CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 7 ■ Security Operations (Domain 7) 169



  1. In what virtualization model do full guest operating systems run on top of a virtualization
    platform?
    A. Virtual machines
    B. Software-defined networking
    C. Virtual SAN
    D. Application virtualization

  2. What level of RAID is also known as disk mirroring?


A. RAID-0
B. R A ID-1
C. RAID-5
D. R A ID-10


  1. Bruce is seeing quite a bit of suspicious activity on his network. It appears that an outside
    entity is attempting to connect to all of his systems using a TCP connection on port 22.
    What type of scanning is the outsider likely engaging in?
    A. FTP scanning
    B. Telnet scanning
    C. SSH scanning
    D. HTTP scanning

  2. The historic ping of death attack is most similar to which of the following modern
    attack types?
    A. SQL injection
    B. Cross-site scripting
    C. Buffer overflow
    D. Brute-force password cracking

  3. Roger recently accepted a new position as a security professional at a company that runs
    its entire IT infrastructure within an IaaS environment. Which one of the following would
    most likely be the responsibility of Roger’s firm?
    A. Configuring the network firewall
    B. Applying hypervisor updates
    C. Patching operating systems
    D. Wiping drives prior to disposal

  4. What technique can application developers use to test applications in an isolated virtual-
    ized environment before allowing them on a production network?
    A. Penetration testing
    B. Sandboxing
    C. White box testing
    D. Black box testing

Free download pdf