CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 7 ■ Security Operations (Domain 7) 167



  1. Gordon suspects that a hacker has penetrated a system belonging to his company. The
    system does not contain any regulated information, and Gordon wishes to conduct an
    investigation on behalf of his company. He has permission from his supervisor to conduct
    the investigation. Which of the following statements is true?
    A. Gordon is legally required to contact law enforcement before beginning the investigation.
    B. Gordon may not conduct his own investigation.
    C. Gordon’s investigation may include examining the contents of hard disks, network
    traffic, and any other systems or information belonging to the company.
    D. Gordon may ethically perform “hack back” activities after identifying the perpetrator.

  2. Which one of the following tools provides an organization with the greatest level of
    protection against a software vendor going out of business?
    A. Service level agreement
    B. Escrow agreement
    C. Mutual assistance agreement
    D. PCI DSS compliance agreement

  3. Fran is considering new human resources policies for her bank that will deter fraud. She
    plans to implement a mandatory vacation policy. What is typically considered the shortest
    effective length of a mandatory vacation?
    A. Two d ay s
    B. Four days
    C. One week
    D. One month

  4. Which of the following events would constitute a security incident?

    1. An attempted network intrusion

    2. A successful database intrusion

    3. A malware infection

    4. A violation of a confidentiality policy

    5. An unsuccessful attempt to remove information from a secured area
      A. 2 , 3, and 4
      B. 1 , 2, and 3
      C. 4 and 5
      D. All of the above



  5. Which one of the following traffic types should not be blocked by an organization’s egress
    filtering policy?
    A. Traffic destined to a private IP address
    B. Traffic with a broadcast destination
    C. Traffic with a source address from an external network
    D. Traffic with a destination address on an external network

Free download pdf