CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

68 Chapter 3 ■ Security Architecture and Engineering (Domain 3)



  1. What physical security control broadcasts false emanations constantly to mask the pres-
    ence of true electromagnetic emanations from computing equipment?
    A. Faraday cage
    B. Copper-infused windows
    C. Shielded cabling
    D. White noise

  2. In a software as a service cloud computing environment, who is normally responsible for
    ensuring that appropriate firewall controls are in place to protect the application?
    A. Customer’s security team
    B. Vendor
    C. Customer’s networking team
    D. Customer’s infrastructure management team

  3. Alice has read permissions on an object, and she would like Bob to have those same rights.
    Which one of the rules in the Take-Grant protection model would allow her to complete
    this operation?
    A. Create rule
    B. Remove rule
    C. Grant rule
    D. Take rule

  4. As part of his incident response process, Charles securely wipes the drive of a compro-
    mised machine and reinstalls the operating system (OS) from original media. Once he is
    done, he patches the machine fully and applies his organization’s security templates before
    reconnecting the system to the network. Almost immediately after the system is returned
    to service, he discovers that it has reconnected to the same botnet it was part of before.
    Where should Charles look for the malware that is causing this behavior?
    A. The operating system partition
    B. The system BIOS or firmware
    C. The system memory
    D. The installation media

  5. Which one of the following computing models allows the execution of multiple concurrent
    tasks within a single process?
    A. Multitasking
    B. Multiprocessing

Free download pdf