CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

214 Chapter 9 ■ Practice Test 1



  1. What penetration testing technique can best help assess training and awareness issues?
    A. Port scanning
    B. Discovery
    C. Social engineering
    D. Vulnerability scanning

  2. Bill implemented RAID level 5 on a server that he operates using a total of three disks.
    How many disks may fail without the loss of data?
    A. 0
    B. 1
    C. 2
    D. 3

  3. Data is sent as bits at what layer of the OSI model?
    A. Transport
    B. Network
    C. Data Link
    D. Physical

  4. Bert is considering the use of an infrastructure as a service cloud computing partner to
    provide virtual servers. Which one of the following would be a vendor responsibility in
    this scenario?
    A. Maintaining the hypervisor
    B. Managing operating system security settings
    C. Maintaining the host firewall
    D. Configuring server access control

  5. When Ben records data and then replays it against his test website to verify how it per-
    forms based on a real production workload, what type of performance monitoring is he
    undertaking?
    A. Passive
    B. Proactive
    C. Reactive
    D. Replay

  6. What technology ensures that an operating system allocates separate memory spaces used
    by each application on a system?
    A. Abstraction
    B. Layering
    C. Data hiding
    D. Process isolation

Free download pdf