Page 1012 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1012

D.  Firewall

              18.  Which of the following AAA protocols is based on RADIUS and
                    supports Mobile IP and VoIP?


                    A.  Distributed access control

                    B.  Diameter

                    C.  TACACS+

                    D.  TACACS

                        Refer the following scenario when answering questions 19 and
                        20.

                        An administrator has been working within an organization for
                        over 10 years. He has moved between different IT divisions

                        within the company and has retained privileges from each of
                        the jobs that he’s had during his tenure. Recently, supervisors
                        admonished him for making unauthorized changes to systems.
                        He once again made an unauthorized change that resulted in an
                        unexpected outage and management decided to terminate his
                        employment at the company. He came back to work the
                        following day to clean out his desk and belongings, and during

                        this time he installed a malicious script that was scheduled to
                        run as a logic bomb on the first day of the following month. The
                        script will change administrator passwords, delete files, and
                        shut down over 100 servers in the datacenter.

               19.  Which of the following basic principles was violated during the
                    administrator’s employment?


                    A.  Implicit deny
                    B.  Loss of availability


                    C.  Defensive privileges

                    D.  Least privilege

              20.  What could have discovered problems with this user’s account
                    while he was employed?

                    A.  Policy requiring strong authentication
   1007   1008   1009   1010   1011   1012   1013   1014   1015   1016   1017