cissp test1-10
更新时间:2023-09-02 22:03:01 阅读量: 教育文库 文档下载
- cissp推荐度:
- 相关推荐
cissp test
1.Ensuring the integrity of business information is the PRIMARY concern of
A. Encryption Security
B. Procedural Security
C. Logical Security
D. On-line Security
Answer: B
Procedures are looked at as the lowest level in the policy chain because they are closest to the computers and
provide detailed steps for configuration and installation issues. They provide the steps to actually implement
the statements in the policies, standards, and guidelines...Security procedures, standards, measures,
practices, and policies cover a number of different subject areas. - Shon Harris All-in-one CISSP
Certification Guide pg 44-45
2.Which one of the following actions should be taken FIRST after a fire has been detected?
A. Turn off power to the computers
B. Call the fire department
C. Notify management
D. Evacuate all personnel
Answer: D
Protection of life is of the utmost importance and should be dealt with first before looking to save material
objects. . - Shon Harris All-in-one CISSP Certification Guide pg 625
3.Which one of the following is the Open Systems Interconnection (OSI) protocol for message handling?
A. X.25
B. X.400
C. X.500
D. X.509
Answer: B
An ISO and ITU standard for addressing and transporting e-mail messages. It conforms to layer 7 of the OSI
model and supports several types of transport mechanisms, including Ethernet, X.25, TCP/IP, and dial-up
lines. - http://www.77cn.com.cn/TERM/X/X_400.html
Not A: This is wrong X25 is the method that defines transport of point-to-point packet switching networks.
Not D: "The X.509 standard defines the format for public key certificates." Pg. 213 Krutz: The CISSP Prep
Guide: Gold Edition.
4.Which of the following is a weakness of both statistical anomaly detection and pattern matching?
A. Lack of ability to scale.
B. Lack of learning model.
C. Inability to run in real time.
D. Requirement to monitor every event.
Answer: B
Explanation: Disadvantages of Knowledge-based ID systems:
This system is resources-intensive; the knowledge database continually needs maintenance and updates
New, unique, or original attacks often go unnoticed.Disadvantages of Behavior-based ID systems:
The system is characterized by high false alarm rates. High positives are the most common failure of ID
systems and can create data noise that makes the system unusable.
The activity and behavior of the users while in the networked system might not be static enough to
effectively implement a behavior-based ID system. -Ronald Krutz The CISSP PREP Guide (gold edition)
pg 88
5.Digital signature users register their public keys with a certification authority, which distributes a
certificate containing the user's public key and digital signature of the certification authority. In
create the certificate,
the user's public key and the validity period are combined with what other
information before computing the digital signature?
A. Certificat
cissp test
e issuer and the Digital Signature Algorithm identifier
B. User's private key and the identifier of the master key code
C. Name of secure channel and the identifier of the protocol type
D. Key authorization and identifier of key distribution center
Answer: A
The key word is 'In create the certificate.." Certificates Certificates that conform to X.509 contain the
following data: Version of X.509 to which the certificate conforms; Serial number (from the certificate
creator); Signature alogrithim identifier (specifies the technique used by the certificate authority to digitally
sign the contens of the certificate); Issuer name (identification of the certificate authority that issues the
certificate) Validity perido (specifies the dates and times - a starting date and time and an ending date and
time - during which the certificate is valied); Subject's name (contains the distinguished name, or DN, of the
entity that owns the public key contained in teh certificate); Subject's public key (the meat of the certificate -
the actual public key of the certificate owneer used to setup secure communications) pg 343-344 CISSP
Study Guide byTittel
6.Why are macro viruses easy to write?
A. Active contents controls can make direct system calls
B. The underlying language is simple and intuitive to apply.
C. Only a few assembler instructions are needed to do damage.
D. Office templates are fully API compliant.
Answer: B
Macro Languages enable programmers to edit, delete, and copy files. Because these languages are so easy
to use, many more types of macro viruses are possible. - Shon Harris All-in-one CISSP Certification Guide
pg 785
7.Tracing violations, or attempted violations of system security to the user responsible is a function of
A. authentication
B. access management
C. integrity checking
D. accountability
Answer: D
Auditing capabilities ensure that users are accountable for their actions, verify that the security policies are
enforced, worked as a deterrent to improper actions, and are used as investigation tools. - Shon Harris Allin-
one CISSP Certification Guide pg 182
8.Which one of the following is concerned with masking the frequency, length, and origin-destination
patterns of the communications between protocol entities?
A. Masking analysis
B. Protocol analysis
C. Traffic analysis
D. Pattern analysis
Answer: C
Traffic analysis, which is sometimes called trend analysis, is a technique employed by an intruder that
involves analyzing data characteristics (message length, message frequency, and so forth) and the patterns of
transmissions (rather than any knowledge of the actual information transmitted) to infer information that is
useful to an intruder) . -Ronald Krutz The CISSP PREP Guide (gold edition) pg 323
9.In wh
ich situation would TEMPEST risks and technologies be of MOST interest?
A. Where high availability is vital.
B. Where the consequences of di
cissp test
sclose are very high.
C. Where countermeasures are easy to implement
D. Where data base integrity is crucial
Answer: B
Emanation eavesdropping. Receipt and display of information, which is resident on computers or terminals,
through the interception of radio frequency (RF) signals generated by those computers or terminals. The
US government established a program called TEMPEST that addressed this problem by requiring a
shielding and other emanation-reducing mechanisms to be employed on computers processing sensitive and
classified government information. . -Ronald Krutz The CISSP PREP Guide (gold edition) pg 416
10.In which state must a computer system operate to process input/output instructions?
A. User mode
B. Stateful inspection
C. Interprocess communication
D. Supervisor mode
Answer: D
A computer is in a supervisory state when it is executing these privileged instructions. (privileged
instructions are executed by the system a
dministrator or by an individual who is authorized to use those
instructions.) . -Ronald Krutz The CISSP PREP Guide (gold edition) pg 254-255
正在阅读:
cissp test1-1009-02
中国硼硅玻璃管行业发展研究报告 - 图文02-29
医疗器械文档控制程序11-23
华为交换机防ARP攻击配置手册04-27
湖南专版2018年中考政治第四部分九年级第24课时找准自己的位置复习课时训练12-15
阶段性测试 - 图文10-06
网络推广工作计划03-18
- exercise2
- 铅锌矿详查地质设计 - 图文
- 厨余垃圾、餐厨垃圾堆肥系统设计方案
- 陈明珠开题报告
- 化工原理精选例题
- 政府形象宣传册营销案例
- 小学一至三年级语文阅读专项练习题
- 2014.民诉 期末考试 复习题
- 巅峰智业 - 做好顶层设计对建设城市的重要意义
- (三起)冀教版三年级英语上册Unit4 Lesson24练习题及答案
- 2017年实心轮胎现状及发展趋势分析(目录)
- 基于GIS的农用地定级技术研究定稿
- 2017-2022年中国医疗保健市场调查与市场前景预测报告(目录) - 图文
- 作业
- OFDM技术仿真(MATLAB代码) - 图文
- Android工程师笔试题及答案
- 生命密码联合密码
- 空间地上权若干法律问题探究
- 江苏学业水平测试《机械基础》模拟试题
- 选课走班实施方案
- cissp
- test
- 10
- 门道2
- 2017-2022年中国LED和太阳能光伏行业分析报告(目录)
- 2019届高考英语二轮复习语法专题 冠词考点学案(9页,word版)
- 急性肠胃炎观察与治疗体会论文
- 明清商品经济的发展与儒商伦理的形成
- 2014电大(本科)《西方经济学》必过--机考试题库
- 放飞梦想主题班会赛课教案
- 地球化学试卷A
- 新目标人教版英语九年级《Unit 11 Sad movies make me cry》Section A (1a-1c)说课稿
- 新人教版小学数学五年级上册第五单元《简易方程》教材分析及归纳总结
- 名师推荐-最新牛津译林版2018-2019学年八年级英语上学期第四次阶段性检测题及答案
- 揭秘景德镇高仿瓷器:梅瓶造假成疯潮
- 2016-2020年中国矿山机械行业投资分析及前景预测报告
- 灭火和消防应急疏散预案文件
- 油藏工程设计讲稿
- 电子线路(非线性部分)习题完全答案(谢嘉奎第四版)
- 2015-2020年中国温差能市场研究与投资战略咨询报告
- 新目标九年级Unit 8 reading
- 什么是政府经济?如何理解市场经济条件下政府的经济行为?
- 学校每日防火巡查记录表