【计算机类职业资格】计算机CISSP认证-2及答案解析.doc
《【计算机类职业资格】计算机CISSP认证-2及答案解析.doc》由会员分享,可在线阅读,更多相关《【计算机类职业资格】计算机CISSP认证-2及答案解析.doc(30页珍藏版)》请在麦多课文档分享上搜索。
1、计算机 CISSP 认证-2 及答案解析(总分:100.00,做题时间:90 分钟)1.What type of markup language allows company interfaces to pass service requests and the receiving company provision access to these services?(分数:2.50)A.XMLB.SPMLC.SGMLD.HTML2.There are several different types of centralized access control protocols. Which
2、of the following is illustrated in the graphic that follows? (分数:2.50)A.DiameterB.WatchdogC.RADIUSD.TACACS+3.An access control matrix is used in many operating systems and applications to control access between subjects and objects. What is the column in this type of matrix referred to as? Access Co
3、ntrol Matrix(分数:2.50)A.Capability tableB.Constrained interfaceC.Role-based valueD.ACL4.What technology within identity management is illustrated in the graphic that follows? (分数:2.50)A.User provisioningB.Federated identityC.DirectoriesD.Web access management5.There are several different types of sin
4、gle sign-on protocols and technologies in use today. What type of technology is illustrated in the graphic that follows? (分数:2.50)A.KerberosB.Discretionary access controlC.SESAMED.Mandatory access control6.There are different ways that specific technologies can create one-time passwords for authenti
5、cation purposes. What type of technology is illustrated in the graphic that follows? (分数:2.50)A.Counter synchronous tokenB.Asynchronous tokenC.Mandatory tokenD.Synchronous token7.Sally is carrying out a software analysis on her company“s proprietary application. She has found out that it is possible
6、 for an attacker to force an authorization step to take place before the authentication step is completed successfully. What type of issue would allow for this type of compromise to take place?(分数:2.50)A.BackdoorB.Maintenance hookC.Race conditionD.Data validation error8.Which of the following best d
7、escribes how SAML, SOAP, and HTTP commonly work together in an environment that provides Web services?(分数:2.50)A.Security attributes are put into SAML format. Web service request and authentication data are encrypted in a SOAP message. Message is transmitted in an HTTP connection.B.Security attribut
8、es are put into SAML format. Web service request and authentication data are encapsulated in a SOAP message. Message is transmitted in an HTTP connection over TLS.C.Authentication data are put into SAML format. Web service request and authentication data are encapsulated in a SOAP message. Message i
9、s transmitted in an HTTP connection.D.Authentication data are put into SAML format. HTTP request and authentication data are encapsulated in a SOAP message. Message is transmitted in an HTTP connection.9.Tom works at a large retail company that recently deployed radio-frequency identification (RFID)
10、 to better manage its inventory processes. Employees use scanners to gather product-related information instead of manually looking up product data. Tom has found out that malicious customers have carried out attacks on the RFID technology to reduce the amount they pay on store items. Which of the f
11、ollowing is the most likely reason for the existence of this type of vulnerability?(分数:2.50)A.The company“s security team does not understand how to secure this type of technology.B.The cost of integrating security within RFID is cost prohibitive.C.The technology has low processing capabilities and
12、encryption is very processor-intensive.D.RFID is a new and emerging technology, and the industry does not currently have ways to secure it.10.Tanya is the security administrator for a large distributed retail company. The company“s network has many different network devices and software appliances t
13、hat generate logs and audit data. Tanya and her staff have become overwhelmed with trying to review all of the log files when attempting to identify if anything suspicious is taking place within the network. Which of the following is the best solution for this company to implement?(分数:2.50)A.Securit
14、y information and event managementB.Event correlation toolsC.Intrusion detection systemsD.Security event correlation management tools11.Sarah and her security team have carried out many vulnerability tests over the years to locate the weaknesses and vulnerabilities within the systems on the network.
15、 The CISO has asked her to oversee the development of a threat model for the network. Which of the following best describes what this model is and what it would be used for?(分数:2.50)A.A threat model can help to assess the probability, the potential harm, and the priority of attacks, and thus help to
16、 minimize or eradicate the threats.B.A threat model combines the output of the various vulnerability tests and the penetration tests carried out to understand the security posture of the network as a whole.C.A threat model is a risk-based model that is used to calculate the probabilities of the vari
17、ous risks identified during the vulnerability tests.D.A threat model is used in software development practices to uncover programming errors.12.Lacy“s manager has tasked her with researching an intrusion detection system for a new dispatching center. Lacy identifies the top five products and compare
18、s their ratings. Which of the following are the evaluation criteria most in use today for these types of purposes?(分数:2.50)A.ITSECB.Common CriteriaC.Red BookD.Orange Book13.Certain types of attacks have been made more potent by which of the following advances to microprocessor technology?(分数:2.50)A.
19、Increased circuits, cache memory, and multiprogrammingB.Dual mode computationC.Direct memory access I/OD.Increases in processing power14.CPUs and operating systems can work in two main types of multitasking modes. What controls access and the use of system resources in preemptive multitasking mode?(
20、分数:2.50)A.The user and applicationB.The program that is loaded into memoryC.The operating systemD.The CPU and user15.Virtual storage combines RAM and secondary storage for system memory. Which of the following is a security concern pertaining to virtual storage?(分数:2.50)A.More than one process uses
21、the same resource.B.It allows cookies to remain persistent in memory.C.It allows for side-channel attacks to take place.D.Two processes can carry out a denial-of-service.16.Which of the following is a common association of the Clark-Wilson access model?(分数:2.50)A.Chinese WallB.Access tupleC.Read up
22、and write down ruleD.Subject and application binding17.Which of the following correctly describes the relationship between the reference monitor and the security kernel?(分数:2.50)A.The security kernel implements and enforces the reference monitor.B.The reference monitor is the core of the trusted com
23、puting base, which is made up of the security kernel.C.The reference monitor implements and enforces the security kernel.D.The security kernel, aka abstract machine, implements the reference monitor concept.18.The trusted computing base (TCB) ensures security within a system when a process in one do
24、main must access another domain in order to retrieve sensitive information. What function does the TCB initiate to ensure that this is done in a secure manner?(分数:2.50)A.I/O operational executionB.Process deactivationC.Execution domain switchingD.Virtual memory to real memory mapping19.The Zachman A
25、rchitecture Framework is often used to set up an enterprise security architecture. Which of the following does not correctly describe the Zachman Framework?(分数:2.50)A.A two-dimensional model that uses communication interrogatives intersecting with different levelsB.A security-oriented model that giv
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 计算机 职业资格 CISSP 认证 答案 解析 DOC
