Page 1534 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1534

12.  B. In system high mode, all users have appropriate clearances and
                    access permissions for all information processed by the system but

                    need to know only some of the information processed by that
                    system.

               13.  C. The most commonly overlooked aspect of mobile phone
                    eavesdropping is related to people in the vicinity overhearing
                    conversations (at least one side of them). Organizations frequently
                    consider and address issues of wireless networking, storage device

                    encryption, and screen locks.
               14.  B. BIOS and device firmware are often stored on EEPROM chips to

                    facilitate future firmware updates.

               15.  C. Registers are small memory locations that are located directly on
                    the CPU chip itself. The data stored within them is directly
                    available to the CPU and can be accessed extremely quickly.

               16.  A, B, and D. A programmer can implement the most effective way
                    to prevent XSS by validating input, coding defensively, escaping

                    metacharacters, and rejecting all scriptlike input.

               17.  D. A buffer overflow attack occurs when an attacker submits data
                    to a process that is larger than the input variable is able to contain.
                    Unless the program is properly coded to handle excess input, the
                    extra data is dropped into the system’s execution stack and may
                    execute as a fully privileged operation.

              18.  C. Process isolation provides separate memory spaces to each
                    process running on a system. This prevents processes from

                    overwriting each other’s data and ensures that a process can’t read
                    data from another process.

               19.  D. The principle of least privilege states that only processes that
                    absolutely need kernel-level access should run in supervisory
                    mode. The remaining processes should run in user mode to reduce
                    the number of potential security vulnerabilities.


              20.  A. Hardware segmentation achieves the same objectives as process
                    isolation but takes them to a higher level by implementing them
                    with physical controls in hardware.
   1529   1530   1531   1532   1533   1534   1535   1536   1537   1538   1539