CISSP Official Practice Tests by Mike Chapple, David Seidl
electromagnetic emanations – expert opinion evidence 467 HIPAA and, 35 keys, 53, 56, 58, 72, 85, 207, 424 link encryption, 248 m ...
Chapter 6 ■ Security Assessment and Testing (Domain 6) 145 Jim is designing his organization’s log management systems and knows ...
468 expert systems – FRR (false rejection rate) application-level gateway, 422 databases and, 95 design, 83, 96 DMZ and, 95, 98 ...
146 Chapter 6 ■ Security Assessment and Testing (Domain 6) For questions 79–81, please refer to the following scenario: Ben’s or ...
FTC (Federal Trade Commission) – IaaS (infrastructure as a service) 469 hard drives forensic analysis, 262 sectors, bad, 29 zero ...
Chapter 6 ■ Security Assessment and Testing (Domain 6) 147 Ken is designing a testing process for software developed by his tea ...
470 ICMP (Internet Control Message Protocol) – IP addresses insider attacks, 387 insurance, 274, 279, 441 integration testing, 4 ...
148 Chapter 6 ■ Security Assessment and Testing (Domain 6) 8 7. Ben’s manager expresses concern about the coverage of his scan. ...
IP protocols – labeling 471 Kerberos, 124, 202, 300, 358, 359, 365, 368 AES, 360 authentication process, 105, 110 logon process, ...
Chapter 6 ■ Security Assessment and Testing (Domain 6) 149 C. sqlthrash D. Nessus During a penetration test of her organization ...
472 land attacks – mantraps logins, 205 logs, 156 login failures, 105 overwriting, 440 LOIC (Low Orbit Ion Cannon), 271, 437 los ...
150 Chapter 6 ■ Security Assessment and Testing (Domain 6) For questions 98–100, please refer to the following scenario. NIST Sp ...
manual code review – networks 473 modes of operation, privileged, 62 modification attacks, 412 modulo function, 409 motion detec ...
Security Operations (Domain 7) Chapter 7 ...
474 next generation firewalls – packets OFDM (Orthogonal Frequency-Division Multiplexing), 81, 348 off-by-one error, 398 OLA (op ...
152 Chapter 7 ■ Security Operations (Domain 7) Referring to the following figure, what technology is shown that provides fault ...
pair programming – performance monitoring 475 path disclosures, 372 payloads, 414 payment card information, 17 PBX systems, 353 ...
Chapter 7 ■ Security Operations (Domain 7) 153 What type of evidence consists entirely of tangible items that may be brought in ...
476 permissions – practice test 4 answers turnstiles, 430 wiring closets, 59 physical infrastructure, hardening, 6 Physical laye ...
154 Chapter 7 ■ Security Operations (Domain 7) Jim would like to identify compromised systems on his network that may be partic ...
«
29
30
31
32
33
34
35
36
37
38
»
Free download pdf