CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 12 ■ Practice Test 4 307


What flaw has Ben introduced with his hashing implementation?
A. Plaintext salting
B. Salt reuse
C. Use of a short salt
D. Poor salt algorithm selection


  1. Which one of the following is an example of risk transference?


A. Building a guard shack
B. Purchasing insurance
C. Erecting fences
D. Relocating facilities


  1. What protocol takes the place of certificate revocation lists and adds real-time status veri-
    fication?
    A. RTCP
    B. RTVP
    C. OCSP
    D. CSRTP

  2. Jim performs lexical analysis on a program and produces control flow graphs. What type
    of software testing is he performing?
    A. Dynamic
    B. Fuzzing
    C. Manual
    D. Static

  3. What process makes TCP a connection-oriented protocol?


A. It works via network connections.
B. It uses a handshake.
C. It monitors for dropped connections.
D. It uses a complex header.


  1. What LDAP operation includes authentication to the LDAP server?


A. Bind
B. Auth
C. StartLDAP
D. AuthDN
Free download pdf