CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 11 ■ Practice Test 3 271



  1. AES-based CCMP and 802.1x replaced what security protocol that was designed as part
    of WPA to help fix the significant security issues found in WEP?
    A. TLS
    B. TKIP
    C. EAP
    D. PEAP

  2. The government agency that Ben works at installed a new access control system. The
    system uses information such as Ben’s identity, department, normal working hours, job
    category, and location to make authorization. What type of access control system did Ben’s
    employer adopt?
    A. Role-based access control
    B. Attribute-based access control
    C. Administrative access control
    D. System discretionary access control

  3. The Low Orbit Ion Cannon (LOIC) attack tool used by Anonymous leverages a multitude
    of home PCs to attack its chosen targets. This is an example of what type of network
    attack?
    A. DDoS
    B. Ionization
    C. Zombie horde
    D. Teardrop

  4. Andrew believes that a digital certificate belonging to his organization was compromised
    and would like to add it to a Certificate Revocation List. Who must add the certificate to
    the CRL?
    A. Andrew
    B. The root authority for the top-level domain
    C. The CA that issued the certificate
    D. The revocation authority for the top-level domain

  5. Amanda is considering the implementation of a database recovery mechanism recom-
    mended by a consultant. In the recommended approach, an automated process will move
    records of transactions from the primary site to a backup site on an hourly basis. What
    type of database recovery technique is the consultant describing?
    A. Electronic vaulting
    B. Transaction logging
    C. Remote mirroring
    D. Remote journaling

Free download pdf