CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 9 ■ Practice Test 1 213



  1. Roger is concerned that a third-party firm hired to develop code for an internal applica-
    tion will embed a backdoor in the code. The developer retains rights to the intellectual
    property and will only deliver the software in its final form. Which one of the following
    languages would be least susceptible to this type of attack because it would provide Roger
    with code that is human-readable in its final form?
    A. JavaScript
    B. C
    C. C++
    D. Java

  2. Jesse is looking at the /etc/passwd file on a system configured to use shadowed
    passwords. What should she expect to see in the password field of this file?
    A. Plaintext passwords
    B. Encrypted passwords
    C. Hashed passwords
    D. x

  3. SYN floods rely on implementations of what protocol to cause denial of service
    conditions?
    A. IGMP
    B. UDP
    C. TCP
    D. ICMP

  4. What principle states that an individual should make every effort to complete his or her
    responsibilities in an accurate and timely manner?
    A. Least privilege
    B. Separation of duties
    C. Due care
    D. Due diligence

  5. Cable modems, ISDN, and DSL are all examples of what type of technology?


A. Baseband
B. Broadband
C. Digital
D. Broadcast
Free download pdf