CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 12 ■ Practice Test 4 305



  1. In the diagram shown here of security boundaries within a computer system, what compo-
    nent’s name has been replaced with XXX?


User Space

Process Process

Reference
Monitor

TCB
XXX

Process

A. Kernel
B. Privileged core
C. User monitor
D. Security perimeter


  1. Val is attempting to review security logs but is overwhelmed by the sheer volume of
    records maintained in her organization’s central log repository. What technique can she
    use to select a representative set of records for further review?
    A. Statistical sampling.
    B. Clipping.
    C. Choose the first 5% of records from each day.
    D. Choose 5% of records from the middle of the day.

  2. In Jen’s job as the network administrator for an industrial production facility, she is tasked
    with ensuring that the network is not susceptible to electromagnetic interference due to
    the large motors and other devices running on the production floor. What type of network
    cabling should she choose if this concern is more important than cost and difficulty of
    installation?
    A. 10Base2
    B. 100BaseT
    C. 1000BaseT
    D. Fiber-optic

Free download pdf