CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

226 Chapter 9 ■ Practice Test 1


112. Kolin is searching for a network security solution that will allow him to help reduce zero-
day attacks while using identities to enforce a security policy on systems before they con-
nect to the network. What type of solution should Kolin implement?
A. A firewall
B. A NAC system
C. An intrusion detection system
D. Port security


  1. Gwen comes across an application that is running under a service account on a web server.
    The service account has full administrative rights to the server. What principle of informa-
    tion security does this violate?
    A. Need to know
    B. Separation of duties
    C. Least privilege
    D. Job rotation

  2. Which of the following is not a type of structural coverage in a code review process?
    A. Statement
    B. Trace
    C. Loop
    D. Data flow

  3. Which of the following tools is best suited to the information gathering phase of a penetra-
    tion test?
    A. Whois
    B. zzuf
    C. Nessus
    D. Metasploit


For questions 116–118, please refer to the following scenario:

During a web application vulnerability scanning test, Steve runs Nikto against a web
server he believes may be vulnerable to attacks. Using the Nikto output shown here,
answer the following questions.
Free download pdf