Systems Security Certified Practitioner – SSCP – Question0454

Network-based Intrusion Detection systems:

A.
Commonly reside on a discrete network segment and monitor the traffic on that network segment.
B. Commonly will not reside on a discrete network segment and monitor the traffic on that network segment.
C. Commonly reside on a discrete network segment and does not monitor the traffic on that network segment.
D. Commonly reside on a host and and monitor the traffic on that specific host.

Correct Answer: A

Explanation:

Network-based ID systems: -Commonly reside on a discrete network segment and monitor the traffic on that network segment -Usually consist of a network appliance with a Network Interface Card (NIC) that is operating in promiscuous mode and is intercepting and analyzing the network packets in real time
“A passive NIDS takes advantage of promiscuous mode access to the network, allowing it to gain visibility into every packet traversing the network segment. This allows the system to inspect packets and monitor sessions without impacting the network, performance, or the systems and applications utilizing the network.”
NOTE FROM CLEMENT: A discrete network is a synonym for a SINGLE network. Usually the sensor will monitor a single network segment, however there are IDS today that allow you to monitor multiple LAN’s at the same time.
References used for this question:
KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 62. and Official (ISC)2 Guide to the CISSP CBK, Hal Tipton and Kevin Henry, Page 196 and Additional information on IDS systems can be found here: http://en.wikipedia.org/wiki/Intrusion_detection_system

Systems Security Certified Practitioner – SSCP – Question0453

Which of the following are the two MOST common implementations of Intrusion Detection Systems?

A.
Server-based and Host-based.
B. Network-based and Guest-based.
C. Network-based and Client-based.
D. Network-based and Host-based.

Correct Answer: D

Explanation:

The two most common implementations of Intrusion Detection are Network-based and Host-based.
IDS can be implemented as a network device, such as a router, switch, firewall, or dedicated device monitoring traffic, typically referred to as network IDS (NIDS).
The” (IDS) “technology can also be incorporated into a host system (HIDS) to monitor a single system for undesirable activities. ”
A network intrusion detection system (NIDS) is a network device …. that monitors traffic traversing the network segment for which it is integrated.” Remember that NIDS are usually passive in nature.
HIDS is the implementation of IDS capabilities at the host level. Its most significant difference from NIDS is that related processes are limited to the boundaries of a single-host system. However, this presents advantages in effectively detecting objectionable activities because the IDS process is running directly on the host system, not just observing it from the network.
Reference(s) used for this question: Hernandez CISSP, Steven (2012-12-21). Official (ISC)2 Guide to the CISSP CBK, Third Edition ((ISC)2 Press) (Kindle Locations 3649-3652). Auerbach Publications. Kindle Edition.

Systems Security Certified Practitioner – SSCP – Question0452

Who is responsible for providing reports to the senior management on the effectiveness of the security controls?

A.
Information systems security professionals
B. Data owners
C. Data custodians
D. Information systems auditors

Correct Answer: D

Explanation:

IT auditors determine whether systems are in compliance with the security policies, procedures, standards, baselines, designs, architectures, management direction and other requirements” and “provide top company management with an independent view of the controls that have been designed and their effectiveness.”
“Information systems security professionals” is incorrect. Security professionals develop the security policies and supporting baselines, etc.
“Data owners” is incorrect. Data owners have overall responsibility for information assets and assign the appropriate classification for the asset as well as ensure that the asset is protected with the proper controls.
“Data custodians” is incorrect. Data custodians care for an information asset on behalf of the data owner.
References: CBK, pp. 38 -42. AIO3. pp. 99 -104

Systems Security Certified Practitioner – SSCP – Question0451

What is the primary goal of setting up a honeypot?

A.
To lure hackers into attacking unused systems
B. To entrap and track down possible hackers
C. To set up a sacrificial lamb on the network
D. To know when certain types of attacks are in progress and to learn about attack techniques so the network can be fortified.

Correct Answer: D

Explanation:

The primary purpose of a honeypot is to study the attack methods of an attacker for the purposes of understanding their methods and improving defenses.
“To lure hackers into attacking unused systems” is incorrect. Honeypots can serve as decoys but their primary purpose is to study the behaviors of attackers.
“To entrap and track down possible hackers” is incorrect. There are a host of legal issues around enticement vs entrapment but a good general rule is that entrapment is generally prohibited and evidence gathered in a scenario that could be considered as “entrapping” an attacker would not be admissible in a court of law.
“To set up a sacrificial lamb on the network” is incorrect. While a honeypot is a sort of sacrificial lamb and may attract attacks that might have been directed against production systems, its real purpose is to study the methods of attackers with the goals of better understanding and improving network defenses.
References AIO3, p. 213

Systems Security Certified Practitioner – SSCP – Question0450

Which of the following would NOT violate the Due Diligence concept?

A.
Security policy being outdated
B. Data owners not laying out the foundation of data protection
C. Network administrator not taking mandatory two-week vacation as planned
D. Latest security patches for servers being installed as per the Patch Management process

Correct Answer: D

Explanation:

To be effective a patch management program must be in place (due diligence) and detailed procedures would specify how and when the patches are applied properly (Due Care). Remember, the question asked for NOT a violation of Due Diligence, in this case, applying patches demonstrates due care and the patch management process in place demonstrates due diligence.
Due diligence is the act of investigating and understanding the risks the company faces. A company practices by developing and implementing security policies, procedures, and standards. Detecting risks would be based on standards such as ISO 2700, Best Practices, and other published standards such as NIST standards for example.
Due Diligence is understanding the current threats and risks. Due diligence is practiced by activities that make sure that the protection mechanisms are continually maintained and operational where risks are constantly being evaluated and reviewed. The security policy being outdated would be an example of violating the due diligence concept.
Due Care is implementing countermeasures to provide protection from those threats. Due care is when the necessary steps to help protect the company and its resources from possible risks that have been identifed. If the information owner does not lay out the foundation of data protection (doing something about it) and ensure that the directives are being enforced (actually being done and kept at an acceptable level), this would violate the due care concept.
If a company does not practice due care and due diligence pertaining to the security of its assets, it can be legally charged with negligence and held accountable for any ramifications of that negligence. Liability is usually established based on Due Diligence and Due Care or the lack of either.
A good way to remember this is using the first letter of both words within Due Diligence (DD) and Due Care (DC).
Due Diligence = Due Detect Steps you take to identify risks based on best practices and standards.
Due Care = Due Correct. Action you take to bring the risk level down to an acceptable level and maintaining that level over time.
The Following answer were wrong:
Security policy being outdated: While having and enforcing a security policy is the right thing to do (due care), if it is outdated, you are not doing it the right way (due diligence). This questions violates due diligence and not due care.
Data owners not laying out the foundation for data protection: Data owners are not recognizing the “right thing” to do. They don’t have a security policy.
Network administrator not taking mandatory two week vacation: The two week vacation is the “right thing” to do, but not taking the vacation violates due diligence (not doing the right thing the right way)
Reference(s) used for this question Shon Harris, CISSP All In One, Version 5, Chapter 3, pg 110

Systems Security Certified Practitioner – SSCP – Question0449

Which of the following would be LESS likely to prevent an employee from reporting an incident?

A.
They are afraid of being pulled into something they don't want to be involved with.
B. The process of reporting incidents is centralized.
C. They are afraid of being accused of something they didn't do.
D. They are unaware of the company's security policies and procedures.

Correct Answer: B

Explanation:

The reporting process should be centralized else employees won’t bother.
The other answers are incorrect because : They are afraid of being pulled into something they don’t want to be involved with is incorrect as most of the employees fear of this and this would prevent them to report an incident.
They are afraid of being accused of something they didn’t do is also incorrect as this also prevents them to report an incident.
They are unaware of the company’s security policies and procedures is also incorrect as mentioned above.
Reference : Shon Harris AIO v3 , Ch-10 : Laws , Investigatio & Ethics , Page : 675.

Systems Security Certified Practitioner – SSCP – Question0448

Which of the following tools is NOT likely to be used by a hacker?

A.
Nessus
B. Saint
C. Tripwire
D. Nmap

Correct Answer: C

Explanation:

It is a data integrity assurance software aimed at detecting and reporting accidental or malicious changes to data.
The following answers are incorrect :
Nessus is incorrect as it is a vulnerability scanner used by hackers in discovering vulnerabilities in a system. Saint is also incorrect as it is also a network vulnerability scanner likely to be used by hackers. Nmap is also incorrect as it is a port scanner for network exploration and likely to be used by hackers.
Reference : Tripwire : http://www.tripwire.com Nessus : http://www.nessus.org Saint : http://www.saintcorporation.com/saint Nmap : http://insecure.org/nmap

Systems Security Certified Practitioner – SSCP – Question0447

The session layer provides a logical persistent connection between peer hosts. Which of the following is one of the modes used in the session layer to establish this connection?

A.
Full duplex
B. Synchronous
C. Asynchronous
D. Half simplex

Correct Answer: A

Explanation:

Layer 5 of the OSI model is the Session Layer. This layer provides a logical persistent connection between peer hosts. A session is analogous to a conversation that is necessary for applications to exchange information.
The session layer is responsible for establishing, managing, and closing end-to-end connections, called sessions, between applications located at different network endpoints. Dialogue control management provided by the session layer includes full-duplex, half-duplex, and simplex communications. Session layer management also helps to ensure that multiple streams of data stay synchronized with each other, as in the case of multimedia applications like video conferencing, and assists with the prevention of application related data errors.
The session layer is responsible for creating, maintaining, and tearing down the session.
Three modes are offered:
(Full) Duplex: Both hosts can exchange information simultaneously, independent of each other. Half Duplex: Hosts can exchange information, but only one host at a time. Simplex: Only one host can send information to its peer. Information travels in one direction only.
Another aspect of performance that is worthy of some attention is the mode of operation of the network or connection. Obviously, whenever we connect together device A and device B, there must be some way for A to send to B and B to send to
A. Many people don’t realize, however, that networking technologies can differ in terms of how these two directions of communication are handled. Depending on how the network is set up, and the characteristics of the technologies used, performance may be improved through the selection of performance-enhancing modes. Basic Communication Modes of Operation
Let’s begin with a look at the three basic modes of operation that can exist for any network connection, communications channel, or interface. Simplex Operation
In simplex operation, a network cable or communications channel can only send information in one direction; it’s a “one-way street”. This may seem counter-intuitive: what’s the point of communications that only travel in one direction? In fact, there are at least two different places where simplex operation is encountered in modern networking.
The first is when two distinct channels are used for communication: one transmits from A to B and the other from B to A. This is surprisingly common, even though not always obvious. For example, most if not all fiber optic communication is simplex, using one strand to send data in each direction. But this may not be obvious if the pair of fiber strands are combined into one cable.
Simplex operation is also used in special types of technologies, especially ones that are asymmetric. For example, one type of satellite Internet access sends data over the satellite only for downloads, while a regular dial-up modem is used for upload to the service provider. In this case, both the satellite link and the dial-up connection are operating in a simplex mode. Half-Duplex Operation
Technologies that employ half-duplex operation are capable of sending information in both directions between two nodes, but only one direction or the other can be utilized at a time. This is a fairly common mode of operation when there is only a single network medium (cable, radio frequency and so forth) between devices.
While this term is often used to describe the behavior of a pair of devices, it can more generally refer to any number of connected devices that take turns transmitting. For example, in conventional Ethernet networks, any device can transmit, but only one may do so at a time. For this reason, regular (unswitched) Ethernet networks are often said to be “half-duplex”, even though it may seem strange to describe a LAN that way. Full-Duplex Operation
In full-duplex operation, a connection between two devices is capable of sending data in both directions simultaneously. Full-duplex channels can be constructed either as a pair of simplex links (as described above) or using one channel designed to permit bidirectional simultaneous transmissions. A full-duplex link can only connect two devices, so many such links are required if multiple devices are to be connected together.
Note that the term “full-duplex” is somewhat redundant; “duplex” would suffice, but everyone still says “full-duplex” (likely, to differentiate this mode from half-duplex).
For a listing of protocols associated with Layer 5 of the OSI model, see below:
ADSP -AppleTalk Data Stream Protocol ASP -AppleTalk Session Protocol
H.245 -Call Control Protocol for Multimedia Communication ISO-SP OSI session-layer protocol (X.225, ISO 8327) iSNS -Internet Storage Name Service
The following are incorrect answers:
Synchronous and Asynchronous are not session layer modes.
Half simplex does not exist. By definition, simplex means that information travels one way only, so half-simplex is a oxymoron.
Reference(s) used for this question:
Hernandez CISSP, Steven (2012-12-21). Official (ISC)2 Guide to the CISSP CBK, Third Edition ((ISC)2 Press) (Kindle Locations 5603-5636). Auerbach Publications. Kindle Edition. and http://www.tcpipguide.com/free/t_SimplexFullDuplexandHalfDuplexOper… and http://www.wisegeek.com/what-is-a-session-layer.htm

Systems Security Certified Practitioner – SSCP – Question0446

Which protocol is NOT implemented in the Network layer of the OSI Protocol Stack?

A.
hyper text transport protocol
B. Open Shortest Path First
C. Internet Protocol
D. Routing Information Protocol

Correct Answer: A

Explanation:

Open Shortest Path First, Internet Protocol, and Routing Information Protocol are all protocols implemented in the Network Layer.
Domain: Telecommunications and Network Security
References: AIO 3rd edition. Page 429 Official Guide to the CISSP CBK. Page 411

Systems Security Certified Practitioner – SSCP – Question0445

Which one of the following statements about the advantages and disadvantages of network-based Intrusion detection systems is true

A.
Network-based IDSs are not vulnerable to attacks.
B. Network-based IDSs are well suited for modern switch-based networks.
C. Most network-based IDSs can automatically indicate whether or not an attack was successful.
D. The deployment of network-based IDSs has little impact upon an existing network.

Correct Answer: D

Explanation:

Network-based IDSs are usually passive devices that listen on a network wire without interfering with the normal operation of a network. Thus, it is usually easy to retrofit a network to include network-based IDSs with minimal effort.
Network-based IDSs are not vulnerable to attacks is not true, even thou network-based IDSs can be made very secure against attack and even made invisible to many attackers they still have to read the packets and sometimes a well crafted packet might exploit or kill your capture engine.
Network-based IDSs are well suited for modern switch-based networks is not true as most switches do not provide universal monitoring ports and this limits the monitoring range of a network-based IDS sensor to a single host. Even when switches provide such monitoring ports, often the single port cannot mirror all traffic traversing the switch.
Most network-based IDSs can automatically indicate whether or not an attack was successful is not true as most network-based IDSs cannot tell whether or not an attack was successful; they can only discern that an attack was initiated. This means that after a network-based IDS detects an attack, administrators must manually investigate each attacked host to determine whether it was indeed penetrated.
Reference: NIST special publication 800-31 Intrusion Detection System pages 15-16 Official guide to the CISSP CBK. Pages 196 to 197