160 Chapter 7 ■ Security Operations (Domain 7)
- Which one of the following frameworks focuses on IT service management and includes
topics such as change management, configuration management, and service level
agreements?
A. ITIL
B. PMBOK
C. PCI DSS
D. TOGAF - Richard is experiencing issues with the quality of network service on his organization’s
network. The primary symptom is that packets are consistently taking too long to travel
from their source to their destination. What term describes the issue Richard is facing?
A. Jitter
B. Packet loss
C. Interference
D. Latency - Joe wants to test a program he suspects may contain malware. What technology can he
use to isolate the program while it runs?
A. ASLR
B. Sandboxing
C. Clipping
D. Process isolation - Which one of the following is an example of a manmade disaster?
A. Hurricane
B. Flood
C. Mudslide
D. Transformer failure - Which of the following is not true about the (ISC)^2 code of ethics?
A. Adherence to the code is a condition of certification.
B. Failure to comply with the code may result in revocation of certification.
C. The code applies to all members of the information security profession.
D. Members who observe a breach of the code are required to report the possible
violation. - Javier is verifying that only IT system administrators have the ability to log on to servers
used for administrative purposes. What principle of information security is he enforcing?
A. Need to know
B. Least privilege