CISSP Official Practice Tests by Mike Chapple, David Seidl
preaction system – RAD (Rapid Application Development) 477 A R P, 290 converged, 86 cryptography, 66 DNS, 290 encryption, 299 me ...
Chapter 7 ■ Security Operations (Domain 7) 155 Gary is preparing to create an account for a new user and assign privileges to t ...
478 RADIUS (Remote Access Dial In User Service) – risk relational databases, 205, 401 permanence, 292 release control, 454 remed ...
156 Chapter 7 ■ Security Operations (Domain 7) Match each of the numbered terms with its correct lettered definition: Terms H ...
risk acceptance strategy – security clearance 479 SAINT, 221 salt, 284, 340, 439, 444, 454 SAML (Security Assertion Markup Langu ...
Chapter 7 ■ Security Operations (Domain 7) 157 C. PaaS D. SaaS Which one of the following information sources is useful to secu ...
480 security fixes – spiral development model SMTP (Simple Mail Transfer Protocol), 348, 442 OSI model and, 90 ports, 354 server ...
158 Chapter 7 ■ Security Operations (Domain 7) Helen is implementing a new security mechanism for granting employees administra ...
SPIT (Spam over Internet Telephony) attacks – Take-Grant permissions model 481 subject/object model, 53, 424, 448 subnet masks, ...
Chapter 7 ■ Security Operations (Domain 7) 159 File Modifications Monday 8 a.m. - File 1 created Monday 10 a.m. - File 2 created ...
482 tampering – threat modeling functions disallowed, 134 fuzzing, 146 gray box, 182, 188, 208, 400, 408, 441, 446 integration t ...
160 Chapter 7 ■ Security Operations (Domain 7) Which one of the following frameworks focuses on IT service management and inclu ...
threats – USC (United States Code) 483 training, 25 security awareness training, 5 transaction logging, 438 transferring risk, 3 ...
Chapter 7 ■ Security Operations (Domain 7) 161 C. Two-person control D. Transitive trust Which one of the following is not a ba ...
484 use case testing – vulnerability scans polymorphic viruses, 396 propagation, 198 stealth, 397 vital records programs, 22 VLA ...
162 Chapter 7 ■ Security Operations (Domain 7) What type of attack is shown in the following figure? Attacker SYN SYN/ACK SYN/ ...
vulnerability status – WPA2 485 Windows Firewall, 179 Windows syslog, 371 wireframe designs, 399 wireless attacks evil twin, 2, ...
Chapter 7 ■ Security Operations (Domain 7) 163 C. Both an interview and an interrogation D. Neither an interview nor an interrog ...
486 X.25 – zzuf Y yagis, 263, 433 Z zero fill, 407 hard drives, 48 zero-day vulnerabilities, 130, 162, 226, 251, 284, 386, 428 z ...
164 Chapter 7 ■ Security Operations (Domain 7) You are working to evaluate the risk of flood to an area and consult the flood m ...
«
30
31
32
33
34
35
36
37
38
39
»
Free download pdf