CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

298 Chapter 12 ■ Practice Test 4



  1. What type of communications rely on a timing mechanism using either an independent
    clock or a time stamp embedded in the communications?
    A. Analog
    B. Digital
    C. Synchronous
    D. Asynchronous

  2. Chris is deploying a gigabit Ethernet network using Category 6 cable between two build-
    ings. What is the maximum distance he can run the cable according to the Category 6
    standard?
    A. 5 0 meters
    B. 1 00 meters
    C. 2 00 meters
    D. 3 00 meters

  3. Howard is a security analyst working with an experienced computer forensics investigator.
    The investigator asks him to retrieve a forensic drive controller, but Howard cannot locate
    a device in the storage room with this name. What is another name for a forensic drive
    controller?
    A. RAID controller
    B. Write blocker
    C. SCSI terminator
    D. Forensic device analyzer

  4. The web application that Saria’s development team is working on needs to provide secure
    session management that can prevent hijacking of sessions using the cookies that the appli-
    cation relies on. Which of the following techniques would be the best for her to recom-
    mend to prevent this?
    A. Set the Secure attribute for the cookies, thus forcing TLS.
    B. Set the Domain cookie attribute to example.com to limit cookie access to servers in
    the same domain.
    C. Set the Expires cookie attribute to less than a week.
    D. Set the HTTPOnly attribute to require only unencrypted sessions.

  5. Ben’s company has recently retired their fleet of multifunction printers. Their information
    security team has expressed concerns that the printers contain hard drives and that they
    may still have data from scans and print jobs. What is the technical term for this issue?
    A. Data pooling
    B. Failed clearing
    C. Data permanence
    D. Data remanence

Free download pdf