#01 CISSP: Full Coverage Mastery Exam 1 - Challenging
Quiz
•
Computers
•
Professional Development
•
Practice Problem
•
Hard
Kim undefined
FREE Resource
Enhance your content in a minute
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
As a security professional, you have been tasked with conducting a Business Impact Analysis (BIA) for the physical assets of your organization. You are aware that there are several key considerations that need to be taken into account. Which of the following is a key consideration when conducting a BIA for physical assets?
The level of encryption used on the assets
The type of access controls used on the assets
The criticality of the assets to business operations
The availability of the assets to users
Answer explanation
"The criticality of the assets to business operations". This is because a Business Impact Analysis primarily focuses on identifying the importance of different business functions and processes, and the necessity of specific assets to the continued operations of the business. While encryption and access controls are important security considerations, the BIA is more concerned with how critical the asset is to the business operations and what impact its loss would have. Availability is also a critical factor, but it is often considered within the context of how it affects the business operation's continuity and recovery objectives.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are a security professional working for a company that uses a cloud-based service to authenticate users through Security Assertion Markup Language (SAML) assertions. However, an attacker was able to intercept a SAML assertion during transmission and modify its content to gain unauthorized access to the system. Which of the following is the MOST common type of attack used to exploit this vulnerability?
Man-in-the-middle (MitM) attack
Cross-site scripting (XSS) attack
SQL injection (SQLi) attack
Denial-of-service (DoS) attack
Answer explanation
tions are intercepted and modified, it is indicative of a MitM attack, where the attacker has placed themselves in the communication path to capture and alter the SAML assertions being transmitted. This type of attack would allow an attacker to gain unauthorized access by impersonating a legitimate user or altering the assertion's content.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Considering current cybersecurity standards, which protocol among the following options is outdated and should be avoided due to its known vulnerabilities?
Secure Sockets Layer (SSL) 3.0
Internet Protocol Security (IPSec)
Secure Hash Algorithm 3 (SHA-3)
Transport Layer Security (TLS) 1.3
Answer explanation
"Secure Sockets Layer (SSL) 3.0". SSL 3.0 is an outdated protocol that has been superseded by the Transport Layer Security (TLS) protocols due to various well-known security issues, including the POODLE (Padding Oracle On Downgraded Legacy Encryption) attack. Modern security practices recommend using the latest versions of TLS for secure communications, as SSL 3.0 is no longer considered secure.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
As a security analyst, you are tasked with describing the concept of a "zero trust" security model in a cybersecurity context. Which of the following options BEST describes this concept?
Trusting all users, devices, and applications within the network by default.
Implementing strict access controls and continuously verifying trust for all users, devices, and applications, regardless of location.
Allowing open access to all network resources based on user roles and permissions.
Relying solely on firewalls and other perimeter defenses to protect against external threats.
Answer explanation
"Implementing strict access controls and continuously verifying trust for all users, devices, and applications, regardless of location". This option aligns with the principle of "never trust, always verify", which is the foundation of the zero trust model. It emphasizes the need for strict access control and continuous verification of credentials, rather than assuming trust based on the network's perimeter or the user's location.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In an asymmetric encryption system, if Bob wants to send a confidential message to Alice, which key should he use to encrypt the message?
Alice's private key
Bob's private key
Bob's public key
Alice's public key
Answer explanation
In asymmetric encryption systems, if Bob wants to send a confidential message to Alice, he should use Alice's public key to encrypt the message. This ensures that only Alice, who has the corresponding private key, can decrypt and read the message. The correct answer is:
Alice's public key
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes a lattice-based access control model?
An access control model where permissions are determined by a user's role within an organization.
An access control model where permissions are tied to an object and the operations that can be performed on that object.
An access control model that utilizes a structure of security labels and clearances to determine access rights.
An access control model that allows users to determine permissions for their own files.
Answer explanation
An access control model that utilizes a structure of security labels and clearances to determine access rights.
This option is the definition of a lattice-based access control model, which uses a lattice of labels to represent the levels of information and the clearances users have, and allows the assignment of rights based on these levels.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are a security professional working for a highly secure organization. Your team has been tasked with implementing an authorization mechanism that tightly controls data access in the environment. Which of the following authorization mechanisms would be BEST suited for this high-security environment?
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Attribute-Based Access Control (ABAC)
Discretionary Access Control (DAC)
Answer explanation
Mandatory Access Control (MAC).
MAC is an access control policy determined by a computer security policy that is used in the most secure environments. In MAC, access rights are assigned based on regulations from a central authority and cannot be altered by users. This control is mandatory in the sense that individual object owners cannot alter the access. It's typically used in environments that require a high level of security, such as military institutions or government agencies, where information classification and confidentiality are critical.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
45 questions
ИТ в профессиональной деятельности
Quiz
•
Professional Development
50 questions
AICTE-STTP_"BlockChain & Applications" Slot-1_Assessment
Quiz
•
Professional Development
50 questions
Amadeus Final Exam
Quiz
•
Professional Development
50 questions
SC-900 Day 3
Quiz
•
Professional Development
50 questions
CUESTIONARIO REPASO COMPLETO BASTIONADO DE REDES
Quiz
•
Professional Development
50 questions
Cuestionario Web
Quiz
•
Professional Development
53 questions
HTML And CSS
Quiz
•
4th Grade - Professio...
50 questions
2ºDAW - Diseño de Interfaces Web - Trim.2 - Prof. C. Boni
Quiz
•
University - Professi...
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
15 questions
4:3 Model Multiplication of Decimals by Whole Numbers
Quiz
•
5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
The Best Christmas Pageant Ever Chapters 1 & 2
Quiz
•
4th Grade
12 questions
Unit 4 Review Day
Quiz
•
3rd Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
