CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 7 ■ Security Operations (Domain 7) 171



  1. Darcy is a computer security specialist who is assisting with the prosecution of a hacker.
    The prosecutor requests that Darcy give testimony in court about whether, in her opinion,
    the logs and other records in a case are indicative of a hacking attempt. What type of evi-
    dence is Darcy being asked to provide?
    A. Expert opinion
    B. Direct evidence
    C. Real evidence
    D. Documentary evidence

  2. Which one of the following techniques is not commonly used to remove unwanted rem-
    nant data from magnetic tapes?
    A. Physical destruction
    B. Degaussing
    C. Overwriting
    D. Reformatting

  3. What is the minimum number of disks required to implement RAID level 1?


A. One
B. Two
C. Three
D. Five


  1. Jerome is conducting a forensic investigation and is reviewing database server logs to
    investigate query contents for evidence of SQL injection attacks. What type of analysis is
    he performing?
    A. Hardware analysis
    B. Software analysis
    C. Network analysis
    D. Media analysis

  2. Quantum Computing regularly ships tapes of backup data across the country to a second-
    ary facility. These tapes contain confidential information. What is the most important
    security control that Quantum can use to protect these tapes?
    A. Locked shipping containers
    B. Private couriers
    C. Data encryption
    D. Media rotation

Free download pdf