CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

170 Chapter 7 ■ Security Operations (Domain 7)



  1. Gina is the firewall administrator for a small business and recently installed a new fire-
    wall. After seeing signs of unusually heavy network traffic, she checked the intrusion
    detection system, which reported that a SYN flood attack was under way. What firewall
    configuration change can Gina make to most effectively prevent this attack?
    A. Block SYN from known IPs.
    B. Block SYN from unknown IPs.
    C. Enable SYN-ACK spoofing at the firewall.
    D. Disable TCP.

  2. What type of trust relationship extends beyond the two domains participating in the trust
    to one or more of their subdomains?
    A. Transitive trust
    B. Inheritable trust
    C. Nontransitive trust
    D. Noninheritable trust

  3. Renee is a software developer who writes code in Node.js for her organization. The com-
    pany is considering moving from a self-hosted Node.js environment to one where Renee
    will run her code on application servers managed by a cloud vendor. What type of cloud
    solution is Renee’s company considering?
    A. IaaS
    B. CaaS
    C. PaaS
    D. SaaS

  4. Timber Industries recently got into a dispute with a customer. During a meeting with his
    account representative, the customer stood up and declared, “There is no other solution.
    We will have to take this matter to court.” He then left the room. When does Timber
    Industries have an obligation to begin preserving evidence?
    A. Immediately
    B. Upon receipt of a notice of litigation from opposing attorneys
    C. Upon receipt of a subpoena
    D. Upon receipt of a court order

  5. What legal protection prevents law enforcement agencies from searching a facility or elec-
    tronic system without either probable cause or consent?
    A. First Amendment
    B. Fourth Amendment
    C. Fifth Amendment
    D. Fifteenth Amendment

Free download pdf