CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 7 ■ Security Operations (Domain 7) 159


File Modifications
Monday 8 a.m. - File 1 created
Monday 10 a.m. - File 2 created
Monday 11 a.m. - File 3 created
Monday 4 p.m. - File 1 modified
Monday 5 p.m. - File 4 created
Tuesday 8 a.m. - File 1 modified
Tuesday 9 a.m. - File 2 modified
Tuesday 10 a.m. - File 5 created
Wednesday 8 a.m. - File 3 modified
Wednesday 9 a.m. - File 6 created


  1. Which one of the following security tools is not capable of generating an active response to
    a security event?
    A. IPS
    B. Firewall
    C. IDS
    D. Antivirus software

  2. In virtualization platforms, what name is given to the module that is responsible for con-
    trolling access to physical resources by virtual resources?
    A. Guest machine
    B. SDN
    C. Kernel
    D. Hypervisor

  3. What term is used to describe the default set of privileges assigned to a user when a new
    account is created?
    A. Aggregation
    B. Transitivity
    C. Baseline
    D. Entitlement

  4. Which one of the following types of agreements is the most formal document that contains
    expectations about availability and other performance parameters between a service
    provider and a customer?
    A. Service-level agreement (SLA)
    B. Operational-level agreement (OLA)
    C. Memorandum of understanding (MOU)
    D. Statement of work (SOW)

Free download pdf