【计算机类职业资格】CISSP认证考试(安全运营)-试卷1及答案解析.doc
《【计算机类职业资格】CISSP认证考试(安全运营)-试卷1及答案解析.doc》由会员分享,可在线阅读,更多相关《【计算机类职业资格】CISSP认证考试(安全运营)-试卷1及答案解析.doc(17页珍藏版)》请在麦多课文档分享上搜索。
1、CISSP 认证考试(安全运营)-试卷 1 及答案解析(总分:60.00,做题时间:90 分钟)1.Which of the following is not a common component of configuration management change control steps?(分数:2.00)A.Tested and presentedB.Service-level agreement approvalC.Report change to managementD.Approval of the change2.A change management process shou
2、ld include a number of procedures. Which of the following incorrectly describes a characteristic or component of a change control policy?(分数:2.00)A.Changes that are unanimously approved by the change control committee must be tested to uncover any unforeseen results.B.Changes approved by the change
3、control committee should be entered into a change log.C.A schedule that outlines the projected phases of the change should be developed.D.An individual or group should be responsible for approving proposed changes.3.The requirement of erasure is the end of the media life cycle if it contains sensiti
4、ve information. Which of the following best describes purging?(分数:2.00)A.Changing the polarization of the atoms on the media.B.It is unacceptable when media are to be reused in the same physical environment for the same purposes.C.Data formerly on the media is made unrecoverable by overwriting it wi
5、th a pattern.D.Information is made unrecoverable, even with extraordinary effort.4.Device backup and other availability solutions are chosen to balance the value of having information available against the cost of keeping that information available. Which of the following best describes fault-tolera
6、nt technologies?(分数:2.00)A.They are among the most expensive solutions and are usually only for the most mission-critical information.B.They help service providers identify appropriate availability services for the specific customer.C.They are required to maintain integrity, regardless of the other
7、technologies in place.D.They allow a failed component to be replaced while the system continues to run.5.Which of the following refers to the amount of time it will be expected to take to get a device fixed and back into production?(分数:2.00)A.SLAB.MTTRC.Hot-swapD.MTBF6.Which of the following correct
8、ly describes Direct Access and Sequential Access storage devices?(分数:2.00)A.Any point on a Direct Access Storage Device may be promptly reached, whereas every point in between the current position and the desired position of a Sequential Access Storage Device must be traversed in order to reach the
9、desired position.B.RAIT is an example of a Direct Access Storage Device, while RAID is an example of a Sequential Access Storage Device.C.MAID is a Direct Access Storage Device, while RAID is an example of a Sequential Access Storage Device.D.As an example of Sequential Access Storage, tape drives a
10、re faster than Direct Access Storage Devices.7.There are classifications for operating system failures. Which of the following refers to what takes place when an unexpected kernel or media failure happens and the regular recovery procedure cannot recover the system to a more consistent state, requir
11、ing an administrator to intervene?(分数:2.00)A.Emergency system restartB.Trusted recoveryC.System cold startD.System reboot8.Various levels of RAID dictate the type of activity that will take place within the RAID system. Which level is associated with byte-level parity?(分数:2.00)A.RAID Level 0B.RAID L
12、evel 3C.RAID Level 5D.RAID Level 109.Which of the following incorrectly describes IP spoofing and session hijacking?(分数:2.00)A.Address spoofing helps an attacker to hijack sessions between two users without being noticed.B.IP spoofing makes it harder to track down an attacker.C.Session hijacking can
13、 be prevented with mutual authentication.D.IP spoofing is used to hijack SSL and IPSec secure communications.10.RAID systems use a number of techniques to provide redundancy and performance. Which of the following activities divides and writes data over several drives?(分数:2.00)A.ParityB.MirroringC.S
14、tripingD.Hot-swapping11.What is the difference between hierarchical storage management and storage area network technologies?(分数:2.00)A.HSM uses optical or tape jukeboxes, and SAN is a standard of how to develop and implement this technology.B.HSM and SAN are one and the same. The difference is in t
15、he implementation.C.HSM uses optical or tape jukeboxes, and SAN is a network of connected storage.D.SAN uses optical or tape jukeboxes, and HSM is a network of connected storage systems.12.John and his team are conducting a penetration test of a clients network. The team will conduct its testing arm
16、ed only with knowledge it acquired from the Web. The network staff is aware that the testing will take place, but the penetration testing team will only work with publicly available data and some information from the client. What is the degree of the teams knowledge and what type of test is the team
17、 carrying out?(分数:2.00)A.Full knowledge; blind testB.Partial knowledge; blind testC.Partial knowledge; double-blind testD.Zero knowledge; targeted test13.What type of exploited vulnerability allows more input than the program has allocated space to store it?(分数:2.00)A.Symbolic linksB.File descriptor
18、sC.Kernel flawsD.Buffer overflows14.There are often scenarios where the IT staff must react to emergencies and quickly apply fixes or change configurations. When dealing with such emergencies, which of the following is the best approach to making changes?(分数:2.00)A.Review the changes within 48 hours
19、 of making them.B.Review and document the emergency changes after the incident is over.C.Activity should not take place in this manner.D.Formally submit the change to a change control committee and follow the complete change control process.15.Organizations should keep system documentation on hand t
20、o ensure that the system is properly cared for, that changes are controlled, and that the organization knows whats on the system. What does not need to be in this type of documentation?(分数:2.00)A.FunctionalityB.ChangesC.Volume of transactionsD.Identity of system owner16.Fred is a new security office
21、r who wants to implement a control for detecting and preventing users who attempt to exceed their authority by misusing the access rights that have been assigned to them. Which of the following best fits this need?(分数:2.00)A.Management reviewB.Two-factor identification and authenticationC.Capturing
22、this data in audit logsD.Implementation of a strong security policy17.Which of the following is the best way to reduce brute-force attacks that allow intruders to uncover users passwords?(分数:2.00)A.Increase the clipping level.B.Lock out an account for a certain amount of time after the clipping leve
23、l is reached.C.After a threshold of failed login attempts is met, the administrator must physically lock out the account.D.Choose a weaker algorithm that encrypts the password file.18.Brandy could not figure out how Sam gained unauthorized access to her system, since he has little computer experienc
24、e. Which of the following is most likely the attack Sam used?(分数:2.00)A.Dictionary attackB.Shoulder surfing attackC.Covert channel attackD.Timing attack19.The relay agent on a mail server plays a role in spam prevention. Which of the following incorrectly describes mail relays?(分数:2.00)A.Antispam fe
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 计算机 职业资格 CISSP 认证 考试 安全 运营 试卷 答案 解析 DOC
