【计算机类职业资格】CISSP认证考试(安全体系结构和设计)-试卷1及答案解析.doc
《【计算机类职业资格】CISSP认证考试(安全体系结构和设计)-试卷1及答案解析.doc》由会员分享,可在线阅读,更多相关《【计算机类职业资格】CISSP认证考试(安全体系结构和设计)-试卷1及答案解析.doc(22页珍藏版)》请在麦多课文档分享上搜索。
1、CISSP 认证考试(安全体系结构和设计)-试卷 1 及答案解析(总分:64.00,做题时间:90 分钟)1.Lacys manager has tasked her with researching an intrusion detection system for a new dispatching center. Lacy identifies the top five products and compares their ratings. Which of the following are the evaluation criteria most in use today for
2、these types of purposes?(分数:2.00)A.ITSECB.Common CriteriaC.Red BookD.Orange Book2.Certain types of attacks have been made more potent by which of the following advances to microprocessor technology?(分数:2.00)A.Increased circuits, cache memory, and multiprogrammingB.Dual mode computationC.Direct memor
3、y access I/OD.Increases in processing power3.CPUs and operating systems can work in two main types of multitasking modes. What controls access and the use of system resources in preemptive multitasking mode?(分数:2.00)A.The user and applicationB.The program that is loaded into memoryC.The operating sy
4、stemD.The CPU and user4.Virtual storage combines RAM and secondary storage for system memory. Which of the following is a security concern pertaining to virtual storage?(分数:2.00)A.More than one process uses the same resource.B.It allows cookies to remain persistent in memory.C.It allows for side-cha
5、nnel attacks to take place.D.Two processes can carry out a denial-of-service.5.Which of the following is a common association of the Clark-Wilson access model?(分数:2.00)A.Chinese WallB.Access tupleC.Read up and write down ruleD.Subject and application binding6.Which of the following correctly describ
6、es the relationship between the reference monitor and the security kernel?(分数:2.00)A.The security kernel implements and enforces the reference monitor.B.The reference monitor is the core of the trusted computing base, which is made up of the security kernel.C.The reference monitor implements and enf
7、orces the security kernel.D.The security kernel, aka abstract machine, implements the reference monitor concept.7.The trusted computing base (TCB) ensures security within a system when a process in one domain must access another domain in order to retrieve sensitive information. What function does t
8、he TCB initiate to ensure that this is done in a secure manner?(分数:2.00)A.I/O operational executionB.Process deactivationC.Execution domain switchingD.Virtual memory to real memory mapping8.The Zachman Architecture Framework is often used to set up an enterprise security architecture. Which of the f
9、ollowing does not correctly describe the Zachman Framework?(分数:2.00)A.A two-dimensional model that uses communication interrogatives intersecting with different levelsB.A security-oriented model that gives instructions in a modular fashionC.Used to build a robust enterprise architecture versus a tec
10、hnical security architectureD.Uses six perspectives to describe a holistic information infrastructure9.John has been told to report to the board of directors with a vendor-neutral enterprise architecture framework that will help the company reduce fragmentation that results from the misalignment of
11、IT and business processes. Which of the following frameworks should he suggest?(分数:2.00)A.DoDAFB.CMMIC.ISO/IEC 42010D.TOGAF10.Protection profiles used in the Common Criteria evaluation process contain five elements. Which of the following establishes the type and intensity of the evaluation?(分数:2.00
12、)A.Descriptive elementsB.Evaluation assurance requirementsC.Evaluation assurance levelD.Security target11.Which of the following best defines a virtual machine?(分数:2.00)A.A virtual instance of an operating systemB.A piece of hardware that runs multiple operating system environments simultaneouslyC.A
13、 physical environment for multiple guestsD.An environment that can be fully utilized while running legacy applications12.Bethany is working on a mandatory access control (MAC) system. She has been working on a file that was classified as Secret. She can no longer access this file because it has been
14、 reclassified as Top Secret. She deduces that the project she was working on has just increased in confidentiality and she now knows more about this project than her clearance and need-to-know allows. Which of the following refers to a concept that attempts to prevent this type of scenario from occu
15、rring?(分数:2.00)A.Covert storage channelB.Inference attackC.NoninterferenceD.Aggregation13.Virtualization offers many benefits. Which of the following incorrectly describes virtualization?(分数:2.00)A.Virtualization simplifies operating system patching.B.Virtualization can be used to build a secure com
16、puting platform.C.Virtualization can provide fault and error containment.D.Virtual machines offer powerful debugging capabilities.14.Which security architecture model defines how to securely develop access rights between subjects and objects?(分数:2.00)A.Brewer-NashB.Clark-WilsonC.Graham-DenningD.Bell
17、-LaPadula15.Operating systems can be programmed to carry out different methods for process isolation. Which of the following refers to a method in which an interface defines how communication can take place between two processes and no process can interact with the others internal programming code?(
18、分数:2.00)A.Virtual mappingB.Encapsulation of objectsC.Time multiplexingD.Naming distinctions16.Which of the following is not a responsibility of the memory manager?(分数:2.00)A.Use complex controls to ensure integrity and confidentiality when processes need tp use the same shared memory segments.B.Limi
19、t processes to interact only with the memory segments assigned to them.C.Swap contents from RAM to the hard drive as needed.D.Run an algorithm to identify unused committed memory and inform the operating system that the memory is available.17.Several types of read-only memory devices can be modified
20、 after they are manufactured. Which of the following statements correctly describes the differences between two types of ROM?(分数:2.00)A.PROM can only be programmed once, while EEPROM can be programmed multiple times.B.A UV light is used to erase data on EEPROM, while onboard programming circuitry an
21、d signals erase data on EPROM.C.The process used to delete data on PROM erases one byte at a time, while to erase data on an EPROM chip, you must remove it from the hardware.D.The voltage used to write bits into the memory cells of EPROM burns out the fuses that connect individual memory cells, whil
22、e UV light is used to write to the memory cells of PROM.18.There are different ways that operating systems can carry out software I/O procedures. Which of the following is used when the CPU sends data to an I/O device and then works on another processs request until the I/O device is ready for more
23、data?(分数:2.00)A.I/O using DMAB.Interrupt-driven I/OC.Programmable I/OD.Premapped I/O19.The Information Technology Infrastructure Library(ITIL) consists of five sets of instructional books. Which of the following is considered the core set and focuses on the overall planning of the intended IT servic
24、es?(分数:2.00)A.Service OperationB.Service DesignC.Service TransitionD.Service Strategy20.Widgets Inc.s software development processes are documented and the organization is capable of producing its own standard of software processes. Which of the following Capability Maturity Model Integration levels
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 计算机 职业资格 CISSP 认证 考试 安全 体系结构 设计 试卷 答案 解析 DOC
