CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

292 Chapter 12 ■ Practice Test 4



  1. Mike has a flash memory card that he would like to reuse. The card contains sensitive
    information. What technique can he use to securely remove data from the card and allow
    its reuse?
    A. Degaussing
    B. Physical destruction
    C. Overwriting
    D. Reformatting

  2. Carlos is investigating the compromise of sensitive information in his organization. He
    believes that attackers managed to retrieve personnel information on all employees from
    the database and finds the following user-supplied input in a log entry for a web-based
    personnel management system:
    Collins’&1=1;––


What type of attack took place?
A. SQL injection
B. Buffer overflow
C. Cross-site scripting
D. Cross-site request forgery


  1. Which one of the following is a detailed, step-by-step document that describes the exact
    actions that individuals must complete?
    A. Policy
    B. Standard
    C. Guideline
    D. Procedure

  2. What principle of relational databases ensures the permanency of transactions that have
    successfully completed?
    A. Atomicity
    B. Consistency
    C. Isolation
    D. Durability

  3. Bryan has a set of sensitive documents that he would like to protect from public disclo-
    sure. He would like to use a control that, if the documents appear in a public forum, may
    be used to trace the leak back to the person who was originally given the document copy.
    What security control would best fulfill this purpose?
    A. Digital signature
    B. Document staining
    C. Hashing
    D. Watermarking

Free download pdf