CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

156 Chapter 7 ■ Security Operations (Domain 7)



  1. Match each of the numbered terms with its correct lettered definition:


Terms


  1. Honeypot

  2. Honeynet

  3. Pseudoflaw

  4. Darknet


Definitions
A. An intentionally designed vulnerability used to lure in an attacker
B. A network set up with intentional vulnerabilities
C. A system set up with intentional vulnerabilities
D. A monitored network without any hosts


  1. Which one of the following mechanisms is not commonly seen as a deterrent to fraud?
    A. Job rotation
    B. Mandatory vacations
    C. Incident response
    D. Two-person control

  2. Brian recently joined an organization that runs the majority of its services on a virtualiza-
    tion platform located in its own data center but also leverages an IaaS provider for hosting
    its web services and a SaaS email system. What term best describes the type of cloud
    environment this organization uses?
    A. Public cloud
    B. Dedicated cloud
    C. Private cloud
    D. Hybrid cloud

  3. Tom is responding to a recent security incident and is seeking information on the approval
    process for a recent modification to a system’s security settings. Where would he most
    likely find this information?
    A. Change log
    B. System log
    C. Security log
    D. Application log

  4. Mark is considering replacing his organization’s customer relationship management
    (CRM) solution with a new product that is available in the cloud. This new solution is
    completely managed by the vendor, and Mark’s company will not have to write any code
    or manage any physical resources. What type of cloud solution is Mark considering?
    A. IaaS
    B. CaaS

Free download pdf