Page 1012 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1012
D. Firewall
18. Which of the following AAA protocols is based on RADIUS and
supports Mobile IP and VoIP?
A. Distributed access control
B. Diameter
C. TACACS+
D. TACACS
Refer the following scenario when answering questions 19 and
20.
An administrator has been working within an organization for
over 10 years. He has moved between different IT divisions
within the company and has retained privileges from each of
the jobs that he’s had during his tenure. Recently, supervisors
admonished him for making unauthorized changes to systems.
He once again made an unauthorized change that resulted in an
unexpected outage and management decided to terminate his
employment at the company. He came back to work the
following day to clean out his desk and belongings, and during
this time he installed a malicious script that was scheduled to
run as a logic bomb on the first day of the following month. The
script will change administrator passwords, delete files, and
shut down over 100 servers in the datacenter.
19. Which of the following basic principles was violated during the
administrator’s employment?
A. Implicit deny
B. Loss of availability
C. Defensive privileges
D. Least privilege
20. What could have discovered problems with this user’s account
while he was employed?
A. Policy requiring strong authentication

