CISSP Official Practice Tests by Mike Chapple, David Seidl
416 Appendix ■ Answers 1 07. D. Patents and trade secrets can both protect intellectual property in the form of a process. Paten ...
96 Chapter 4 ■ Communication and Network Security (Domain 4) What type of firewall design is shown in the following image? Fir ...
Chapter 9: Practice Test 1 417 C. Test directories often include scripts that may have poor protections or may have other data ...
Chapter 4 ■ Communication and Network Security (Domain 4) 97 The VM administrators recommend enabling cut and paste between vir ...
418 Appendix ■ Answers Chapter 10: Practice Test D. The recovery point objective (RPO) identifies the maximum amount of data, m ...
98 Chapter 4 ■ Communication and Network Security (Domain 4) What type of firewall design does the following image show? Firew ...
Chapter 10: Practice Test 2 419 C. Software-defined networking (SDN) is a converged protocol that allows virtualization concept ...
Chapter 4 ■ Communication and Network Security (Domain 4) 99 What type of networking device is most commonly used to assign end ...
420 Appendix ■ Answers 2 0. C. The blacklist approach to application control blocks certain prohibited packages but allows the i ...
100 Chapter 4 ■ Communication and Network Security (Domain 4) Phillip maintains a modem bank in support of several legacy servi ...
Chapter 10: Practice Test 2 421 B. Application programming interfaces (APIs), user interfaces (UIs), and physical interfaces ar ...
Chapter 4 ■ Communication and Network Security (Domain 4) 101 What topology correctly describes Ethernet? A. A ring B. A star ...
422 Appendix ■ Answers 3 8. B. SOC 2 reports are released under NDA to select partners or customers and can provide detail on th ...
102 Chapter 4 ■ Communication and Network Security (Domain 4) During a forensic investigation, Charles is able to determine the ...
Chapter 10: Practice Test 2 423 C. Interviews, surveys, and audits are all useful for assessing awareness. Code quality is best ...
Identity and Access Management (Domain 5) Chapter 5 ...
424 Appendix ■ Answers 5 9. A. Rainbow tables rely on being able to use databases of precomputed hashes to quickly search for ma ...
104 Chapter 5 ■ dentity and Access Management (Domain 5)I Which of the following is best described as an access control model t ...
Chapter 10: Practice Test 2 425 C. Password histories retain a list of previous passwords, preferably a list of salted hashes f ...
Chapter 5 ■ dentity and Access Management (Domain 5)I 105 During a log review, Saria discovers a series of logs that show login ...
«
24
25
26
27
28
29
30
31
32
33
»
Free download pdf