CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

296 Chapter 12 ■ Practice Test 4



  1. Bob has been tasked with writing a policy that describes how long data should be kept and
    when it should be purged. What concept does this policy deal with?
    A. Data remanence
    B. Record retention
    C. Data redaction
    D. Audit logging

  2. Which component of IPsec provides authentication, integrity, and nonrepudiation?
    A. L2TP
    B. Encapsulating Security Payload
    C. Encryption Security Header
    D. Authentication Header

  3. Renee notices that a system on her network recently received connection attempts on all
    65,536 TCP ports from a single system during a short period of time. What type of attack
    did Renee most likely experience?
    A. Denial of service
    B. Reconnaissance
    C. Malicious insider
    D. Compromise

  4. What type of Windows audit record describes events like an OS shutdown or a service
    being stopped?
    A. An application log
    B. A security log
    C. A system log
    D. A setup log

  5. In the ring protection model shown here, what ring does not run in privileged mode?


Ring 0

Ring 1

Ring 2

Ring 3
Free download pdf