CISSP Official Practice Tests by Mike Chapple, David Seidl
216 Chapter 9 ■ Practice Test 1 During a security audit, Susan discovers that the organization is using hand geometry scanners ...
Chapter 9 ■ Practice Test 1 217 Lisa wants to integrate with a cloud identity provider that uses OAuth 2.0, and she wants to se ...
218 Chapter 9 ■ Practice Test 1 What does a constrained user interface do? A. It prevents unauthorized users from logging in. B ...
Chapter 9 ■ Practice Test 1 219 What group is eligible to receive safe harbor protection under the terms of the Digital Millenn ...
220 Chapter 9 ■ Practice Test 1 If Alex hires a new employee and the employee’s account is provisioned after HR manually inputs ...
Chapter 9 ■ Practice Test 1 221 C. Collection D. Production Nessus, OpenVAS, and SAINT are all examples of what type of tool? ...
222 Chapter 9 ■ Practice Test 1 What type of risk assessment uses tools such as the one shown here? High Risk Moderate Risk Mo ...
Chapter 9 ■ Practice Test 1 223 Robert is the network administrator for a small business and recently installed a new firewall. ...
224 Chapter 9 ■ Practice Test 1 What type of testing would validate support for all the web browsers that are supported by a we ...
Chapter 9 ■ Practice Test 1 225 C. VSML D. SCAP Which of the following is not one of the three components of the DevOps model? ...
226 Chapter 9 ■ Practice Test 1 112. Kolin is searching for a network security solution that will allow him to help reduce zero- ...
Chapter 9 ■ Practice Test 1 227 Why does Nikto flag the /test directory? A. The /test directory allows administrative access t ...
228 Chapter 9 ■ Practice Test 1 Which one of the following memory types is considered volatile memory? A. Flash B. EEPROM C. EP ...
Chapter 9 ■ Practice Test 1 229 What network topology is shown here? A. A ring B. A bus C. A star D. A mesh Monica is develop ...
...
Chapter 10 Practice Test 10 ...
232 Chapter 10 ■ Practice Test 2 James is building a disaster recovery plan for his organization and would like to determine th ...
Chapter 10 ■ Practice Test 2 233 C. Scan each system using a port scanner. D. Use device fingerprinting via a web-based registra ...
234 Chapter 10 ■ Practice Test 2 What is the final stage of the Software Capability Maturity Model (SW-CMM)? A. Repeatable B. D ...
Chapter 10 ■ Practice Test 2 235 In this diagram of the TCP three-way handshake, what should system A send to system B in step ...
«
8
9
10
11
12
13
14
15
16
17
»
Free download pdf