SlideShare a Scribd company logo
Demo Edition
© 2013 - 2014 TroyTec, LTD All Rights Reserved
Certified Information Systems
Security Professional
Exam: CISSP
CISSP
1 http://www.troytec.com
Section 1: Sec One (1 to 250)
Details: Topic 1, Access Control
QUESTION: 1
A potential problem related to the physical installation of the Iris Scanner in regards
to the usage of the iris pattern within a biometric system is:
A. Concern that the laser beam may cause eye damage.
B. The iris pattern changes as a person grows older.
C. There is a relatively high rate of false accepts.
D. The optical unit must be positioned so that the sun does not shine into the
aperture.
Answer: D
Explanation:
Because the optical unit utilizes a camera and infrared light to create the images, sun
light can impact the aperture so it must not be positioned in direct light of any type.
Because the subject does not need to have direct contact with the optical reader,
direct light can impact the reader. An Iris recognition is a form of biometrics that is
based on the uniqueness of a subject's iris. A camera like device records the patterns
of the iris creating what is known as Iriscode. It is the unique patterns of the iris that
allow it to be one of the most accurate forms of biometric identification of an
individual. Unlike other types of biometics, the iris rarely changes over time.
Fingerprints can change over time due to scaring and manual labor, voice patterns
can change due to a variety of causes, hand geometry can also change as well. But
barring surgery or an accident it is not usual for an iris to change. The subject has a
high-resoulution image taken of their iris and this is then converted to Iriscode. The
current standard for the Iriscode was developed by John Daugman. When the subject
attempts to be authenticated an infrared light is used to capture the iris image and
this image is then compared to the Iriscode. If there is a match the subject's identity
is confirmed. The subject does not need to have direct contact with the optical reader
so it is a less invasive means of authentication then retinal scanning would be.
Reference:
(s) used for this question: AIO, 3rd edition, Access Control, p 134
AIO, 4th edition, Access Control, p 182
Wikipedia - http://en.wikipedia.org/wiki/Iris_recognition
The following answers are incorrect:
CISSP
2 http://www.troytec.com
Concern that the laser beam may cause eye damage. The optical readers do not use
laser so, concern that the laser beam may cause eye damage is not an issue.
The iris pattern changes as a person grows older. The question asked about the
physical installation of the scanner, so this was not the best answer. If the question
would have been about long term problems then it could have been the best choice.
Recent research has shown that Irises actually do change over time:
http://www.nature.com/news/ageing- eyes-hinder-biometric-scans-110722
There is a relatively high rate of false accepts. Since the advent of the Iriscode there
is a very low rate of false accepts, in fact the algorithm used has never had a false
match. This all depends on the quality of the equipment used but because of the
uniqueness of the iris even when comparing identical twins, iris patterns are unique.
QUESTION: 2
In Mandatory Access Control, sensitivity labels attached to object contain what
information?
A. The item's classification
B. The item's classification and category set
C. The item's category
D. The items's need to know
Answer: B
Explanation:
The following is the correct answer: the item's classification and category set.
A Sensitivity label must contain at least one classification and one category set.
Category set and Compartment set are synonyms, they mean the same thing. The
sensitivity label must contain at least one Classification and at least one Category. It
is common in some environments for a single item to belong to multiple categories.
The list of all the categories to which an item belongs is called a compartment set or
category set.
The following answers are incorrect:
The item's classification. Is incorrect because you need a category set as well.
The item's category. Is incorrect because category set and classification would be
both be required.
The item's need to know. Is incorrect because there is no such thing. The need to
know is indicated by the catergories the object belongs to. This is NOT the best
answer.
Reference:
(s) used for this question:
CISSP
3 http://www.troytec.com
OIG CBK, Access Control (pages 186 - 188)
AIO, 3rd Edition, Access Control (pages 162 - 163) AIO, 4th Edition, Access
Control, pp 212-214
Wikipedia - http://en.wikipedia.org/wiki/Mandatory_Access_Control
QUESTION: 3
Which of the following is true about Kerberos?
A. It utilizes public key cryptography.
B. It encrypts data after a ticket is granted, but passwords are exchanged in plain
text.
C. It depends upon symmetric ciphers.
D. It is a second party authentication system.
Answer: C
Explanation:
Kerberos depends on secret keys (symmetric ciphers). Kerberos is a third party
authentication protocol. It was designed and developed in the mid 1980's by MIT. It
is considered open source but is copyrighted and owned by MIT. It relies on the
user's secret keys. The password is used to encrypt and decrypt the keys.
The following answers are incorrect:
It utilizes public key cryptography. Is incorrect because Kerberos depends on secret
keys (symmetric ciphers).
It encrypts data after a ticket is granted, but passwords are exchanged in plain text.
Is incorrect because the passwords are not exchanged but used for encryption and
decryption of the keys.
It is a second party authentication system. Is incorrect because Kerberos is a third
party authentication system, you authenticate to the third party (Kerberos) and not
the system you are accessing.
Reference: s:
MIT http://web.mit.edu/kerberos/
Wikipedi http://en.wikipedia.org/wiki/Kerberos_%28protocol%29
OIG CBK Access Control (pages 181 - 184) AIOv3 Access Control (pages 151 -
155)
QUESTION: 4
Which of the following is needed for System Accountability?
CISSP
4 http://www.troytec.com
A. Audit mechanisms.
B. Documented design as laid out in the Common Criteria.
C. Authorization.
D. Formal verification of system design.
Answer: A
Explanation:
Is a means of being able to track user actions. Through the use of audit logs and
other tools the user actions are recorded and can be used at a later date to verify
what actions were performed. Accountability is the ability to identify users and to be
able to track user actions.
The following answers are incorrect:
Documented design as laid out in the Common Criteria. Is incorrect because the
Common Criteria is an international standard to evaluate trust and would not be a
factor in System Accountability.
Authorization. Is incorrect because Authorization is granting access to subjects, just
because you have authorization does not hold the subject accountable for their
actions.
Formal verification of system design. Is incorrect because all you have done is to
verify the system design and have not taken any steps toward system accountability.
Reference: s:
OIG CBK Glossary (page 778)
QUESTION: 5
What is Kerberos?
A. A three-headed dog from the egyptian mythology.
B. A trusted third-party authentication protocol.
C. A security model.
D. A remote authentication dial in user server.
Answer: B
Explanation:
Is correct because that is exactly what Kerberos is.
The following answers are incorrect:
CISSP
5 http://www.troytec.com
A three-headed dog from Egyptian mythology. Is incorrect because we are dealing
with Information Security and not the Egyptian mythology but the Greek
Mythology. A security model. Is incorrect because Kerberos is an authentication
protocol and not just a security model. A remote authentication dial in user server. Is
incorrect because Kerberos is not a remote authentication dial in user server that
would be called RADIUS.
CISSP
6 http://www.troytec.com

More Related Content

What's hot

Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)
Bhargav Amin
 
Attack Vectors in Biometric Recognition Systems
Attack Vectors in Biometric Recognition SystemsAttack Vectors in Biometric Recognition Systems
Attack Vectors in Biometric Recognition Systems
Clare Nelson, CISSP, CIPP-E
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry Pi
IJTET Journal
 
face recognition
face recognitionface recognition
face recognition
vipin varghese
 
Iciea08
Iciea08Iciea08
Iciea08
Hanaa Salman
 
Face Recognition report
Face Recognition reportFace Recognition report
Face Recognition report
lavanya693
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
IRJET Journal
 
A novel fast-chaff-point-generation-method-using-bioinspired-flower-pollinati...
A novel fast-chaff-point-generation-method-using-bioinspired-flower-pollinati...A novel fast-chaff-point-generation-method-using-bioinspired-flower-pollinati...
A novel fast-chaff-point-generation-method-using-bioinspired-flower-pollinati...
Karthikeyan Ece venkatesan
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devices
Swapnil Jagtap
 
43 automatic
43 automatic43 automatic
43 automatic
aissmsblogs
 
Facial Recognition System
Facial Recognition SystemFacial Recognition System
Facial Recognition System
Arun ACE
 

What's hot (11)

Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)
 
Attack Vectors in Biometric Recognition Systems
Attack Vectors in Biometric Recognition SystemsAttack Vectors in Biometric Recognition Systems
Attack Vectors in Biometric Recognition Systems
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry Pi
 
face recognition
face recognitionface recognition
face recognition
 
Iciea08
Iciea08Iciea08
Iciea08
 
Face Recognition report
Face Recognition reportFace Recognition report
Face Recognition report
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
 
A novel fast-chaff-point-generation-method-using-bioinspired-flower-pollinati...
A novel fast-chaff-point-generation-method-using-bioinspired-flower-pollinati...A novel fast-chaff-point-generation-method-using-bioinspired-flower-pollinati...
A novel fast-chaff-point-generation-method-using-bioinspired-flower-pollinati...
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devices
 
43 automatic
43 automatic43 automatic
43 automatic
 
Facial Recognition System
Facial Recognition SystemFacial Recognition System
Facial Recognition System
 

Similar to CISSP Exam-Certified Information Systems Security Professional

Cissp actual exam
Cissp actual examCissp actual exam
Cissp actual exam
dannykirk1221
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal Conference
Hemanth Kumar
 
I017335457
I017335457I017335457
I017335457
IOSR Journals
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”
iosrjce
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
IRJET Journal
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET Journal
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
IJERA Editor
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
Kailas Patil
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
ShubhamYadav769267
 
Final report
Final reportFinal report
Final report
Pranjul Mishra
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison study
acijjournal
 
Ko3618101814
Ko3618101814Ko3618101814
Ko3618101814
IJERA Editor
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
branjith
 
Seetu
SeetuSeetu
Answer below questions in 250 to 300 words each.a) In no les.docx
Answer below questions in 250 to 300 words each.a) In no les.docxAnswer below questions in 250 to 300 words each.a) In no les.docx
Answer below questions in 250 to 300 words each.a) In no les.docx
YASHU40
 
India's UID Project: Biometrics Vulnerabilities & Exploits
India's UID Project: Biometrics Vulnerabilities & ExploitsIndia's UID Project: Biometrics Vulnerabilities & Exploits
India's UID Project: Biometrics Vulnerabilities & Exploits
Anivar Aravind
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
Maria Perkins
 
Iris scanning
Iris scanningIris scanning
Iris scanning
Ankit Kumar
 
Survey on Graphical Password by Image Segmentation 2021 2022
Survey on Graphical Password by Image Segmentation 2021 2022Survey on Graphical Password by Image Segmentation 2021 2022
Survey on Graphical Password by Image Segmentation 2021 2022
ijtsrd
 
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
CSCJournals
 

Similar to CISSP Exam-Certified Information Systems Security Professional (20)

Cissp actual exam
Cissp actual examCissp actual exam
Cissp actual exam
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal Conference
 
I017335457
I017335457I017335457
I017335457
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
Final report
Final reportFinal report
Final report
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison study
 
Ko3618101814
Ko3618101814Ko3618101814
Ko3618101814
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Seetu
SeetuSeetu
Seetu
 
Answer below questions in 250 to 300 words each.a) In no les.docx
Answer below questions in 250 to 300 words each.a) In no les.docxAnswer below questions in 250 to 300 words each.a) In no les.docx
Answer below questions in 250 to 300 words each.a) In no les.docx
 
India's UID Project: Biometrics Vulnerabilities & Exploits
India's UID Project: Biometrics Vulnerabilities & ExploitsIndia's UID Project: Biometrics Vulnerabilities & Exploits
India's UID Project: Biometrics Vulnerabilities & Exploits
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Survey on Graphical Password by Image Segmentation 2021 2022
Survey on Graphical Password by Image Segmentation 2021 2022Survey on Graphical Password by Image Segmentation 2021 2022
Survey on Graphical Password by Image Segmentation 2021 2022
 
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
 

More from Isabella789

T7 Exam-International Financial Reporting Standards for Compensation Professi...
T7 Exam-International Financial Reporting Standards for Compensation Professi...T7 Exam-International Financial Reporting Standards for Compensation Professi...
T7 Exam-International Financial Reporting Standards for Compensation Professi...
Isabella789
 
T7 Exam-International Financial Reporting Standards for Compensation Professi...
T7 Exam-International Financial Reporting Standards for Compensation Professi...T7 Exam-International Financial Reporting Standards for Compensation Professi...
T7 Exam-International Financial Reporting Standards for Compensation Professi...
Isabella789
 
1Z0-400 Exam-Oracle Communications Session Border Controller
1Z0-400 Exam-Oracle Communications Session Border Controller1Z0-400 Exam-Oracle Communications Session Border Controller
1Z0-400 Exam-Oracle Communications Session Border Controller
Isabella789
 
2V0-622 Exam-VMware Certified Professional 6.5 – Data Center Virtualization (...
2V0-622 Exam-VMware Certified Professional 6.5 – Data Center Virtualization (...2V0-622 Exam-VMware Certified Professional 6.5 – Data Center Virtualization (...
2V0-622 Exam-VMware Certified Professional 6.5 – Data Center Virtualization (...
Isabella789
 
HP2-B129 Exam-HP Document Solutions Technical Fundamentals (LAR)
HP2-B129 Exam-HP Document Solutions Technical Fundamentals (LAR) HP2-B129 Exam-HP Document Solutions Technical Fundamentals (LAR)
HP2-B129 Exam-HP Document Solutions Technical Fundamentals (LAR)
Isabella789
 
210-250 Exam-Understanding Cisco Cybersecurity Fundamentals
210-250 Exam-Understanding Cisco Cybersecurity Fundamentals 210-250 Exam-Understanding Cisco Cybersecurity Fundamentals
210-250 Exam-Understanding Cisco Cybersecurity Fundamentals
Isabella789
 
70 334 exam-core solutions of microsoft skype for business (beta)
70 334 exam-core solutions of microsoft skype for business (beta)70 334 exam-core solutions of microsoft skype for business (beta)
70 334 exam-core solutions of microsoft skype for business (beta)
Isabella789
 
400-351 Exam-CCIE Wireless
400-351 Exam-CCIE Wireless  400-351 Exam-CCIE Wireless
400-351 Exam-CCIE Wireless
Isabella789
 
1 y0 311 exam-citrix xenapp and xendesktop 7.15 ltsr advanced administration
1 y0 311 exam-citrix xenapp and xendesktop 7.15 ltsr advanced administration1 y0 311 exam-citrix xenapp and xendesktop 7.15 ltsr advanced administration
1 y0 311 exam-citrix xenapp and xendesktop 7.15 ltsr advanced administration
Isabella789
 
1z0 034 exam-upgrade oracle9i10g oca to oracle database 11g ocp
1z0 034 exam-upgrade oracle9i10g oca to oracle database 11g ocp1z0 034 exam-upgrade oracle9i10g oca to oracle database 11g ocp
1z0 034 exam-upgrade oracle9i10g oca to oracle database 11g ocp
Isabella789
 
70-414 exam-implementing an advanced server infrastructure
70-414 exam-implementing an advanced server infrastructure70-414 exam-implementing an advanced server infrastructure
70-414 exam-implementing an advanced server infrastructure
Isabella789
 
1Z0-027 Exam-Oracle Exadata Database Machine Administration, Software Release
1Z0-027 Exam-Oracle Exadata Database Machine Administration, Software Release1Z0-027 Exam-Oracle Exadata Database Machine Administration, Software Release
1Z0-027 Exam-Oracle Exadata Database Machine Administration, Software Release
Isabella789
 
210 250 exam-understanding cisco cybersecurity fundamentals
210 250 exam-understanding cisco cybersecurity fundamentals210 250 exam-understanding cisco cybersecurity fundamentals
210 250 exam-understanding cisco cybersecurity fundamentals
Isabella789
 
1z0-204 Exam-Oracle EBS R12: E-Business Essentials
1z0-204 Exam-Oracle EBS R12: E-Business Essentials 1z0-204 Exam-Oracle EBS R12: E-Business Essentials
1z0-204 Exam-Oracle EBS R12: E-Business Essentials
Isabella789
 
1z0 061 exam-oracle database 12c sql fundamentals
1z0 061 exam-oracle database 12c sql fundamentals1z0 061 exam-oracle database 12c sql fundamentals
1z0 061 exam-oracle database 12c sql fundamentals
Isabella789
 
1y0 230 exam-citrix netscaler 12 essentials
1y0 230 exam-citrix netscaler 12 essentials1y0 230 exam-citrix netscaler 12 essentials
1y0 230 exam-citrix netscaler 12 essentials
Isabella789
 
Pmi acp exa- pmi agile certified practitioner
Pmi acp exa- pmi agile certified practitionerPmi acp exa- pmi agile certified practitioner
Pmi acp exa- pmi agile certified practitioner
Isabella789
 
1z0 851 exam-java standard edition 6 programmer certified professional
1z0 851 exam-java standard edition 6 programmer certified professional1z0 851 exam-java standard edition 6 programmer certified professional
1z0 851 exam-java standard edition 6 programmer certified professional
Isabella789
 
200-355 Exam-Implementing Cisco Wireless Network Fundamentals
200-355 Exam-Implementing Cisco Wireless Network Fundamentals 200-355 Exam-Implementing Cisco Wireless Network Fundamentals
200-355 Exam-Implementing Cisco Wireless Network Fundamentals
Isabella789
 
Jn0 420 exam-jncis-dev ops
Jn0 420 exam-jncis-dev opsJn0 420 exam-jncis-dev ops
Jn0 420 exam-jncis-dev ops
Isabella789
 

More from Isabella789 (20)

T7 Exam-International Financial Reporting Standards for Compensation Professi...
T7 Exam-International Financial Reporting Standards for Compensation Professi...T7 Exam-International Financial Reporting Standards for Compensation Professi...
T7 Exam-International Financial Reporting Standards for Compensation Professi...
 
T7 Exam-International Financial Reporting Standards for Compensation Professi...
T7 Exam-International Financial Reporting Standards for Compensation Professi...T7 Exam-International Financial Reporting Standards for Compensation Professi...
T7 Exam-International Financial Reporting Standards for Compensation Professi...
 
1Z0-400 Exam-Oracle Communications Session Border Controller
1Z0-400 Exam-Oracle Communications Session Border Controller1Z0-400 Exam-Oracle Communications Session Border Controller
1Z0-400 Exam-Oracle Communications Session Border Controller
 
2V0-622 Exam-VMware Certified Professional 6.5 – Data Center Virtualization (...
2V0-622 Exam-VMware Certified Professional 6.5 – Data Center Virtualization (...2V0-622 Exam-VMware Certified Professional 6.5 – Data Center Virtualization (...
2V0-622 Exam-VMware Certified Professional 6.5 – Data Center Virtualization (...
 
HP2-B129 Exam-HP Document Solutions Technical Fundamentals (LAR)
HP2-B129 Exam-HP Document Solutions Technical Fundamentals (LAR) HP2-B129 Exam-HP Document Solutions Technical Fundamentals (LAR)
HP2-B129 Exam-HP Document Solutions Technical Fundamentals (LAR)
 
210-250 Exam-Understanding Cisco Cybersecurity Fundamentals
210-250 Exam-Understanding Cisco Cybersecurity Fundamentals 210-250 Exam-Understanding Cisco Cybersecurity Fundamentals
210-250 Exam-Understanding Cisco Cybersecurity Fundamentals
 
70 334 exam-core solutions of microsoft skype for business (beta)
70 334 exam-core solutions of microsoft skype for business (beta)70 334 exam-core solutions of microsoft skype for business (beta)
70 334 exam-core solutions of microsoft skype for business (beta)
 
400-351 Exam-CCIE Wireless
400-351 Exam-CCIE Wireless  400-351 Exam-CCIE Wireless
400-351 Exam-CCIE Wireless
 
1 y0 311 exam-citrix xenapp and xendesktop 7.15 ltsr advanced administration
1 y0 311 exam-citrix xenapp and xendesktop 7.15 ltsr advanced administration1 y0 311 exam-citrix xenapp and xendesktop 7.15 ltsr advanced administration
1 y0 311 exam-citrix xenapp and xendesktop 7.15 ltsr advanced administration
 
1z0 034 exam-upgrade oracle9i10g oca to oracle database 11g ocp
1z0 034 exam-upgrade oracle9i10g oca to oracle database 11g ocp1z0 034 exam-upgrade oracle9i10g oca to oracle database 11g ocp
1z0 034 exam-upgrade oracle9i10g oca to oracle database 11g ocp
 
70-414 exam-implementing an advanced server infrastructure
70-414 exam-implementing an advanced server infrastructure70-414 exam-implementing an advanced server infrastructure
70-414 exam-implementing an advanced server infrastructure
 
1Z0-027 Exam-Oracle Exadata Database Machine Administration, Software Release
1Z0-027 Exam-Oracle Exadata Database Machine Administration, Software Release1Z0-027 Exam-Oracle Exadata Database Machine Administration, Software Release
1Z0-027 Exam-Oracle Exadata Database Machine Administration, Software Release
 
210 250 exam-understanding cisco cybersecurity fundamentals
210 250 exam-understanding cisco cybersecurity fundamentals210 250 exam-understanding cisco cybersecurity fundamentals
210 250 exam-understanding cisco cybersecurity fundamentals
 
1z0-204 Exam-Oracle EBS R12: E-Business Essentials
1z0-204 Exam-Oracle EBS R12: E-Business Essentials 1z0-204 Exam-Oracle EBS R12: E-Business Essentials
1z0-204 Exam-Oracle EBS R12: E-Business Essentials
 
1z0 061 exam-oracle database 12c sql fundamentals
1z0 061 exam-oracle database 12c sql fundamentals1z0 061 exam-oracle database 12c sql fundamentals
1z0 061 exam-oracle database 12c sql fundamentals
 
1y0 230 exam-citrix netscaler 12 essentials
1y0 230 exam-citrix netscaler 12 essentials1y0 230 exam-citrix netscaler 12 essentials
1y0 230 exam-citrix netscaler 12 essentials
 
Pmi acp exa- pmi agile certified practitioner
Pmi acp exa- pmi agile certified practitionerPmi acp exa- pmi agile certified practitioner
Pmi acp exa- pmi agile certified practitioner
 
1z0 851 exam-java standard edition 6 programmer certified professional
1z0 851 exam-java standard edition 6 programmer certified professional1z0 851 exam-java standard edition 6 programmer certified professional
1z0 851 exam-java standard edition 6 programmer certified professional
 
200-355 Exam-Implementing Cisco Wireless Network Fundamentals
200-355 Exam-Implementing Cisco Wireless Network Fundamentals 200-355 Exam-Implementing Cisco Wireless Network Fundamentals
200-355 Exam-Implementing Cisco Wireless Network Fundamentals
 
Jn0 420 exam-jncis-dev ops
Jn0 420 exam-jncis-dev opsJn0 420 exam-jncis-dev ops
Jn0 420 exam-jncis-dev ops
 

Recently uploaded

Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
ssuser13ffe4
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdfIGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
Amin Marwan
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
Chevonnese Chevers Whyte, MBA, B.Sc.
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 

Recently uploaded (20)

Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdfIGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 

CISSP Exam-Certified Information Systems Security Professional

  • 1. Demo Edition © 2013 - 2014 TroyTec, LTD All Rights Reserved Certified Information Systems Security Professional Exam: CISSP CISSP 1 http://www.troytec.com
  • 2. Section 1: Sec One (1 to 250) Details: Topic 1, Access Control QUESTION: 1 A potential problem related to the physical installation of the Iris Scanner in regards to the usage of the iris pattern within a biometric system is: A. Concern that the laser beam may cause eye damage. B. The iris pattern changes as a person grows older. C. There is a relatively high rate of false accepts. D. The optical unit must be positioned so that the sun does not shine into the aperture. Answer: D Explanation: Because the optical unit utilizes a camera and infrared light to create the images, sun light can impact the aperture so it must not be positioned in direct light of any type. Because the subject does not need to have direct contact with the optical reader, direct light can impact the reader. An Iris recognition is a form of biometrics that is based on the uniqueness of a subject's iris. A camera like device records the patterns of the iris creating what is known as Iriscode. It is the unique patterns of the iris that allow it to be one of the most accurate forms of biometric identification of an individual. Unlike other types of biometics, the iris rarely changes over time. Fingerprints can change over time due to scaring and manual labor, voice patterns can change due to a variety of causes, hand geometry can also change as well. But barring surgery or an accident it is not usual for an iris to change. The subject has a high-resoulution image taken of their iris and this is then converted to Iriscode. The current standard for the Iriscode was developed by John Daugman. When the subject attempts to be authenticated an infrared light is used to capture the iris image and this image is then compared to the Iriscode. If there is a match the subject's identity is confirmed. The subject does not need to have direct contact with the optical reader so it is a less invasive means of authentication then retinal scanning would be. Reference: (s) used for this question: AIO, 3rd edition, Access Control, p 134 AIO, 4th edition, Access Control, p 182 Wikipedia - http://en.wikipedia.org/wiki/Iris_recognition The following answers are incorrect: CISSP 2 http://www.troytec.com
  • 3. Concern that the laser beam may cause eye damage. The optical readers do not use laser so, concern that the laser beam may cause eye damage is not an issue. The iris pattern changes as a person grows older. The question asked about the physical installation of the scanner, so this was not the best answer. If the question would have been about long term problems then it could have been the best choice. Recent research has shown that Irises actually do change over time: http://www.nature.com/news/ageing- eyes-hinder-biometric-scans-110722 There is a relatively high rate of false accepts. Since the advent of the Iriscode there is a very low rate of false accepts, in fact the algorithm used has never had a false match. This all depends on the quality of the equipment used but because of the uniqueness of the iris even when comparing identical twins, iris patterns are unique. QUESTION: 2 In Mandatory Access Control, sensitivity labels attached to object contain what information? A. The item's classification B. The item's classification and category set C. The item's category D. The items's need to know Answer: B Explanation: The following is the correct answer: the item's classification and category set. A Sensitivity label must contain at least one classification and one category set. Category set and Compartment set are synonyms, they mean the same thing. The sensitivity label must contain at least one Classification and at least one Category. It is common in some environments for a single item to belong to multiple categories. The list of all the categories to which an item belongs is called a compartment set or category set. The following answers are incorrect: The item's classification. Is incorrect because you need a category set as well. The item's category. Is incorrect because category set and classification would be both be required. The item's need to know. Is incorrect because there is no such thing. The need to know is indicated by the catergories the object belongs to. This is NOT the best answer. Reference: (s) used for this question: CISSP 3 http://www.troytec.com
  • 4. OIG CBK, Access Control (pages 186 - 188) AIO, 3rd Edition, Access Control (pages 162 - 163) AIO, 4th Edition, Access Control, pp 212-214 Wikipedia - http://en.wikipedia.org/wiki/Mandatory_Access_Control QUESTION: 3 Which of the following is true about Kerberos? A. It utilizes public key cryptography. B. It encrypts data after a ticket is granted, but passwords are exchanged in plain text. C. It depends upon symmetric ciphers. D. It is a second party authentication system. Answer: C Explanation: Kerberos depends on secret keys (symmetric ciphers). Kerberos is a third party authentication protocol. It was designed and developed in the mid 1980's by MIT. It is considered open source but is copyrighted and owned by MIT. It relies on the user's secret keys. The password is used to encrypt and decrypt the keys. The following answers are incorrect: It utilizes public key cryptography. Is incorrect because Kerberos depends on secret keys (symmetric ciphers). It encrypts data after a ticket is granted, but passwords are exchanged in plain text. Is incorrect because the passwords are not exchanged but used for encryption and decryption of the keys. It is a second party authentication system. Is incorrect because Kerberos is a third party authentication system, you authenticate to the third party (Kerberos) and not the system you are accessing. Reference: s: MIT http://web.mit.edu/kerberos/ Wikipedi http://en.wikipedia.org/wiki/Kerberos_%28protocol%29 OIG CBK Access Control (pages 181 - 184) AIOv3 Access Control (pages 151 - 155) QUESTION: 4 Which of the following is needed for System Accountability? CISSP 4 http://www.troytec.com
  • 5. A. Audit mechanisms. B. Documented design as laid out in the Common Criteria. C. Authorization. D. Formal verification of system design. Answer: A Explanation: Is a means of being able to track user actions. Through the use of audit logs and other tools the user actions are recorded and can be used at a later date to verify what actions were performed. Accountability is the ability to identify users and to be able to track user actions. The following answers are incorrect: Documented design as laid out in the Common Criteria. Is incorrect because the Common Criteria is an international standard to evaluate trust and would not be a factor in System Accountability. Authorization. Is incorrect because Authorization is granting access to subjects, just because you have authorization does not hold the subject accountable for their actions. Formal verification of system design. Is incorrect because all you have done is to verify the system design and have not taken any steps toward system accountability. Reference: s: OIG CBK Glossary (page 778) QUESTION: 5 What is Kerberos? A. A three-headed dog from the egyptian mythology. B. A trusted third-party authentication protocol. C. A security model. D. A remote authentication dial in user server. Answer: B Explanation: Is correct because that is exactly what Kerberos is. The following answers are incorrect: CISSP 5 http://www.troytec.com
  • 6. A three-headed dog from Egyptian mythology. Is incorrect because we are dealing with Information Security and not the Egyptian mythology but the Greek Mythology. A security model. Is incorrect because Kerberos is an authentication protocol and not just a security model. A remote authentication dial in user server. Is incorrect because Kerberos is not a remote authentication dial in user server that would be called RADIUS. CISSP 6 http://www.troytec.com