【计算机类职业资格】CISSP认证考试(法律、法规、调查与合规)-试卷1及答案解析.doc
《【计算机类职业资格】CISSP认证考试(法律、法规、调查与合规)-试卷1及答案解析.doc》由会员分享,可在线阅读,更多相关《【计算机类职业资格】CISSP认证考试(法律、法规、调查与合规)-试卷1及答案解析.doc(19页珍藏版)》请在麦多课文档分享上搜索。
1、CISSP 认证考试(法律、法规、调查与合规)-试卷 1 及答案解析(总分:62.00,做题时间:90 分钟)1.Cyberlaw categorizes computer-related crime into three categories. Which of the following is an example of a crime in which the use of a computer would be categorized as incidental?(分数:2.00)A.Carrying out a buffer overflow to take control of a
2、 systemB.The electronic distribution of child pornographyC.Attacking financial systems to steal fundsD.Capturing passwords as they are sent to the authentication server2.Which organization has been developed to deal with economic, social, and governance issues, and with how sensitive data is transpo
3、rted over borders?(分数:2.00)A.European UnionB.Council of EuropeC.Safe HarborD.Organisation for Economic Co-operation and Development3.Different countries have different legal systems. Which of the following correctly describes customary law?(分数:2.00)A.Not many countries work under this law purely; mo
4、st instead use a mixed system where this law, which deals mainly with personal conduct and patterns of behavior, is an integrated component.B.It covers all aspects of human life, but is commonly divided into responsibilities and obligations to others, and religious duties.C.It is a rule-based law fo
5、cused on codified law.D.Based on previous interpretations of laws, this system reflects the communitys morals and expectations.4.Widgets Inc. wishes to protect its logo from unauthorized use. Which of the following will protect the logo and ensure that others cannot copy and use it?(分数:2.00)A.Patent
6、B.CopyrightC.TrademarkD.Trade secret law5.There are four categories of software licensing. Which of the following refers to software sold at a reduced cost?(分数:2.00)A.SharewareB.Academic softwareC.FreewareD.Commercial software6.There are different types of approaches to regulations. Which of the fol
7、lowing is an example of self-regulation?(分数:2.00)A.The Health Insurance Portability and Accountability ActB.The Sarbanes-Oxley ActC.The Computer Fraud and Abuse ActD.PCI Data Security Standard7.Which of the following means that a company did all it could have reasonably done to prevent a security br
8、each?(分数:2.00)A.Downstream liabilityB.ResponsibilityC.Due diligenceD.Due care8.There are three different types of incident response teams. Which of the following correctly describes a virtual team?(分数:2.00)A.It consists of experts who have other duties within the organization.B.It can be cost prohib
9、itive to smaller organizations.C.It is a hybrid model.D.Core members are permanently assigned to the team.9.A suspected crime has been reported within your organization. Which of the following steps should the incident response team take first?(分数:2.00)A.Establish a procedure for responding to the i
10、ncident.B.Call in forensics experts.C.Determine that a crime has been committed.D.Notify senior management.10.During an incident response, what stage involves mitigating the damage caused by an incident?(分数:2.00)A.InvestigationB.ContainmentC.TriageD.Analysis11.Which of the following is a correct sta
11、tement regarding computer forensics?(分数:2.00)A.It is the study of computer technology.B.It is a set of hardware-specific processes that must be followed in order for evidence to be admissible in a court of law.C.It encompasses network and code analysis, and may be referred to as electronic data disc
12、overy.D.Computer forensics responsibilities should be assigned to a network administrator before an incident occurs.12.Which of the following dictates that all evidence be labeled with information indicating who secured and validated it?(分数:2.00)A.Chain of custodyB.Due careC.InvestigationD.Motive, O
13、pportunity, and Means13.There are several categories of evidence. How is a witnesss oral testimony categorized?(分数:2.00)A.Best evidenceB.Secondary evidenceC.Circumstantial evidenceD.Conclusive evidence14.For evidence to be legally admissible, it must be authentic, complete, sufficient, and reliable.
14、 Which characteristic refers to the evidence having a reasonable and sensible relationship to the findings?(分数:2.00)A.CompleteB.ReliableC.AuthenticD.Sufficient15.Which of the following best describes exigent circumstances?(分数:2.00)A.The methods used to capture a suspects actions are neither legal no
15、r ethical.B.Enticement is used to capture a suspects actions.C.Hacking does not actually hurt anyone.D.The seizure of evidence by law enforcement because there is concern that a suspect will attempt to destroy it.16.What role does the Internet Architecture Board play regarding technology and ethics?
16、(分数:2.00)A.It creates criminal sentencing guidelines.B.It issues ethics-related statements concerning the use of the Internet.C.It edits Request for Comments.D.It maintains ten commandments for ethical behavior.17.Which of the following statements is not true of dumpster diving?(分数:2.00)A.It is lega
17、l.B.It is unethical.C.It is illegal.D.It is a nontechnical attack.18.Which of the following is a legal form of eavesdropping when performed with prior consent or a warrant?(分数:2.00)A.Denial of ServiceB.Dumpster divingC.WiretappingD.Data diddling19.What type of common law deals with violations commit
18、ted by individuals against government laws, which are created to protect the public?(分数:2.00)A.Criminal lawB.Civil lawC.Tort lawD.Regulatory law20.During what stage of incident response is it determined if the source of the incident was internal or external, and how the offender penetrated and gaine
19、d access to the asset?(分数:2.00)A.AnalysisB.ContainmentC.TrackingD.Follow-up21.Which of the following is not true of a forensics investigation?(分数:2.00)A.The crime scene should be modified as necessary.B.A file copy tool may not recover all data areas of the device that are necessary for investigatio
20、n.C.Contamination of the crime scene may not negate derived evidence, but it should still be documented.D.Only individuals with knowledge of basic crime scene analysis should have access to the crime scene.22.Great care must be taken to capture clues from a computer or device during a forensics exer
21、cise. Which of the following does not correctly describe the efforts that should be taken to protect an image?(分数:2.00)A.The original image should be hashed with MD5 and/or SHA-256.B.Two time-stamped images should be created.C.New media should be properly purged before images are created on them.D.S
22、ome systems must be imaged while they are running.23.Which of the following attacks can be best prevented by limiting the amount of electrical signals emitted from a computer system?(分数:2.00)A.Salami attackB.Emanations capturingC.Password sniffingD.IP spoofing24.As a CISSP candidate, you must sign a
23、 Code of Ethics. Which of the following is from the (ISC) 2 Code of Ethics for the CISSP?(分数:2.00)A.Information should be shared freely and openly; thus, sharing confidential information should be ethical.B.Think about the social consequences of the program you are writing or the system you are desi
24、gning.C.Discourage unnecessary fear or doubt.D.Do not participate in Internet-wide experiments in a negligent manner.25.What concept states that a criminal leaves something behind and takes something with them?(分数:2.00)A.Modus OperandiB.ProfilingC.Locards Principle of ExchangeD.Motive, Opportunity,
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 计算机 职业资格 CISSP 认证 考试 法律 法规 调查 合规 试卷 答案 解析 DOC
