CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

244 Chapter 10 ■ Practice Test 2



  1. As part of hiring a new employee, Kathleen’s identity management team creates a new user
    object and ensures that the user object is available in the directories and systems where it is
    needed. What is this process called?
    A. Registration
    B. Provisioning
    C. Population
    D. Authenticator loading

  2. Ricky would like to access a remote file server through a VPN connection. He begins this
    process by connecting to the VPN and attempting to log in. Applying the subject/object
    model to this request, what is the subject of Ricky’s login attempt?
    A. Ricky
    B. VPN
    C. Remote file server
    D. Files contained on the remote server

  3. Alice is designing a cryptosystem for use by six users and would like to use a symmetric
    encryption algorithm. She wants any two users to be able to communicate with each other
    without worrying about eavesdropping by a third user. How many symmetric encryption
    keys will she need to generate?
    A. 6
    B. 12
    C. 15
    D. 30

  4. Which one of the following intellectual property protection mechanisms has the shortest
    duration?
    A. Copyright
    B. Patent
    C. Trademark
    D. Trade secret

  5. Gordon is developing a business continuity plan for a manufacturing company’s IT
    operations. The company is located in North Dakota and currently evaluating the risk of
    earthquake. They choose to pursue a risk acceptance strategy. Which one of the following
    actions is consistent with that strategy?
    A. Purchasing earthquake insurance
    B. Relocating the data center to a safer area
    C. Documenting the decision-making process
    D. Reengineering the facility to withstand the shock of an earthquake

Free download pdf