CISSP Official Practice Tests by Mike Chapple, David Seidl
Chapter 11 ■ Practice Test 3 285 The ability to store and generate passwords, provide logging and auditing capabilities, and al ...
...
Chapter 12 Practice Test 12 ...
288 Chapter 12 ■ Practice Test 4 What type of access control is intended to discover unwanted or unauthorized activity by provi ...
Chapter 12 ■ Practice Test 4 289 What should Ben do if the FAR and FRR shown in this diagram does not provide an acceptable per ...
290 Chapter 12 ■ Practice Test 4 Encapsulation is the core concept that enables what type of protocol? A. Bridging B. Multilaye ...
Chapter 12 ■ Practice Test 4 291 What process is typically used to ensure data security for workstations that are being removed ...
292 Chapter 12 ■ Practice Test 4 Mike has a flash memory card that he would like to reuse. The card contains sensitive informat ...
Chapter 12 ■ Practice Test 4 293 Carlos is planning a design for a data center that will be constructed within a new four- stor ...
294 Chapter 12 ■ Practice Test 4 A web application accesses information in a database to retrieve user information. What is the ...
Chapter 12 ■ Practice Test 4 295 How many backups in total must Tara apply to the system to make the data it contains as curren ...
296 Chapter 12 ■ Practice Test 4 Bob has been tasked with writing a policy that describes how long data should be kept and when ...
Chapter 12 ■ Practice Test 4 297 A. Ring 0 B. Ring 1 C. Ring 2 D. Ring 3 What level of RAID is also known as disk striping? A. ...
298 Chapter 12 ■ Practice Test 4 What type of communications rely on a timing mechanism using either an independent clock or a ...
Chapter 12 ■ Practice Test 4 299 What access control scheme labels subjects and objects, and allows subjects to access objects ...
300 Chapter 12 ■ Practice Test 4 Use your knowledge of Kerberos authentication and authorization as well as the following diagra ...
Chapter 12 ■ Practice Test 4 301 What does a service ticket (ST) provide in Kerberos authentication? A. It serves as the authe ...
302 Chapter 12 ■ Practice Test 4 6 7. Something you know is an example of what type of authentication factor? A. Typ e 1 B. Typ ...
Chapter 12 ■ Practice Test 4 303 C. Vulnerability assessment tools D. Penetration testing methodologies What is the highest lev ...
304 Chapter 12 ■ Practice Test 4 Which one of the following metrics specifies the amount of time that business continuity plann ...
«
37
38
39
40
41
42
43
44
45
46
»
Free download pdf