CISSP Official Practice Tests by Mike Chapple, David Seidl
236 Chapter 10 ■ Practice Test 2 Vivian works for a chain of retail stores and would like to use a software product that restri ...
Chapter 10 ■ Practice Test 2 237 C. Recently generated accounts D. Accounts that have existed for long periods of time Cloud co ...
238 Chapter 10 ■ Practice Test 2 George is assisting a prosecutor with a case against a hacker who attempted to break into the ...
Chapter 10 ■ Practice Test 2 239 Harry is concerned that accountants within his organization will use data diddling attacks to ...
240 Chapter 10 ■ Practice Test 2 Susan wants to ensure that the audit report that her organization requested includes input fro ...
Chapter 10 ■ Practice Test 2 241 Which one of the following techniques can an attacker use to exploit a TOC/TOU vulner- ability ...
242 Chapter 10 ■ Practice Test 2 A Type 2 authentication factor that generates dynamic passwords based on a time- or algorithm- ...
Chapter 10 ■ Practice Test 2 243 Ben’s job is to ensure that data is labeled with the appropriate sensitivity label. Since Ben ...
244 Chapter 10 ■ Practice Test 2 As part of hiring a new employee, Kathleen’s identity management team creates a new user objec ...
Chapter 10 ■ Practice Test 2 245 6 7. Carol would like to implement a control that protects her organization from the momen- tar ...
246 Chapter 10 ■ Practice Test 2 Michelle is in charge of her organization’s mobile device management efforts and handles lost ...
Chapter 10 ■ Practice Test 2 247 Ed’s organization has 5 IP addresses allocated to them by their ISP but needs to connect over ...
248 Chapter 10 ■ Practice Test 2 What access control system lets owners decide who has access to the objects they own? A. Role- ...
Chapter 10 ■ Practice Test 2 249 What is the minimum number of cryptographic keys necessary to achieve strong security when usi ...
250 Chapter 10 ■ Practice Test 2 Ben is selecting an encryption algorithm for use in an organization with 10,000 employ- ees. H ...
Chapter 10 ■ Practice Test 2 251 A. Application B. Web server C. System D. Firewall Which one of the following activities trans ...
252 Chapter 10 ■ Practice Test 2 When Richard receives the message from Matthew, what key should he use to decrypt the message? ...
Chapter 10 ■ Practice Test 2 253 Sally’s organization needs to be able to prove that certain staff members sent emails, and she ...
254 Chapter 10 ■ Practice Test 2 In the OSI model, when a packet changes from a datastream to a segment or a datagram, what lay ...
Chapter 10 ■ Practice Test 2 255 Which of the following concerns should not be on Lauren’s list of potential issues when penetr ...
«
9
10
11
12
13
14
15
16
17
18
»
Free download pdf