CISSP Official Practice Tests by Mike Chapple, David Seidl
Chapter 10 ■ Practice Test 2 245 6 7. Carol would like to implement a control that protects her organization from the momen- tar ...
246 Chapter 10 ■ Practice Test 2 Michelle is in charge of her organization’s mobile device management efforts and handles lost ...
Chapter 10 ■ Practice Test 2 247 Ed’s organization has 5 IP addresses allocated to them by their ISP but needs to connect over ...
248 Chapter 10 ■ Practice Test 2 What access control system lets owners decide who has access to the objects they own? A. Role- ...
Chapter 10 ■ Practice Test 2 249 What is the minimum number of cryptographic keys necessary to achieve strong security when usi ...
250 Chapter 10 ■ Practice Test 2 Ben is selecting an encryption algorithm for use in an organization with 10,000 employ- ees. H ...
Chapter 10 ■ Practice Test 2 251 A. Application B. Web server C. System D. Firewall Which one of the following activities trans ...
252 Chapter 10 ■ Practice Test 2 When Richard receives the message from Matthew, what key should he use to decrypt the message? ...
Chapter 10 ■ Practice Test 2 253 Sally’s organization needs to be able to prove that certain staff members sent emails, and she ...
254 Chapter 10 ■ Practice Test 2 In the OSI model, when a packet changes from a datastream to a segment or a datagram, what lay ...
Chapter 10 ■ Practice Test 2 255 Which of the following concerns should not be on Lauren’s list of potential issues when penetr ...
256 Chapter 10 ■ Practice Test 2 Referring to the figure shown here, what is the name of the security control indicated by the ...
Chapter 10 ■ Practice Test 2 257 C. The IP address is a private, nonroutable address. D. 1 92.168.1.25 is a reserved address for ...
...
Chapter 11 Practice Test 11 ...
260 Chapter 11 ■ Practice Test 3 Fred’s data role requires him to maintain system security plans and to ensure that system user ...
Chapter 11 ■ Practice Test 3 261 A. SYN B. ACK C. FIN/ACK D. SY N/ACK Chris is conducting reconnaissance on a remote target and ...
262 Chapter 11 ■ Practice Test 3 After 10 years working in her organization, Cassandra is moving into her fourth role, this tim ...
Chapter 11 ■ Practice Test 3 263 C. PHI D. Personally identifiable information (PII) Yagis, panel, cantennas, and parabolic ant ...
264 Chapter 11 ■ Practice Test 3 Susan uses a span port to monitor traffic to her production website and uses a monitoring tool ...
«
35
36
37
38
39
40
41
42
43
44
»
Free download pdf