CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 10 ■ Practice Test 2 251


A. Application
B. Web server
C. System
D. Firewall


  1. Which one of the following activities transforms a zero-day vulnerability into a less dan-
    gerous attack vector?
    A. Discovery of the vulnerability
    B. Implementation of transport-layer encryption
    C. Reconfiguration of a firewall
    D. Release of a security patch

  2. Which one of the following is an example of a hardening provision that might strengthen
    an organization’s existing physical facilities and avoid implementation of a business conti-
    nuity plan?
    A. Patching a leaky roof
    B. Reviewing and updating firewall access control lists
    C. Upgrading operating systems
    D. Deploying a network intrusion detection system

  3. Susan wants to monitor traffic between systems in a VMWare environment. What solution
    would be her best option to monitor that traffic?
    A. Use a traditional hardware-based IPS.
    B. Install Wireshark on each virtual system.
    C. Set up a virtual span port and capture data using a VM IDS.
    D. Use netcat to capture all traffic sent between VMs.


For questions 99–102, please refer to the following scenario:

Matthew and Richard are friends located in different physical locations who would like to
begin communicating with each other using cryptography to protect the confidentiality of
their communications. They exchange digital certificates to begin this process and plan to
use an asymmetric encryption algorithm for the secure exchange of email messages.


  1. When Matthew sends Richard a message, what key should he use to encrypt the message?


A. Matthew’s public key
B. Matthew’s private key
C. Richard’s public key
D. Richard’s private key
Free download pdf