CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

140 Chapter 6 ■ Security Assessment and Testing (Domain 6)



  1. In this image, what issue may occur due to the log handling settings?


A. Log data may be lost when the log is archived.
B. Log data may be overwritten.
C. Log data may not include needed information.
D. Log data may fill the system disk.


  1. Which of the following is not a hazard associated with penetration testing?
    A. Application crashes
    B. Denial of service
    C. Exploitation of vulnerabilities
    D. Data corruption

  2. Which NIST special publication covers the assessment of security and privacy controls?
    A. 800 -12
    B. 800-53A
    C. 800-34
    D. 800-86

Free download pdf