CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

172 Chapter 7 ■ Security Operations (Domain 7)



  1. Carolyn is concerned that users on her network may be storing sensitive information, such
    as Social Security numbers, on their hard drives without proper authorization or security
    controls. What technology can she use to best detect this activity?
    A. IDS
    B. IPS
    C. DLP
    D. TLS

  2. Under what type of software license does the recipient of software have an unlimited right
    to copy, modify, distribute, or resell a software package?
    A. GNU Public License
    B. Freeware
    C. Open source
    D. Public domain

  3. In what type of attack do attackers manage to insert themselves into a connection between
    a user and a legitimate website?
    A. Man-in-the-middle
    B. Fraggle
    C. Wardriving
    D. Meet-in-the-middle

  4. Which one of the following techniques uses statistical methods to select a small number
    of records from a large pool for further analysis with the goal of choosing a set of records
    that is representative of the entire pool?
    A. Clipping
    B. Randomization
    C. Sampling
    D. Selection

  5. Which one of the following controls protects an organization in the event of a sustained
    period of power loss?
    A. Redundant servers
    B. Uninterruptible power supply (UPS)
    C. Generator
    D. RAID

  6. What concept from the Federal Rules of Civil Procedure (FCRP) helps to ensure that addi-
    tional time and expense are not incurred as part of electronic discovery when the benefits
    do not outweigh the costs?
    A. Tool-assisted review
    B. Cooperation

Free download pdf