CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

242 Chapter 10 ■ Practice Test 2



  1. A Type 2 authentication factor that generates dynamic passwords based on a time- or
    algorithm-based system is what type of authenticator?
    A. A PIV
    B. A smart card
    C. A token
    D. A CAC

  2. Fred’s new employer has hired him for a position with access to their trade secrets and
    confidential internal data. What legal tool should they use to help protect their data if he
    chooses to leave to work at a competitor?
    A. A stop-loss order
    B. An NDA
    C. An AUP
    D. Encryption

  3. Which one of the following computing models allows the execution of multiple processes
    on a single processor by having the operating system switch between them without requir-
    ing modification to the applications?
    A. Multitasking
    B. Multiprocessing
    C. Multiprogramming
    D. Multithreading

  4. How many possible keys exist when using a cryptographic algorithm that has an 8-bit
    binary encryption key?
    A. 16
    B. 128
    C. 256
    D. 512

  5. What activity is being performed when you apply security controls based on the specific
    needs of the IT system that they will be applied to?
    A. Standardizing
    B. Baselining
    C. Scoping
    D. Tailoring

  6. During what phase of the electronic discovery process does an organization perform a
    rough cut of the information gathered to discard irrelevant information?
    A. Preservation
    B. Identification
    C. Collection
    D. Processing

Free download pdf