Cissp Errata PDF
Cissp Errata PDF
Correction to text – After editor review, answer D is the correct answer since "privileges that are needed
for intermittent job functions should be assigned to a different user account, etc." Reference located on
page 123, last bullet on the page.
It has been brought to our attention that the figures labeled 3.7 and 3.8 on pages 242-243 are identical.
The correct figure for pg. 243 or Figure 3.8 is below:
Initialization
Vector
loaded into 64 - s bits s bits
Shift Register
DES
DES Algorithm
Key
Algorithm
Next s bits
S bits of
XOR of XOR
Plaintext
Plaintext
Error #4 - Typo
On page 329, following the header of Trusted Computer Security Evaluation. The second line of this
paragraph states, “ITSEC defines four main levels (A, B, C, D)."
Correction to text – This sentence contains a typo and should read, “TCSEC defines four main levels (A,
B, C, D).”
A Verified protection
A1 Verified design
B Mandatory protection
B3 Labeled security
B2 Structured protection
B1 Labeled security.
C Discretionary protection
C2 Discretionary protection
C1 Controlled access
A Verified protection
A1 Verified design
B Mandatory protection
B3 Security Domains
B2 Structured protection
B1 Labeled security
C Discretionary protection
C2 Controlled Access
C1 Discretionary protection
Error #6 - Typo
Page 442, 2nd paragraph. The text reads, “A multiplexer overlays multiple singles into one signal for
transmission.”
Correction to text – The sentence should read, “A multiplexer overlays multiple signals into one signal
for transmission.”
Error #7 - Typo
Page 472. 4th Paragraph from the bottom of the page. The last sentence reads, “Therefore, the network is
216.12.146 and the host within the network is 40.
Correction to text – The sentence should read, “Therefore, the network is 216.12.146 and the host within
the network is 140.
Error #8 - Correction
Page 135, 2nd paragraph starting with “password crackers...” The second sentence reads, “John the
Ripper is still very popular, and L0pht, once a hacker tool, is now regularly used by Microsoft
system administrators for password auditing and sold as such.
Modification to text: The editors recognize that this is also called L0phtcrack.
Symmetric Key
Encrypted
Encryption of Symmetric Decryption of
Symmetric Key Key Symmetric Key
Correction to text – The sentence should read, “The output for RIPEMD-160 is 160 bits, and it also
operates similarly to MD5 on 512-bit blocks.”
Page 447, Third paragraph. The first sentence reads, “Another advantage of WAP is that both the
client and network authenticate each other.”
Correction to text – The sentence should read, “Another advantage of WPA is that both the client and
network authenticate each other.”
Page 448, 5th paragraph. The header of this paragraph reads, “WEP Protected Access 2 (WPA2).
Correction to text – The text should read, “Wi-Fi Protected Access (WPA2)"
Page 69; Figure 1.5 – bottom 2 rows “D & E” under second column “Minor”.
Correction to text – Change to darker shade to match the “L” category in the key.
Correction to text – Delete “Directive”. And delete paragraph on Directive Controls on page
647.
Correction to text – Delete “…cryptography does not support the standard of availability”.
Page 257; sentence 1 of paragraph 3 under title: “Key Exchange Using Diffie-Hellman”
Correction to text – Change “Hash = block 1 block 2 block 3 … end of message” to “Hash =
block 1 XOR block 2 XOR block 3 … end of message”.
Page 290; last sentence of paragraph 3 under title: “Infrastructure Support Systems”.
Correction to text – Change end to “user behavior changes the access control rules.”
Page 340; sentence 3 of paragraph titled “Internal and External Audit Oversight”.
Error # 31 – Correction
Page 350; last sentence of paragraph titled “Formalizing Continuity Planning Policy”.
Page 386; last sentence of paragraph 2 under title “Developing Continuity and Crisis
Management Process Training and Awareness Strategies”.
Correction to text – Change “reasonability” to “responsibility”.
Correction to text – Change sentence to read “ …that prescribe penalties for violators and
misuse of detection systems as well as require video cameras, intrusion detection systems and
auditing.”
Page 732; question 6. Question listed in answers section doesn’t match question listed at end
of chapter.
Error # 39 – Typo
Page 764; bullet item 4 under “Key Areas of Knowledge” of “Application Security”
Correction to text – Change to read “Understand application and system development
controls for security of knowledge-based systems (e.g., expert systems)”.
Correction to text – On pages 89 and 721, change answer D to read “All of the above”.
Hal
If you have further questions/comments regarding this errata sheet, please direct
them to [email protected].