CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 9 ■ Practice Test 1 207



  1. Frank is the security administrator for a web server that provides news and information to
    people located around the world. His server received an unusually high volume of traffic
    that it could not handle and was forced to reject requests. Frank traced the source of the
    traffic back to a botnet. What type of attack took place?
    A. Denial of service
    B. Reconaissance
    C. Compromise
    D. Malicious insider

  2. In the database table shown here, which column would be the best candidate for a
    primary key?


1
2
3

234 Main Street
1024 Sample Street
913 Sorin Street

MD
FL
IN

21040
33131
46556

(301) 555-1212
(305) 555-1995
(574) 555-5863

14
14
26

Columbia
Miami
South Bend

Acme Widgets
Abrams Consulting
Dome Widgets

Company ID Company Name Address City State ZIP Code Telephone Sales Rep

A. Company ID
B. Company Name
C. ZIP Code
D. Sales Rep


  1. Information about an individual like their name, Social Security number, date and place of
    birth, or their mother’s maiden name is an example of what type of protected information?
    A. PHI
    B. Proprietary data
    C. PII
    D. EDI

  2. Bob is configuring egress filtering on his network, examining traffic destined for the Inter-
    net. His organization uses the public address range 12.8.195.0/24. Packets with which one
    of the following destination addresses should Bob permit to leave the network?
    A. 12.8.195.15
    B. 10.8.15.9
    C. 192.168.109.55
    D. 129.53.44.124

  3. How many possible keys exist in a cryptographic algorithm that uses 6-bit encryption keys?


A. 12
B. 16
C. 32
D. 64
Free download pdf