CISSP Official Practice Tests by Mike Chapple, David Seidl
Chapter 10: Practice Test 2 425 C. Password histories retain a list of previous passwords, preferably a list of salted hashes f ...
426 Appendix ■ Answers 76. C. A Security Information and Event Management (SIEM) tool is designed to provide automated analysis ...
Chapter 10: Practice Test 2 427 C. Trusted paths that secure network traffic from capture and link encryption are both ways to ...
428 Appendix ■ Answers 9 1. C. Since Lauren wants to monitor her production server, she should use passive monitoring by employi ...
Chapter 10: Practice Test 2 429 D. The comparison of a factor to validate an identity is known as authentication. Identificatio ...
430 Appendix ■ Answers 11 2. B. Kathleen’s needs point to a directory service, and the Lightweight Directory Access Protocol (LD ...
Chapter 11: Practice Test 3 431 B. EAP was originally intended to be used on physically isolated network channels and did not i ...
432 Appendix ■ Answers 4. A. Key risk indicators (KRIs) are often used to monitor risk for organizations that establish an ongoi ...
Chapter 11: Practice Test 3 433 B. A cognitive password authenticates users based on a series of facts or answers to questions ...
434 Appendix ■ Answers 2 1. A. Susan is performing passive monitoring, which uses a network tap or span port to capture traffic ...
Chapter 11: Practice Test 3 435 A. Lauren’s team would benefit from a credential management system. Credential management syste ...
436 Appendix ■ Answers 4 0. D. During a tabletop exercise, team members come together and walk through a scenario without making ...
Chapter 11: Practice Test 3 437 C. Wireshark is a network monitoring tool that can capture and replay communications sent over ...
438 Appendix ■ Answers 5 9. D. Remote journaling transfers transaction logs to a remote site on a more frequent basis than elect ...
Chapter 11: Practice Test 3 439 review to peers. Pair programming requires two developers, only one of whom writes code while bo ...
440 Appendix ■ Answers 76. A. 2 01.19.7.45 is a public IP address. RFC 1918 addresses are in the ranges 10.0.0.0 to 0.255.255.25 ...
Chapter 11: Practice Test 3 441 8 7. C. The root cause analysis examines the incident to determine what allowed it to happen and ...
442 Appendix ■ Answers 9 9. A. Skip should use SCP—Secure Copy is a secure file transfer method. SSH is a secure command-line an ...
Chapter 11: Practice Test 3 443 C. Record retention policies describe how long the organization should retain data and may als ...
444 Appendix ■ Answers 11 9. C. A unique salt should be created for each user using a secure generation method and stored in tha ...
«
43
44
45
46
47
48
49
50
51
52
»
Free download pdf