CISSP Official Practice Tests by Mike Chapple, David Seidl
Chapter 12 ■ Practice Test 4 305 In the diagram shown here of security boundaries within a computer system, what compo- nent’s ...
306 Chapter 12 ■ Practice Test 4 For questions 86–89, please refer to the following scenario: Jasper Diamonds is a jewelry manuf ...
Chapter 12 ■ Practice Test 4 307 What flaw has Ben introduced with his hashing implementation? A. Plaintext salting B. Salt reus ...
308 Chapter 12 ■ Practice Test 4 You are conducting a qualitative risk assessment for your organization. The two important risk ...
Chapter 12 ■ Practice Test 4 309 Susan is setting up the network for a local coffee house and wants to ensure that users have t ...
310 Chapter 12 ■ Practice Test 4 What are the most likely circumstances that would cause a remote wipe of a mobile phone to fai ...
Chapter 12 ■ Practice Test 4 311 Kathleen has been asked to choose a highly formalized code review process for her soft- ware ...
312 Chapter 12 ■ Practice Test 4 Ed is building a network that supports IPv6 but needs to connect it to an IPv4 network. What t ...
Chapter 12 ■ Practice Test 4 313 C. Organizations must use proper mechanisms to protect data against unauthorized disclosure. D. ...
314 Chapter 12 ■ Practice Test 4 What email encryption technique is illustrated in this figure? q4fzNeBCRSYo Data Data Encrypt ...
Chapter 12 ■ Practice Test 4 315 When Ben lists the files on a Linux system, he sees a set of attributes as shown in the fol- l ...
...
Appendix Answers Appendix Answers ...
318 Appendix ■ Answers Chapter 1: Security and Risk Management (Domain 1) D. The final step of a quantitative risk analysis is ...
Chapter 1: Security and Risk Management (Domain 1) 319 D. The US Department of Commerce is responsible for implementing the EU- ...
320 Appendix ■ Answers 2 2. B. RAID technology provides fault tolerance for hard drive failures and is an example of a business ...
Chapter 1: Security and Risk Management (Domain 1) 321 A. The data custodian role is assigned to an individual who is responsib ...
322 Appendix ■ Answers 4 8. C. RAID uses additional hard drives to protect the server against the failure of a single device. Lo ...
Chapter 1: Security and Risk Management (Domain 1) 323 B. There is no requirement that patents be for inventions made by Americ ...
324 Appendix ■ Answers 7 2. B. The Communications Assistance to Law Enforcement Act (CALEA) requires that all communications car ...
«
38
39
40
41
42
43
44
45
46
47
»
Free download pdf