CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 3 ■ Security Architecture and Engineering (Domain 3) 75


C. Typing with the rhythm of Morse code
D. Writing data to a shared memory space


  1. Which one of the following would be a reasonable application for the use of self-signed
    digital certificates?
    A. E-commerce website
    B. Banking application
    C. Internal scheduling application
    D. Customer portal

  2. Mike has been tasked with preventing an outbreak of malware like Mirai. What type of
    systems should be protected in his organization?
    A. Servers
    B. SCADA
    C. Mobile devices
    D. Internet of Things (IoT) devices

  3. A component failure in the primary HVAC system leads to a high temperature alarm in
    the data center that Kim manages. After resolving the issue, what should Kim consider to
    prevent future issues like this?
    A. A closed loop chiller
    B. Redundant cooling systems
    C. Swamp coolers
    D. Relocating the data center to a colder climate

  4. As part of his team’s forensic investigation process, Matt signs drives and other evidence
    out of storage before working with them. What type of documentation is he creating?
    A. Criminal
    B. Chain of custody
    C. Civil
    D. CYA

  5. Lauren implements ASLR to help prevent system compromises. What technique has she
    used to protect her system?
    A. Encryption
    B. Mandatory access control
    C. Memory address randomization
    D. Discretionary access control

Free download pdf