Page 1548 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1548

12.  C. Mandatory Access Control (MAC) models rely on the use of
                    labels for subjects and objects. Discretionary Access Control (DAC)

                    models allow an owner of an object to control access to the object.
                    Nondiscretionary access controls have centralized management
                    such as a rule-based access control model deployed on a firewall.
                    Role Based Access Control (RBAC) models define a subject’s access
                    based on job-related roles.

               13.  D. The Mandatory Access Control (MAC) model is prohibitive, and

                    it uses an implicit-deny philosophy (not an explicit-deny
                    philosophy). It is not permissive and it uses labels rather than
                    rules.

               14.  D. Compliance-based access control model is not a valid type of
                    access control model. The other answers list valid access control
                    models.

               15.  C. A vulnerability analysis identifies weaknesses and can include
                    periodic vulnerability scans and penetration tests. Asset valuation

                    determines the value of assets, not weaknesses. Threat modeling
                    attempts to identify threats, but threat modeling doesn’t identify
                    weaknesses. An access review audits account management and
                    object access practices.

               16.  B. An account lockout policy will lock an account after a user has
                    entered an incorrect password too many times, and this blocks an
                    online brute-force attack. Attackers use rainbow tables in offline

                    password attacks. Password salts reduce the effectiveness of
                    rainbow tables. Encrypting the password protects the stored
                    password but isn’t effective against a brute-force attack without an
                    account lockout.

               17.  B. Using both a salt and pepper when hashing passwords provides
                    strong protection against rainbow table attacks. MD5 is no longer
                    considered secure, so it isn’t a good choice for hashing passwords.

                    Account lockout helps thwart online password brute-force attacks,
                    but a rainbow table attack is an offline attack. Role Based Access
                    Control (RBAC) is an access control model and unrelated to
                    password attacks.
   1543   1544   1545   1546   1547   1548   1549   1550   1551   1552   1553