#01 CISSP: Full Coverage Mastery Exam 1 - Challenging
Quiz
•
Computers
•
Professional Development
•
Hard
Kim undefined
FREE Resource
Enhance your content in a minute
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
As a security professional, you have been tasked with conducting a Business Impact Analysis (BIA) for the physical assets of your organization. You are aware that there are several key considerations that need to be taken into account. Which of the following is a key consideration when conducting a BIA for physical assets?
The level of encryption used on the assets
The type of access controls used on the assets
The criticality of the assets to business operations
The availability of the assets to users
Answer explanation
"The criticality of the assets to business operations". This is because a Business Impact Analysis primarily focuses on identifying the importance of different business functions and processes, and the necessity of specific assets to the continued operations of the business. While encryption and access controls are important security considerations, the BIA is more concerned with how critical the asset is to the business operations and what impact its loss would have. Availability is also a critical factor, but it is often considered within the context of how it affects the business operation's continuity and recovery objectives.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are a security professional working for a company that uses a cloud-based service to authenticate users through Security Assertion Markup Language (SAML) assertions. However, an attacker was able to intercept a SAML assertion during transmission and modify its content to gain unauthorized access to the system. Which of the following is the MOST common type of attack used to exploit this vulnerability?
Man-in-the-middle (MitM) attack
Cross-site scripting (XSS) attack
SQL injection (SQLi) attack
Denial-of-service (DoS) attack
Answer explanation
tions are intercepted and modified, it is indicative of a MitM attack, where the attacker has placed themselves in the communication path to capture and alter the SAML assertions being transmitted. This type of attack would allow an attacker to gain unauthorized access by impersonating a legitimate user or altering the assertion's content.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Considering current cybersecurity standards, which protocol among the following options is outdated and should be avoided due to its known vulnerabilities?
Secure Sockets Layer (SSL) 3.0
Internet Protocol Security (IPSec)
Secure Hash Algorithm 3 (SHA-3)
Transport Layer Security (TLS) 1.3
Answer explanation
"Secure Sockets Layer (SSL) 3.0". SSL 3.0 is an outdated protocol that has been superseded by the Transport Layer Security (TLS) protocols due to various well-known security issues, including the POODLE (Padding Oracle On Downgraded Legacy Encryption) attack. Modern security practices recommend using the latest versions of TLS for secure communications, as SSL 3.0 is no longer considered secure.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
As a security analyst, you are tasked with describing the concept of a "zero trust" security model in a cybersecurity context. Which of the following options BEST describes this concept?
Trusting all users, devices, and applications within the network by default.
Implementing strict access controls and continuously verifying trust for all users, devices, and applications, regardless of location.
Allowing open access to all network resources based on user roles and permissions.
Relying solely on firewalls and other perimeter defenses to protect against external threats.
Answer explanation
"Implementing strict access controls and continuously verifying trust for all users, devices, and applications, regardless of location". This option aligns with the principle of "never trust, always verify", which is the foundation of the zero trust model. It emphasizes the need for strict access control and continuous verification of credentials, rather than assuming trust based on the network's perimeter or the user's location.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In an asymmetric encryption system, if Bob wants to send a confidential message to Alice, which key should he use to encrypt the message?
Alice's private key
Bob's private key
Bob's public key
Alice's public key
Answer explanation
In asymmetric encryption systems, if Bob wants to send a confidential message to Alice, he should use Alice's public key to encrypt the message. This ensures that only Alice, who has the corresponding private key, can decrypt and read the message. The correct answer is:
Alice's public key
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes a lattice-based access control model?
An access control model where permissions are determined by a user's role within an organization.
An access control model where permissions are tied to an object and the operations that can be performed on that object.
An access control model that utilizes a structure of security labels and clearances to determine access rights.
An access control model that allows users to determine permissions for their own files.
Answer explanation
An access control model that utilizes a structure of security labels and clearances to determine access rights.
This option is the definition of a lattice-based access control model, which uses a lattice of labels to represent the levels of information and the clearances users have, and allows the assignment of rights based on these levels.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are a security professional working for a highly secure organization. Your team has been tasked with implementing an authorization mechanism that tightly controls data access in the environment. Which of the following authorization mechanisms would be BEST suited for this high-security environment?
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Attribute-Based Access Control (ABAC)
Discretionary Access Control (DAC)
Answer explanation
Mandatory Access Control (MAC).
MAC is an access control policy determined by a computer security policy that is used in the most secure environments. In MAC, access rights are assigned based on regulations from a central authority and cannot be altered by users. This control is mandatory in the sense that individual object owners cannot alter the access. It's typically used in environments that require a high level of security, such as military institutions or government agencies, where information classification and confidentiality are critical.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
50 questions
Final Exam - Data Entry & Retrieval Procedures
Quiz
•
Professional Development
50 questions
REDES1
Quiz
•
University - Professi...
50 questions
CUESTIONARIO DE REPASO DE NORMATIVA
Quiz
•
Professional Development
50 questions
Reti, internet e servizi
Quiz
•
Professional Development
52 questions
Word Processing
Quiz
•
Professional Development
49 questions
UJIAN DASAR DESAIN GRAFIS
Quiz
•
Professional Development
47 questions
AZ-900 MÓDULO 01
Quiz
•
Professional Development
50 questions
Test Mendix 3
Quiz
•
Professional Development
Popular Resources on Wayground
20 questions
Halloween Trivia
Quiz
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Order of Operations
Quiz
•
5th Grade
20 questions
Halloween
Quiz
•
5th Grade
16 questions
Halloween
Quiz
•
3rd Grade
12 questions
It's The Great Pumpkin Charlie Brown
Quiz
•
1st - 5th Grade
20 questions
Possessive Nouns
Quiz
•
5th Grade
10 questions
Halloween Traditions and Origins
Interactive video
•
5th - 10th Grade
Discover more resources for Computers
10 questions
Halloween
Quiz
•
Professional Development
16 questions
Spooky Season Quiz
Quiz
•
Professional Development
5 questions
11.4.25 Student Engagement & Discourse
Lesson
•
Professional Development
50 questions
ASL Colors and Clothes
Quiz
•
KG - Professional Dev...
15 questions
Ohms Law
Quiz
•
Professional Development
10 questions
Halloween Trivia
Quiz
•
Professional Development
10 questions
Halloween Trivia
Quiz
•
Professional Development
