CISSP Official Practice Tests by Mike Chapple, David Seidl
Chapter 12: Practice Test 4 457 D. Ed’s best option is to install an IPv6 to IPv4 gateway that can translate traffic between th ...
Chapter 6 ■ Security Assessment and Testing (Domain 6) 135 What passive monitoring technique records all user interaction with ...
...
136 Chapter 6 ■ Security Assessment and Testing (Domain 6) During a penetration test, Lauren is asked to test the organization’ ...
Index Index 2DES (Double DES) encryption algorithm, 69 3DES (Triple DES), 427 127.0.0.1 address, 98 127.0.0.1 IP address, 356 80 ...
Chapter 6 ■ Security Assessment and Testing (Domain 6) 137 Planning Reporting Information Gathering and Discovery Vulnerability ...
460 AES-based CCMP – attacks ARP spoofing, 357 AS (authentication server), 365 ASLR, 75 assembly languages, 448 assessment objec ...
138 Chapter 6 ■ Security Assessment and Testing (Domain 6) What four types of coverage criteria are commonly used when validati ...
auditing – backups 461 biometrics, 108, 111, 115, 122, 211 device fingerprinting, 418 EAP, 100 factor types, 104 falsified crede ...
Chapter 6 ■ Security Assessment and Testing (Domain 6) 139 Which of the following is not an interface that is typically tested ...
462 baseline – CALEA (Communications Assistance to Law Enforcement) encryption and, 356 scanning, 136 botnets, 168, 207, 393 att ...
140 Chapter 6 ■ Security Assessment and Testing (Domain 6) In this image, what issue may occur due to the log handling settings ...
California Online Privacy Protection Act – code review 463 Class B networks, subnet masks, 93 classification, 28, 33, 35, 37, 39 ...
Chapter 6 ■ Security Assessment and Testing (Domain 6) 141 Match each of the numbered scanning types with the appropriate lette ...
464 code testing methods – custodians cookies, 450 COPPA (Children’s Online Privacy Protection Act), 18, 255, 324, 430 copyright ...
142 Chapter 6 ■ Security Assessment and Testing (Domain 6) Jim is helping his organization decide on audit standards for use th ...
cut and paste – differential backups 465 failures, 400 firewall architecture and, 95 primary keys, 207 RDBMS, 193 recovery mecha ...
Chapter 6 ■ Security Assessment and Testing (Domain 6) 143 As part of the continued testing of their new application, Susan’s q ...
466 Diffie-Hellman – egress filtering documentation, 12 chain of custody, 75 lessons learned, 392 postmortem review, 173 DoS (de ...
144 Chapter 6 ■ Security Assessment and Testing (Domain 6) During a port scan of his network, Alex finds that a number of hosts ...
«
28
29
30
31
32
33
34
35
36
37
»
Free download pdf