【计算机类职业资格】CISSP认证考试(访问控制)-试卷1及答案解析.doc
《【计算机类职业资格】CISSP认证考试(访问控制)-试卷1及答案解析.doc》由会员分享,可在线阅读,更多相关《【计算机类职业资格】CISSP认证考试(访问控制)-试卷1及答案解析.doc(20页珍藏版)》请在麦多课文档分享上搜索。
1、CISSP 认证考试(访问控制)-试卷 1 及答案解析(总分:60.00,做题时间:90 分钟)1.Which of the following does not correctly describe a directory service?(分数:2.00)A.It manages objects within a directory by using namespaces.B.It enforces security policy by carrying out access control and identity management functions.C.It assigns na
2、mespaces to each object in databases that are based on the X.509 standard and are accessed by LDAP.D.It allows an administrator to configure and manage how identification takes place within the network.2.Hannah has been assigned the task of installing Web access management(WAM) software. What is the
3、 best description for what WAM is commonly used for?(分数:2.00)A.Control external entities requesting access through X.500 databasesB.Control external entities requesting access to internal objectsC.Control internal entities requesting access through X.500 databasesD.Control internal entities requesti
4、ng access to external objects3.There are several types of password management approaches used by identity management systems. Which of the following reduces help-desk call volume, but is also criticized for the ease with which a hacker could gain access to multiple resources if a password is comprom
5、ised?(分数:2.00)A.Management password resetB.Self-service password resetC.Password synchronizationD.Assisted password reset4.A number of attacks can be performed against smart cards. Side-channel is a class of attacks that doesnt try to compromise a flaw or weakness. Which of the following is not a si
6、de-channel attack?(分数:2.00)A.Differential power analysisB.Microprobing analysisC.Timing analysisD.Electromagnetic analysis5.Which of the following does not describe privacy-aware role-based access control?(分数:2.00)A.It is an example of a discretionary access control model.B.Detailed access controls
7、indicate the type of data that users can access based on the datas level of privacy sensitivity.C.It is an extension of role-based access control.D.It should be used to integrate privacy policies and access control policies.6.What was the direct predecessor to Standard Generalized Markup Language(SG
8、ML)?(分数:2.00)A.Hypertext Markup Language (HTML)B.Extensible Markup Language (XML)C.LaTeXD.Generalized Markup Language (GML)7.Brian has been asked to work on the virtual directory of his companys new identity management system. Which of the following best describes a virtual directory?(分数:2.00)A.Meta
9、-directoryB.User attribute information stored in an HR databaseC.Virtual container for data from multiple sourcesD.A service that allows an administrator to configure and manage how identification takes place8.Emily is listening to network traffic and capturing passwords as they are sent to the auth
10、entication server. She plans to use the passwords as part of a future attack. What type of attack is this?(分数:2.00)A.Brute-force attackB.Dictionary attackC.Social engineering attackD.Replay attack9.Which of the following correctly describes a federated identity and its role within identity managemen
11、t processes?(分数:2.00)A.A nonportable identity that can be used across business boundariesB.A portable identity that can be used across business boundariesC.An identity that can be used within intranet virtual directories and identity storesD.An identity specified by domain names that can be used acr
12、oss business boundaries10.Phishing and pharming are similar. Which of the following correctly describes the difference between phishing and pharming?(分数:2.00)A.Personal information is collected from victims through legitimate-looking Web sites in phishing attacks, while personal information is colle
13、cted from victims via e-mail in pharming attacks.B.Phishing attacks point e-mail recipients to a form where victims input personal information, while pharming attacks use pop-up forms at legitimate Web sites to collect personal information from victims.C.Victims are pointed to a fake Web site with a
14、 domain name that looks similar to a legitimate sites in a phishing attack, while victims are directed to a fake Web site as a result of a legitimate domain name being incorrectly translated by the DNS serverD.Phishing is a technical attack, while pharming is a type of social engineering.11.Security
15、 countermeasures should be transparent to users and attackers. Which of the following does not describe transparency?(分数:2.00)A.User activities are monitored and tracked without negatively affecting system performance.B.User activities are monitored and tracked without the user knowing about the mec
16、hanism that is carrying this out.C.Users are allowed access in a manner that does not negatively affect business processes.D.Unauthorized access attempts are denied and logged without the intruder knowing about the mechanism that is carrying this out.12.What markup language allows for the sharing of
17、 application security policies to ensure that all applications are following the same security rules?(分数:2.00)A.XMLB.SPMLC.XACMLD.GML13.The importance of protecting audit logs generated by computers and network devices is highlighted by the fact that it is required by many of todays regulations. Whi
18、ch of the following does not explain why audit logs should be protected?(分数:2.00)A.If not properly protected, these logs may not be admissible during a prosecution.B.Audit logs contain sensitive data and should only be accessible to a certain subset of people.C.Intruders may attempt to scrub the log
19、s to hide their activities.D.The format of the logs should be unknown and unavailable to the intruder.14.Harrison is evaluating access control products for his company. Which of the following is not a factor he needs to consider when choosing the products?(分数:2.00)A.Classification level of dataB.Lev
20、el of training that employees have receivedC.Logical access controls provided by productsD.Legal and regulation issues15.There are several types of intrusion detection systems (IDSs). What type of IDS builds a profile of an environments normal activities and assigns an anomaly score to packets based
21、 on the profile?(分数:2.00)A.State-basedB.Statistical anomaly-basedC.Misuse detection systemD.Protocol signature-based16.A rule-based IDS takes a different approach than a signature-based or anomalybased system. Which of the following is characteristic of a rule-based IDS?(分数:2.00)A.Uses IF/THEN progr
22、amming within expert systemsB.Identifies protocols used outside of their common boundsC.Compares patterns to several activities at onceD.Can detect new attacks17.Sam plans to establish mobile phone service using the personal information he has stolen from his former boss. What type of identity theft
23、 is this?(分数:2.00)A.PhishingB.True nameC.PharmingD.Account takeover18.Of the following, what is the primary item that a capability listing is based upon?(分数:2.00)A.A subjectB.An objectC.A productD.An application19.Alex works for a chemical distributor that assigns employees tasks that separate their
24、 duties and routinely rotates job assignments. Which of the following best describes the differences between these countermeasures?(分数:2.00)A.They are the same thing with different titles.B.They are administrative controls that enforce access control and protect the companys resources.C.Separation o
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 计算机 职业资格 CISSP 认证 考试 访问 控制 试卷 答案 解析 DOC
