CISSP Official Practice Tests by Mike Chapple, David Seidl
Chapter 9 ■ Practice Test 1 225 C. VSML D. SCAP Which of the following is not one of the three components of the DevOps model? ...
226 Chapter 9 ■ Practice Test 1 112. Kolin is searching for a network security solution that will allow him to help reduce zero- ...
Chapter 9 ■ Practice Test 1 227 Why does Nikto flag the /test directory? A. The /test directory allows administrative access t ...
228 Chapter 9 ■ Practice Test 1 Which one of the following memory types is considered volatile memory? A. Flash B. EEPROM C. EP ...
Chapter 9 ■ Practice Test 1 229 What network topology is shown here? A. A ring B. A bus C. A star D. A mesh Monica is develop ...
...
Chapter 10 Practice Test 10 ...
232 Chapter 10 ■ Practice Test 2 James is building a disaster recovery plan for his organization and would like to determine th ...
Chapter 10 ■ Practice Test 2 233 C. Scan each system using a port scanner. D. Use device fingerprinting via a web-based registra ...
234 Chapter 10 ■ Practice Test 2 What is the final stage of the Software Capability Maturity Model (SW-CMM)? A. Repeatable B. D ...
Chapter 10 ■ Practice Test 2 235 In this diagram of the TCP three-way handshake, what should system A send to system B in step ...
236 Chapter 10 ■ Practice Test 2 Vivian works for a chain of retail stores and would like to use a software product that restri ...
Chapter 10 ■ Practice Test 2 237 C. Recently generated accounts D. Accounts that have existed for long periods of time Cloud co ...
238 Chapter 10 ■ Practice Test 2 George is assisting a prosecutor with a case against a hacker who attempted to break into the ...
Chapter 10 ■ Practice Test 2 239 Harry is concerned that accountants within his organization will use data diddling attacks to ...
240 Chapter 10 ■ Practice Test 2 Susan wants to ensure that the audit report that her organization requested includes input fro ...
Chapter 10 ■ Practice Test 2 241 Which one of the following techniques can an attacker use to exploit a TOC/TOU vulner- ability ...
242 Chapter 10 ■ Practice Test 2 A Type 2 authentication factor that generates dynamic passwords based on a time- or algorithm- ...
Chapter 10 ■ Practice Test 2 243 Ben’s job is to ensure that data is labeled with the appropriate sensitivity label. Since Ben ...
244 Chapter 10 ■ Practice Test 2 As part of hiring a new employee, Kathleen’s identity management team creates a new user objec ...
«
34
35
36
37
38
39
40
41
42
43
»
Free download pdf