Common IT Security Practices listed in NIST SP 800-14, one of the practices addresses having three types of policies in place. Which one of the following items is not one of these types of policies?
|
|
5. |
Risk management, as defined in NIST SP 800-30, comprises which three processes?
|
|
6. |
In the system development life cycle (SDLC), or system life cycle as it is sometimes called, in which one of the of the five phases are the system security features configured, enabled, tested, and verified?
|
|
7. |
Which one of he following activities is performed in the Development/Acquisition phase of the SDLC?
|
|
8. |
In NIST SP 800-30, risk is defined as a function of which set of the following items?
|
|
9. |
The risk assessment methodology described in NIST SP 800-30 comprises nine primary steps. Which one of the following is not one of these steps?
|
|
10. |
The Engineering Principles for Information Technology Security (EPITS), described in NIST SP 800-27, are which one of the following?
|
|
11. |
Which one of the following items is not one of the activities of the generic systems engineering (SE) process?
|
|
12. |
The elements Discover information protection needs, Develop detailed security design, and Assess information protection effectiveness are part of what process?
|
|
13. |
In the ISSE process, information domains are defined under the Discover Information Protection Needs process. Which one of the following tasks is not associated the information domain?
|
|
14. |
In the Discover Information Protection Needs activity of the ISSE process, the information systems security engineer must document the elements of this activity, including roles, responsibilities, threats, strengths, security services, and priorities. These items form the basis of which one of the following?
|
|
15. |
As part of the Define System Security Requirements activity of the ISSE process, the information systems security engineer identifies and selects a solution set that can satisfy the requirements of the IPP. Which one of the following elements is not a component of the solution set?
|
|
16. |
The information systems security engineer’s tasks of cataloging candidate commercial off-the-shelf (COTS) products, government off-the-shelf (GOTS) products, and custom security products are performed in which one of the following ISSE process activities?
|
|
17. |
Which ISSE activity includes conducting unit testing of components, integration testing, and developing installation and operational procedures?
|
|
18. |
Security certification is performed in which phase of the SDLC?
|
|
19. |
The certification and accreditation process receives inputs from the ISSE process. These inputs are which one of the following items?
|
|
20. |
Which one of the following items is not part of an implementation-independent protection profile (PP) of the Common Criteria (CC)?
|
|
21. |
Which one of the following is not one of the technology focus areas of the Defense in Depth strategy?
|
|
22. |
Security categorization is part of which phase of the SDLC?
|
|
23. |
The Defense in Depth strategy identifies five types of attacks on information systems as listed in IATF document 3.1. Which one of the following types of attacks is not one of these five types?
|
|
24. |
Which one of the following items is not an activity under the Acquisition/Development phase of the SDLC?
|
|
25. |
Which one of the following types of enclaves is not one of those categorized in the U.S. federal and defense computing environments?
|
|
26. |
According to NIST SP 800-64, which phase of the SDLC includes the activities of functional statement of need, market research, cost-benefit analysis, and a cost analysis?
|
|
27. |
Which one of the following models is an evolutionary model used to represent the acquisition management process?
|
|
28. |
In NIST SP 800-30, a threat is defined as which one of the following items?
|
|
29. |
Questionnaires, on-site interviews, review of documents, and automated scanning tools are primarily used to gather information for which one of the following steps of the risk assessment process?
|
|
30. |
In performing an impact analysis as part of the risk assessment process, three important factors should be considered in calculating the negative impact. Which one of the following items is not one of these factors?
Technical Management |
|
31. |
Which statement about the SSE-CMM is incorrect?
|
|
32. |
Which description of the SSE-CMM Level 5 Generic Practice is correct?
|
|
33. |
Which statement about testing and evaluation is not true?
|
|
34. |
Which attribute about the Level 1 SSE-CMM Generic Practice is correct?
|
|
35. |
Which of the following is not a true statement about good cost control?
|
|
36. |
Which statement about the SE-CMM is not correct?
|
|
37. |
Which statement about system security testing and evaluation (ST&E) categories is correct?
|
|
38. |
Which choice is not an activity in the cost control process?
|
|
39. |
Which choice does not describe a common outsourcing activity?
|
|
40. |
Which choice is not an accurate description of an activity level of the WBS?
|
|
41. |
Which of the following is not a phase in the IDEAL model?
|
|
42. |
Which choice best describes systems engineering, as defined in the SSE-CMM?
|
|
43. |
Which of the following choices is not a benefit of the WBS?
|
|
44. |
Which choice is not an element of the Statement of Work (SOW)?
|
|
45. |
Which of the following statements best describes the difference between a Type 1 testing and evaluation category and a Type 2 category?
|
|
46. |
Which choice has the outsourcing activities listed in their proper order?
|
|
47. |
Which answer best describes a Statement of Work (SOW)?
|
|
48. |
Which statement about SSE-CMM Base Practices is correct?
|
|
49. |
As per the SE-CMM, which definition of a system is incorrect?
|
|
50. |
Which of the following choices best describes the purpose of the Learning phase of the IDEAL model?
|
|
51. |
Which statement about the System Engineering Management Plan (SEMP) is not true?
|
|
52. |
Which choice has the correct order of activities in the IDEAL model?
|
|
53. |
Which choice is an incorrect statement regarding the Systems Engineering Management Plan (SEMP)?
|
|
54. |
Which choice best describes an outsourced supplier?
|
|
55. |
Which of the following statements best describes the main premise of process improvement?
|
|
56. |
What is the main purpose of the Work Breakdown Structure (WBS)?
|
|
57. |
Which choice is not an activity in the Development Program Planning and Control element of the SEMP?
|
|
58. |
At what point in the project is the Work Breakdown Structure (WBS) usually created?
|
|
59. |
Which choice accurately lists the five levels of security engineering maturity as defined by the SSE-CMM?
|
|
60. |
Which choice has the correct order of activities in the security system design testing process?
Certification and Accreditation See Chapter 11 Assessment Questions. U.S. Government Information Assurance Regulations |
|
61. |
Techniques and concerns that are normally addressed by management in the organization’s computer security program are defined in NIST SP 800-12 as:
|
|
62. |
The National Research Council publication Computers at Risk defines an element of computer security as a “requirement intended to assure that systems work properly and service is not denied to authorized users.” Which one of the following elements best fits this definition?
|
|
63. |
NSTISSI Publication No. 4009, “National Information Systems Security (INFOSEC) Glossary,” defines the term assurance as:
|
|
64. |
The “National Information Systems Security (INFOSEC) Glossary” defines an information system security term as a “formal determination by an authorized adjudicative office that an individual is authorized access, on a need to know basis, to a specific level of collateral classified information.” This definition refers to which one of the following terms?
|
|
65. |
In NSTISSI Publication No. 4009, what term is defined as a “document detailing the method, act, process, or effect of using an information system (IS)”?
|
|
66. |
Which one of the following definitions best describes the National Information Assurance Partnership (NIAP) according to NSTISSI Publication No. 4009?
|
|
67. |
TEMPEST refers to which one of the following definitions?
|
|
68. |
Executive Order (E.O.) 13231, issued on October 16, 2001, renamed the National Security Telecommunications and Information Systems Security Committee (NSTISSC) as which one of the following committees?
|
|
69. |
In addressing the security of systems with national security information, E.O. 13231 assigned the responsibilities of developing government-wide policies and overseeing the implementation of governmentwide policies, procedures, standards, and guidelines to the:
|
|
70. |
Which one of the following characteristics is not associated with the definition of a national security system?
|
|
71. |
In 2002, the U.S. Congress enacted the E-Government Act (Public Law 107-347). Title III of the E-Government Act was written to provide for a number of protections of Federal information systems, including to “provide a comprehensive framework for ensuring the effectiveness of information security controls over information resources that support Federal operations and assets.” Title III of the E-Government Act is also known as the:
|
|
72. |
FISMA assigned which one of the following entities the responsibility of overseeing the security policies and practices of U.S. government agencies?
|
|
73. |
Which information system security–related Act requires government agencies to perform periodic assessments of risk, develop policies and procedures that are based on risk assessments, conduct security awareness training, perform periodic testing and evaluation of the effectiveness of information security policies, and implement procedures for detecting, reporting, and responding to security incidents?
|
|
74. |
FISMA charged which one of the following entities to develop information system security standards and guidelines for federal agencies?
|
|
75. |
The general formula for categorization of an information type developed in FIPS Publication 199, “Standards for Security Categorization of Federal Information and Information Systems,” is which one of the following?
|
|
76. |
Circular A-130 directs that an oversight function should be performed consisting of the use of information technology planning reviews, fiscal budget reviews, information collection budget reviews, management reviews, and such other measures as deemed necessary to evaluate the adequacy and efficiency of each agency’s information resources management and compliance with the circular. Which one of the following individuals does the circular designate as being responsible for this oversight function?
|
|
77. |
The National Computer Security Center Publication NCSC-TG-004-88 includes a definition that refers to the characteristic of a system that “performs its intended function in an unimpaired manner, free from deliberate, inadvertent, or unauthorized manipulation of the system.” This characteristic defines which one of the following terms?
|
|
78. |
Which one of the following terms best describes a secure telecommunications or associated cryptographic component that is unclassified but governed by a special set of control requirements, as defined in NSTISSI Publication 4009?
|
|
79. |
What is a definable perimeter encompassing all hardware, firmware, and software components performing critical COMSEC functions, such as key generation and key handling and storage?
|
|
80. |
What process involves the five steps of identification of critical information, analysis of threats, analysis of vulnerabilities, assessment of risks, and application of appropriate countermeasures?
|
|
81. |
Information that has been determined pursuant to Executive Order 12958 or any predecessor order to require protection against unauthorized disclosures is known as:
|
|
82. |
An area that, when staffed, must be occupied by two or more appropriately cleared individuals who remain within sight of each other is referred to as which one of the following terms?
|
|
83. |
According to NSTISSI Publication 4009, the process of identifying and applying countermeasures commensurate with the value of the assets protected based on a risk assessment is called a:
|
|
84. |
In the context of information systems security, the abbreviation ST&E stands for which one of the following terms?
|
|
85. |
Which one of the following designations refers to a product that is a classified or controlled cryptographic item endorsed by the NSA for securing classified and sensitive U.S. government information when appropriately keyed?
|
|
86. |
Which one of the following items is not one of the responsibilities of the Committee on National Security Systems (CNSS) for the security of national security systems?
|
|
87. |
FISMA, Title III of the E-Government Act of 2002, reserves the responsibility for standards associated with the national defense establishment to which of the following entities?
|
|
88. |
FIPS Publication 199, “Standards for Security Characterization of Federal Information and Information Systems, NIST Pre-Publication Final Draft,” December 2003, characterizes three levels of potential impact on organizations or individuals based on the objectives of confidentiality, integrity, and availability. What is the level of impact specified in Publication 199 for the following description of integrity: “The unauthorized modification or destruction of information could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals”?
|
|
89. |
Referring to question 88, the following impact description refers to which one of the three security objectives and which corresponding level of impact: “The disruption of access to or use of information or an information system could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals”?
|
|
90. |
DoD Directive 8500.1, “Information Assurance (IA),” October 4, 2002, specifies a defense-in-depth approach that integrates the capabilities of which set of the following entities?
|
|
Answers
1. |
Answer: b The requirements phase is not one of the five system life cycle planning phases. The other two phases of the system life cycle are the Development/Acquisition phase and the Operations phase. |
2. |
Answer: a Answers b, c, and d are distracters comprising components of the SDLC and the Acquisition Cycle. |
3. |
Answer: d Answers a, b, and c are distracters. |
4. |
Answer: d A program policy is used to create and define a computer security program, an issue specific policy addresses specific areas and issues, and a system specific policy focuses on decisions made by management. |
5. |
Answer: a Answers b, c, and d are distracters. |
6. |
Answer: c |
7. |
Answer: b Answer a refers to the Initiation phase, answer c refers to the Operation/Maintenance phase, and answer d refers to the Disposal phase. |
8. |
Answer: a Answers b, c, and d are distracters. |
9. |
Answer: d Delineating accreditation boundaries is a subset of system characterization (answer a). |
10. |
Answer: a Answer b describes the principles and practices found in NIST SP 800-14. Answers c and d are distracters. |
11. |
Answer: c Obtaining accreditation is not one of the SE process activities. The other SE process activities are to design system architecture, develop detailed design, and implement system. |
12. |
Answer: b |
13. |
Answer: d This task is performed under the Develop Detailed Security Design activity. |
14. |
Answer: d Answers a through c are distracters. |
15. |
Answer: a Functional decomposition is part of the Design System Security Architecture activity of the ISSE process. |
16. |
Answer: b |
17. |
Answer: c |
18. |
Answer: a Security certification is performed in the Implementation phase. Validation (answer b) is not a phase of the SDLC. Answers c and d are additional phases of the SDLC. This activity has tasks that should be performed throughout the ISSE process. |
19. |
Answer: d Answers A, B, and C are outputs of the Certification and Accreditation process. |
20. |
Answer: d Defense of the enclave boundary is addressed in the Defense-In-Depth strategy. |
21. |
Answer: a |
22. |
Answer: a Security categorization, performed in the Initiation phase, defines low, moderate, or high levels of potential impact on organizations in the event of a security breach. Answers b and c are other phases of the SDLC. Answer d is not a phase of the SDLC. |
23. |
Answer: d Answer d is a distracter. The other two types of attacks, in addition to passive attacks (answer a), active attacks (answer b), and close-in attacks (answer c), are insider and distribution attacks. |
24. |
Answer: a Preliminary risk assessment is performed in the Initiation phase of the SDLC. Additional activities under the Acquisition/Development phase of the SDLC are risk assessment, assurance requirements analysis security, security planning, and security control development. |
25. |
Answer: d |
26. |
Answer: b Additional activities under the Acquisition/Development phase include requirements analysis, alternatives analysis, and a software conversion study. |
27. |
Answer: b The spiral model depicts the acquisition management process as a set of phases and decision points in a circular representation. The other answers are distracters. |
28. |
Answer: c Answer a is a threat source, answer b defines risk, and answer d is the definition of vulnerability. |
29. |
Answer: a |
30. |
Answer: b Technical Management |
31. |
Answer: c The SSE-CMM defines two dimensions that are used to measure the capability of an organization to perform specific activities, the domain dimension and the capability dimension. The domain dimension consists of all the practices that collectively define security engineering. The capability dimension represents practices that indicate process management and institutionalization capability. |
32. |
Answer: b Level 5, “Continuously Improving,” is the highest level. A statement characterizing this level would be: “A culture of continuous improvement requires a foundation of sound management practice, defined processes, and measurable goals.” |
33. |
Answer: c In the Defense sector, a TEMP is required for most large programs and includes the planning and implementation of procedures for the Development Test and Evaluation (DT&E) and Operational Test and Evaluation (OT&E). DT&E basically equates to the Analytical, Type 1, and Type 2 testing, and OT&E is equivalent to Type 3 and Type 4 testing. |
34. |
Answer: a The lowest level, Level 1, “Performed Informally,” focuses on whether an organization or project performs a process that incorporates the BPs. The attribute of this level simply requires that the BPs are performed. |
35. |
Answer: a Cost control starts with the initial development of cost estimates for the program and continues with the functions of cost, monitoring, and the collection of cost data, the analysis of the data, and the immediate initiation of corrective action. Cost control requires good overall cost management, including:
|
36. |
Answer: d The SSE-CMM, not the SE-CMM, goal is to define, improve, and assess security engineering capability. The SE-CMM goal is to improve the system or product engineering process. The SE-CMM describes the essential elements of an organization’s systems engineering process that must exist in order to ensure good systems engineering. It also provides a reference to compare existing systems engineering practices against the essential systems engineering elements described in the model. |
37. |
Answer: d Testing and evaluation processes often involves several stages of testing categories or phases, such as:
|
38. |
Answer: a Answer a is an activity of outsourcing. The cost control process includes:
|
39. |
Answer: b Developing a functional cost reporting capability is a function of Cost Control. The order of activities for the outsourcing process are:
|
40. |
Answer: b The WBS structure generally includes three levels of activity:
|
41. |
Answer: a The five phases of the IDEAL model are:
|
42. |
Answer: b The definition of systems engineering on which the SE-CMM is based is defined as the selective application of scientific and engineering efforts to:
Answer a describes a system, answer c describes the SOW, and answer d describes outsourcing. |
43. |
Answer: d The WBS provides many benefits, such as:
Answer d describes a benefit of systems engineering. |
44. |
Answer: c The Statement of Work (SOW) is a narrative description of the work required for a given project. It includes:
Answer c is an example of a SSE-CMM Best Practice. |
45. |
Answer: a Testing and evaluation processes often involve several stages of testing categories or phases, such as:
|
46. |
Answer: c |
47. |
Answer: a The Statement of Work is a narrative description of the work required for a given project. Answer b describes a “system” as defined by the SECMM, answer c describes outsourcing, and answer d describes a function of Cost Control. |
48. |
Answer: a BPs are mandatory characteristics that must exist within an implemented security engineering process before an organization can claim satisfaction in a given PA. The GPs are ordered in degrees of maturity and are grouped to form and distinguish among five levels of security engineering maturity. The other answers are distracters. |
49. |
Answer: b In the SE-CMM, a system is defined as:
|
50. |
Answer: b The Learning phase is both the final stage of the initial process improvement cycle and the initial phase of the next process improvement effort. Based on the analysis of the improvement effort itself, the lessons learned are translated into recommendations for improving subsequent improvement efforts. Answer a describes the Acting phase, answer c describes the Diagnosing phase, and answer d describes the Establishing phase. |
51. |
Answer: b The SEMP contains detailed statements of how the systems security engineering functions are to be carried out during development. Two elements of the SEMP are:
Answer b describes a goal of process improvement. |
52. |
Answer: d The order of activities in the IDEAL model is Initiating, Diagnosing, Establishing, Acting, and Learning. |
53. |
Answer: d The SEMP is intended to be a dynamic document. It starts as an outline and is updated as the security system development process goes on, and contains detailed statements of how the systems security engineering functions are to be carried out during development. The SEMP covers all management functions associated with the performance of security systems engineering activities for a given program. |
54. |
Answer: a The term suppliers is defined here as a broad class of external organizations that provide products, components, materials, and/or services to a producer or prime contractor. Answers b and c describe a system, and answer d is a distracter. |
55. |
Answer: b The basic premise of process improvement is that the quality of services produced is a direct function of the quality of the associated development and maintenance processes. Answers a and c describe knowledge or assumptions required to implement a successful security engineering process improvement activity, but not the main premise. Answer d is a distracter. |
56. |
Answer: d The Work Breakdown Structure (WBS) is an important technique to ensure that all essential tasks are properly defined, assigned, scheduled, and controlled. It contains a hierarchical structure of the tasks to be accomplished during the project. The WBS may be a contractual requirement in competitive bid system developments. Answers a, c, and d are attributes of the WBS, not its main purpose. |
57. |
Answer: a Development Program Planning and Control describes the security systems security engineering tasks that must be implemented to manage the development phase of the security program, including:
Answer a is an activity of the Security Systems Engineering Process element of the SEMP. |
58. |
Answer: a After the generation of the SOW and the identification of the organizational structure, one of the initial steps in program planning is the development of the Work Breakdown Structure (WBS). The other answers are distracters. |
59. |
Answer: c The five levels are: Level 1, Performed Informally; Level 2, Planned and Tracked; Level 3, Well Defined; Level 4, Quantitatively Controlled; and Level 5, Continuously Improving. |
60. |
Answer: d The correct order of activities in the security system design testing process is Planning, Acquisition, Testing, Analysis, and Correction. Certification and Accreditation See Chapter 11 Assessment Questions. U.S. Government Information Assurance Regulations |
61. |
Answer: b. Answer a is a distracter. Operational controls (answer c) are security controls that are usually implemented by people instead of systems, and technical controls (answer d) are security controls that the computer system executes. |
62. |
Answer: a |
63. |
Answer: c Answer a is a definition of data integrity, answer b defines authentication, and answer d describes confidentiality. |
64. |
Answer: c Answers a and b are distracters. Answer d refers to a “nonhierarchical grouping of sensitive information used to control access to data more finely than with hierarchical security classification alone,” as defined in NSTISSI Publication No. 4009. |
65. |
Answer: b, Concept of Operations Answer a, QUADRANT, refers to technology that provides tamper-proof protection to cryptographic equipment. Answer c defines “a set of assurance requirements that represent a point on the Common Criteria predefined assurance scale,” and answer d is a “framework that assigns and portrays IA roles and behavior among all IT assets, and prescribes rules for interaction and connection.” |
66. |
Answer: c Answer a refers to the National Information Infrastructure (NII), answer b defines the Global Information Infrastructure (GII), and answer d defines a Policy Approving Authority (PAA). |
67. |
Answer: b Answer a refers to the concept of Tranquility, answer c refers to a Special Access Program (SAP), and answer d is distracter. |
68. |
Answer: b The other answers are distracters. |
69. |
Answer: d |
70. |
Answer: b Additional characteristics of a national information system include employing cryptographic activities related to national security, associated with equipment that is an integral part of a weapon or weapons system(s), and critical to the direct fulfillment of military or intelligence missions. |
71. |
Answer: c |
72. |
Answer: c The Director of the Office of Management and Budget (OMB) has the responsibility of overseeing government agency security policies and practices. Standards associated with national defense are still the responsibility of the DoD and NSA. |
73. |
Answer: b |
74. |
Answer: d |
75. |
Answer: b The other answers are distracters. |
76. |
Answer: b |
77. |
Answer: b |
78. |
Answer: c Answer a refers to a device embodying a communications security (COMSEC) design that NSA has approved as a CCI. Answer b is part of a CCI that does not perform the entire COMSEC function but depends upon the host equipment, or assembly, to complete and operate the COMSEC function. Answer d is a device or electronic key used to unlock the secure mode of crypto-equipment. |
79. |
Answer: d Answers a, b, and c are distracters. |
80. |
Answer: a The other answers are distracters. |
81. |
Answer: b Answers a and d are distracters. PII (answer c) is usually associated with privacy. An example of PII is a person’s health care information. |
82. |
Answer: a Answers b, c, and d are distracters. |
83. |
Answer: c |
84. |
Answer: b Answers a, c, and d are distracters. |
85. |
Answer: c Answers a and b are distracters. Answer d, a Type 2 product, defines unclassified cryptographic equipment, assembly, or component endorsed by the NSA for use in national security systems as defined in Title 40 U.S.C. § 1452. |
86. |
Answer: d This responsibility is assigned to the OMB. |
87. |
Answer: a |
88. |
Answer: b |
89. |
Answer: c |
90. |
Answer: a Answers b, c, and d are distracters. |
Appendix E
1. |
Which one of the following is not one of the five system life cycle planning phases as defined in NIST SP 800-14?
|
|
2. |
The IATF document 3.1 stresses that information assurance relies on three critical components. Which one of the following answers correctly lists these components?
|
|
3. |
Risk management, as defined in NIST SP 800-30, comprises which three processes?
|
|
4. |
In the system development life cycle, SDLC, or system life cycle as it is sometimes called, in which one of the of the five phases are the system security features configured, enabled, tested, and verified?
|
|
5. |
Which one of he following activities is performed in the Development/Acquisition phase of the SDLC?
|
|
6. |
In NIST SP 800-30, risk is defined as a function of which set of the following items?
|
|
7. |
The risk assessment methodology described in NIST SP 800-30 comprises nine primary steps. Which one of the following is not one of these steps?
|
|
8. |
Which one of the following items is not one of the activities of the generic systems engineering (SE) process?
|
|
9. |
The elements of Discover Information Protection Needs, Develop Detailed Security Design, and Assess Information Protection Effectiveness are part of what process?
|
|
10. |
In the ISSE process, information domains are defined under the Discover Information Protection Needs process. Which one of the following tasks is not associated with the information domain?
|
|
11. |
As part of the Define System Security Requirements activity of the ISSE process, the information systems security engineer identifies and selects a solution set that can satisfy the requirements of the IPP. Which one of the following elements is not a component of the solution set?
|
|
12. |
The information systems security engineer’s tasks of cataloging candidate commercial off-the-shelf (COTS) products, government off-the-shelf (GOTS) products, and custom security products are performed in which one of the following ISSE process activities?
|
|
13. |
Which ISSE activity includes conducting unit testing of components, integration testing, and developing installation and operational procedures?
|
|
14. |
Security certification is performed in which phase of the SDLC?
|
|
15. |
The certification and accreditation process receives inputs from the ISSE process. These inputs are which one of the following items?
|
|
16. |
Security categorization is part of which phase of the SDLC?
|
|
17. |
Which one of the following items is not an activity under the Acquisition/Development phase of the SDLC?
|
|
18. |
According to NIST SP 800-64, which phase of the SDLC includes the activities of functional statement of need, market research, cost-benefit analysis, and a cost analysis?
|
|
19. |
In NIST SP 800-30, a threat is defined as which one of the following items?
|
|
20. |
Questionnaires, on-site interviews, review of documents, and automated scanning tools are primarily used to gather information for which one of the following steps of the risk assessment process?
|
|
21. |
In performing an impact analysis as part of the risk assessment process, three important factors should be considered in calculating the negative impact. Which one of the following items is not one of these factors?
|
|
22. |
Which choice would not be considered an operations management task related to system maintenance?
|
|
23. |
Which task is not a common incident reporting task?
|
|
24. |
Which choice accurately describes a task of operations security?
|
|
25. |
Which choice would not be considered an element of managing operations security compliance?
|
|
Answers
1. |
Answer: b The requirements phase is not one of the five system life cycle planning phases. The other two phases of the system life cycle are the Development/Acquisition phase and the Operations phase. |
2. |
Answer: d Answers a, b, and c are distracters. |
3. |
Answer: a Answers b, c, and d are distracters. |
4. |
Answer: c |
5. |
Answer: b Answer a refers to the Initiation phase; answer c refers to the Operation/Maintenance phase; and answer d refers to the Disposal phase. |
6. |
Answer: a Answers b, c, and d are distracters. |
7. |
Answer: d Delineating accreditation boundaries is a subset of answer a, system characterization. |
8. |
Answer: c Obtaining accreditation is not one of the SE process activities. The other SE process activities are to design system architecture, to develop detailed design, and to implement the system. |
9. |
Answer: b |
10. |
Answer: d |
11. |
Answer: a Functional decomposition is part of the Design System Security Architecture activity of the ISSE process. |
12. |
Answer: b |
13. |
Answer: c |
14. |
Answer: a Answer b, Validation, is not a phase of the SDLC. Answers c and d are additional phases of the SDLC. |
15. |
Answer: d Answers a, b, and c are outputs of the Certification and Accreditation process. |
16. |
Answer: a Security categorization defines low, moderate, or high levels of potential impact on organizations as a result of a security breach. Answers b and c are other phases of the SDLC. Answer d is not a phase of the SDLC. |
17. |
Answer: a This activity is performed in the initiation phase of the SDLC. Additional activities under the acquisition/development phase of the SDLC are risk assessment, assurance requirements analysis security, security planning, and security control development. |
18. |
Answer: b Additional activities under this phase include requirements analysis, alternatives analysis, and a software conversion study. |
19. |
Answer: c Answer a is a threat source, answer b defines risk, and answer d is the definition of vulnerability. |
20. |
Answer: a |
21. |
Answer: b |
22. |
Answer: c |
23. |
Answer: b |
24. |
Answer: a |
25. |
Answer: a |