CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 12 ■ Practice Test 4 297


A. Ring 0
B. Ring 1
C. Ring 2
D. Ring 3


  1. What level of RAID is also known as disk striping?


A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 10


  1. Jacob executes an attack against a system using a valid but low-privilege user account
    by accessing a file pointer that the account has access to. After the access check, but
    before the file is opened, he quickly switches the file pointer to point to a file that the user
    account does not have access to. What type of attack is this?
    A. TOCTOU
    B. Permissions creep
    C. Impersonation
    D. Link swap

  2. What is the minimum number of disks required to implement RAID level 0?


A. 1
B. 2
C. 3
D. 5


  1. Fred’s company wants to ensure the integrity of email messages sent via their central
    email servers. If the confidentiality of the messages is not critical, what solution should
    Fred suggest?
    A. Digitally sign and encrypt all messages to ensure integrity.
    B. Digitally sign but don’t encrypt all messages.
    C. Use TLS to protect messages, ensuring their integrity.
    D. Use a hashing algorithm to provide a hash in each message to prove that it hasn’t
    changed.

  2. The leadership at Susan’s company has asked her to implement an access control system
    that can support rule declarations like “Only allow access to salespeople from managed
    devices on the wireless network between 8 a.m. and 6 p.m.” What type of access control
    system would be Susan’s best choice?
    A. ABAC
    B. RBAC
    C. DAC
    D. M AC

Free download pdf