CISSP - DOMAIN 7 QUESTIONS AND
ANSWERS WITH SOLUTIONS 2024
Operations Department - ANSWER Ensuring people, apps, equipment, and overall environment are
properly and adequately secured.
Administrative Management - ANSWER Dealing w/ personnel issues (including separation of duties and
job rotation, mandatory vacations, least privilege, and need-to-know).
Security and Network Personnel - ANSWER security administrator should not report to network
administrator (jobs can be at odds and mutually exclusive).
security administrator jobs:
- implement/maintain security devices and softare
- carry out security assessments
- create/maintain user profiles and implement/maintain access control mechanisms
- config/maintain security labels in MAC environments
- manage PW policies
- review audit logs
Accountability - ANSWER Important to maintain user privileged account management process to enforce
principle of least privilege and avoid authorization creep.
Clipping Level - ANSWER threshold/baseline for violation activities normal user commits before alarms
are raised. once clipping level exceeded, further violations recorded for review.
Physical Security - ANSWER implemented using layered approach, working in two main modes: normal
facility operations and another when facility is closed.
Facility Access Control - Door Locks - ANSWER 'delaying' devices. should be used as part of protection
scheme but not the only one.
,- mechanical locks can be warded and tumbler. warded has spring-loaded bolt and notch cut in it and
wards surrounding keyhole (easiest to pick). tumbler lock has more parts.
* pin tumbler: each pin must be pushed to correct height to allow cylinder to rotate.
* wafer tumbler (aka disc tumbler locks): uses flat discs instead of pins (used often in cars and desks).
* lever tumbler:
- combination locks: require combo of numbers to unlock.
- cipher locks (programmable locks): keypads to control access, possibly swipe card. combos can be
changed, sequence values can be locked out, personnel in trouble or under duress enter specific code
will open door and initiate remote alarm at same time. can have door delay (alarm goes off if door open
too long), key override (emergency code overrides normal procedures), master keying (can change
access codes), hostage alarm (duress code), and usually a visibility shield so others cannot see combo
entered.
- low security: no pick or drill resistance provided
- medium security: a degree of pick-resistance (can be found w/ in any lock grade above)
- high security: pick-resistance protection through many mechanisms (only used in grade 1 and 2 locks).
Personnel Access Controls - ANSWER identification and authentication can be verified by anatomical
attribute (biometric system), smart or memory cards (swipe cards), presenting photo ID, using key, or
providing card and PIN/PW.
- piggybacking: individual gains unauthorized access by using someone else's credentials or access rights.
- user-activated readers: means user has to do something; swipe card or enter PIN.
- system sensing access control reader (aka transponders): recognize presence of approaching object and
sends interrogating signals, obtains access code from card w/ out user doing anything.
*Electronic access control (EAC) tokens: generic term describing proximity authentication devices which
identify and authenticate users before allowing entrance.
External Boundary Protection Mechanisms - ANSWER - control pedestrian and vehicle traffic
- various levels of protection for diff security zones
- buffers and delaying mechanisms to protect forced entry attempts
- limit and control entry points
All can be done via access control mechanisms (locks and keys, card access system, personnel
awareness), physical barriers, intrusion detection (perimeter sensors, authentication mechanisms),
assessment (guards, CCTV cameras), response (guards, local LE), deterrents (signs, lighting,
environmental design).
External Boundary Protection Mechanisms - Fencing - ANSWER need to consider:
- gauge of the metal correlating to types of physical threats
- height of fencing (3-4ft deters causal trespassers, 6-7ft too high to climb easily, 8+ft w/ barbed/razor
wire for critical areas). barbed wire should be tilted in or out.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Performance. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $14.99. You're not tied to anything after your purchase.