CISSP Official Practice Tests by Mike Chapple, David Seidl
Chapter 3 ■ Security Architecture and Engineering (Domain 3) 65 Alice sent a message to Bob. Bob would like to demonstrate to C ...
Chapter 7: Security Operations (Domain 7) 387 Warm site: C. A site that relies on shared storage and backups for recovery. Ser ...
66 Chapter 3 ■ Security Architecture and Engineering (Domain 3) In the diagram shown here of security boundaries within a compu ...
388 Appendix ■ Answers 6 4. C. The Mitigation phase of incident response focuses on actions that can contain the damage incurred ...
Chapter 3 ■ Security Architecture and Engineering (Domain 3) 67 Tom is a cryptanalyst and is working on breaking a cryptographi ...
Chapter 7: Security Operations (Domain 7) 389 D. Any attempt to undermine the security of an organization or violation of a se ...
68 Chapter 3 ■ Security Architecture and Engineering (Domain 3) What physical security control broadcasts false emanations cons ...
390 Appendix ■ Answers 8 2. C. SSH uses TCP port 22, so this attack is likely an attempt to scan for open or weakly secured SSH ...
Chapter 3 ■ Security Architecture and Engineering (Domain 3) 69 C. Multiprogramming D. Multithreading Alan intercepts an encryp ...
Chapter 7: Security Operations (Domain 7) 391 witnesses testify about their direct observations. Real evidence consists of tang ...
70 Chapter 3 ■ Security Architecture and Engineering (Domain 3) 7 7. John and Gary are negotiating a business transaction, and J ...
392 Appendix ■ Answers 1 01. D. The benefits of additional discovery must be proportional to the additional costs that they will ...
Chapter 3 ■ Security Architecture and Engineering (Domain 3) 71 Chemical Reaction Heat Oxygen Fuel Image reprinted from CISSP (I ...
Chapter 8: Software Development Security (Domain 8) 393 Chapter 8: Software Development Security (Domain 8) B. Coupling is a de ...
72 Chapter 3 ■ Security Architecture and Engineering (Domain 3) The of a process consist(s) of the limits set on the memory add ...
394 Appendix ■ Answers 10. C. In the diagram, Account is the name of the class. Owner and Balance are attributes of that class. ...
Chapter 3 ■ Security Architecture and Engineering (Domain 3) 73 In a virtualized computing environment, what component is respo ...
Chapter 8: Software Development Security (Domain 8) 395 A. Macro viruses are most commonly found in office productivity documen ...
74 Chapter 3 ■ Security Architecture and Engineering (Domain 3) Chris is designing a cryptographic system for use within his co ...
396 Appendix ■ Answers 3 1. A. Black box testing begins with no prior knowledge of the system implementation, simulating a user ...
«
21
22
23
24
25
26
27
28
29
30
»
Free download pdf