CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 11 ■ Practice Test 3 279



  1. What law prevents the removal of protection mechanisms placed on a copyrighted work by
    the copyright holder?
    A. H I PA A
    B. DMCA
    C. GLBA
    D. ECPA

  2. Linda is selecting a disaster recovery facility for her organization, and she wishes to retain
    independence from other organizations as much as possible. She would like to choose a
    facility that balances cost and recovery time, allowing activation in about one week after a
    disaster is declared. What type of facility should she choose?
    A. Cold site
    B. Warm site
    C. Mutual assistance agreement
    D. Hot site

  3. Purchasing insurance is a form of what type of risk response?


A. Transfer
B. Avoid
C. Mitigate
D. Accept


  1. What type of penetration testing provides detail on the scope of a penetration test—
    including items like what systems would be targeted—but does not provide full visibility
    into the configuration or other details of the systems or networks the penetration tester
    must test?
    A. Crystal box
    B. White box
    C. Black box
    D. Gray box

  2. Test coverage is computed using which of the following formulas?


A. Number of use cases tested/total number of use cases
B. Number of lines of code tested/total number of lines of code
C. Number of functions tested/total number of functions
D. Number of conditional branches tested/Total number of testable branches


  1. TCP and UDP both operate at what layer of the OSI model?


A. Layer 2
B. Layer 3
C. Layer 4
D. Layer 5
Free download pdf