CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 12 ■ Practice Test 4 303


C. Vulnerability assessment tools
D. Penetration testing methodologies


  1. What is the highest level of the military classification scheme?


A. Secret
B. Confidential
C. SBU
D. Top S e c re t


  1. In what type of trusted recovery process does the system recover against one or more fail-
    ure types without administrator intervention while protecting itself against data loss?
    A. Automated recovery
    B. Manual recovery
    C. Function recovery
    D. Automated recovery without undue data loss

  2. What three important items should be considered if you are attempting to control the
    strength of signal for a wireless network as well as where it is accessible?
    A. Antenna placement, antenna type, antenna power levels
    B. Antenna design, power levels, use of a captive portal
    C. Antenna placement, antenna design, use of a captive portal
    D. Power levels, antenna placement, FCC minimum strength requirements

  3. What is the best way to ensure that data is unrecoverable from a SSD?


A. Use the built-in erase commands
B. Use a random pattern wipe of 1s and 0s
C. Physically destroy the drive
D. Degauss the drive

7 7. Alice sends a message to Bob and wants to ensure that Mal, a third party, does not read
the contents of the message while in transit. What goal of cryptography is Alice attempting
to achieve?
A. Confidentiality
B. Integrity
C. Authentication
D. Nonrepudiation

Free download pdf