CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 9 ■ Practice Test 1 209



  1. What type of log is shown in the figure?


A. Firewall log
B. Change log
C. Application log
D. System log


  1. Alex works for the United States (U.S.) federal government and is required to ensure that
    the devices and components he acquires are not compromised. What program will he par-
    ticipate in to help ensure this?
    A. TEMPEST
    B. Trusted foundry
    C. GovBuy
    D. MITRE

  2. When an attacker calls an organization’s help desk and persuades them to reset a password
    for them due to the help desk employee’s trust and willingness to help, what type of attack
    succeeded?
    A. A human Trojan
    B. Social engineering
    C. Phishing
    D. Whaling

  3. When a user attempts to log into their online account, Google sends a text message with a
    code to their cell phone. What type of verification is this?
    A. Knowledge-based authentication
    B. Dynamic knowledge–based authentication
    C. Out-of-band identity proofing
    D. Risk-based identity proofing

Free download pdf