CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

232 Chapter 10 ■ Practice Test 2



  1. James is building a disaster recovery plan for his organization and would like to determine
    the amount of acceptable data loss after an outage. What variable is James determining?
    A. SLA
    B. RTO
    C. MTD
    D. RPO

  2. Fred needs to deploy a network device that can connect his network to other networks
    while controlling traffic on his network. What type of device is Fred’s best choice?
    A. A switch
    B. A bridge
    C. A gateway
    D. A router

  3. Alex is preparing to solicit bids for a penetration test of his company’s network and sys-
    tems. He wants to maximize the effectiveness of the testing rather than the realism of the
    test. What type of penetration test should he require in his bidding process?
    A. Black box
    B. Crystal box
    C. Gray box
    D. Zero box

  4. Application banner information is typically recorded during what penetration testing phase?
    A. Planning
    B. Attack
    C. Reporting
    D. Discovery

  5. What is the default subnet mask for a Class B network?
    A. 255.0.0.0
    B. 255.255.0.0
    C. 255.254.0.0
    D. 255.255.255.0

  6. Jim has been asked to individually identify devices that users are bringing to work as part
    of a new BYOD policy. The devices will not be joined to a central management system
    like Active Directory, but he still needs to uniquely identify the systems. Which of the follow-
    ing options will provide Jim with the best means of reliably identifying each unique device?
    A. Record the MAC address of each system.
    B. Require users to fill out a form to register each system.

Free download pdf