[计算机类试卷]CISSP认证考试(安全体系结构和设计)模拟试卷1及答案与解析.doc
《[计算机类试卷]CISSP认证考试(安全体系结构和设计)模拟试卷1及答案与解析.doc》由会员分享,可在线阅读,更多相关《[计算机类试卷]CISSP认证考试(安全体系结构和设计)模拟试卷1及答案与解析.doc(38页珍藏版)》请在麦多课文档分享上搜索。
1、CISSP认证考试(安全体系结构和设计)模拟试卷 1及答案与解析 1 Lacys manager has tasked her with researching an intrusion detection system for a new dispatching center. Lacy identifies the top five products and compares their ratings. Which of the following are the evaluation criteria most in use today for these types of purpo
2、ses? ( A) ITSEC ( B) Common Criteria ( C) Red Book ( D) Orange Book 2 Certain types of attacks have been made more potent by which of the following advances to microprocessor technology? ( A) Increased circuits, cache memory, and multiprogramming ( B) Dual mode computation ( C) Direct memory access
3、I/O ( D) Increases in processing power 3 CPUs and operating systems can work in two main types of multitasking modes. What controls access and the use of system resources in preemptive multitasking mode? ( A) The user and application ( B) The program that is loaded into memory ( C) The operating sys
4、tem ( D) The CPU and user 4 Virtual storage combines RAM and secondary storage for system memory. Which of the following is a security concern pertaining to virtual storage? ( A) More than one process uses the same resource. ( B) It allows cookies to remain persistent in memory. ( C) It allows for s
5、ide-channel attacks to take place. ( D) Two processes can carry out a denial-of-service. 5 Which of the following is a common association of the Clark-Wilson access model? ( A) Chinese Wall ( B) Access tuple ( C) Read up and write down rule ( D) Subject and application binding 6 Which of the followi
6、ng correctly describes the relationship between the reference monitor and the security kernel? ( A) The security kernel implements and enforces the reference monitor. ( B) The reference monitor is the core of the trusted computing base, which is made up of the security kernel. ( C) The reference mon
7、itor implements and enforces the security kernel. ( D) The security kernel, aka abstract machine, implements the reference monitor concept. 7 The trusted computing base (TCB) ensures security within a system when a process in one domain must access another domain in order to retrieve sensitive infor
8、mation. What function does the TCB initiate to ensure that this is done in a secure manner? ( A) I/O operational execution ( B) Process deactivation ( C) Execution domain switching ( D) Virtual memory to real memory mapping 8 The Zachman Architecture Framework is often used to set up an enterprise s
9、ecurity architecture. Which of the following does not correctly describe the Zachman Framework? ( A) A two-dimensional model that uses communication interrogatives intersecting with different levels ( B) A security-oriented model that gives instructions in a modular fashion ( C) Used to build a robu
10、st enterprise architecture versus a technical security architecture ( D) Uses six perspectives to describe a holistic information infrastructure 9 John has been told to report to the board of directors with a vendor-neutral enterprise architecture framework that will help the company reduce fragment
11、ation that results from the misalignment of IT and business processes. Which of the following frameworks should he suggest? ( A) DoDAF ( B) CMMI ( C) ISO/IEC 42010 ( D) TOGAF 10 Protection profiles used in the Common Criteria evaluation process contain five elements. Which of the following establish
12、es the type and intensity of the evaluation? ( A) Descriptive elements ( B) Evaluation assurance requirements ( C) Evaluation assurance level ( D) Security target 11 Which of the following best defines a virtual machine? ( A) A virtual instance of an operating system ( B) A piece of hardware that ru
13、ns multiple operating system environments simultaneously ( C) A physical environment for multiple guests ( D) An environment that can be fully utilized while running legacy applications 12 Bethany is working on a mandatory access control (MAC) system. She has been working on a file that was classifi
14、ed as Secret. She can no longer access this file because it has been reclassified as Top Secret. She deduces that the project she was working on has just increased in confidentiality and she now knows more about this project than her clearance and need-to-know allows. Which of the following refers t
15、o a concept that attempts to prevent this type of scenario from occurring? ( A) Covert storage channel ( B) Inference attack ( C) Noninterference ( D) Aggregation 13 Virtualization offers many benefits. Which of the following incorrectly describes virtualization? ( A) Virtualization simplifies opera
16、ting system patching. ( B) Virtualization can be used to build a secure computing platform. ( C) Virtualization can provide fault and error containment. ( D) Virtual machines offer powerful debugging capabilities. 14 Which security architecture model defines how to securely develop access rights bet
17、ween subjects and objects? ( A) Brewer-Nash ( B) Clark-Wilson ( C) Graham-Denning ( D) Bell-LaPadula 15 Operating systems can be programmed to carry out different methods for process isolation. Which of the following refers to a method in which an interface defines how communication can take place b
18、etween two processes and no process can interact with the others internal programming code? ( A) Virtual mapping ( B) Encapsulation of objects ( C) Time multiplexing ( D) Naming distinctions 16 Which of the following is not a responsibility of the memory manager? ( A) Use complex controls to ensure
19、integrity and confidentiality when processes need tp use the same shared memory segments. ( B) Limit processes to interact only with the memory segments assigned to them. ( C) Swap contents from RAM to the hard drive as needed. ( D) Run an algorithm to identify unused committed memory and inform the
20、 operating system that the memory is available. 17 Several types of read-only memory devices can be modified after they are manufactured. Which of the following statements correctly describes the differences between two types of ROM? ( A) PROM can only be programmed once, while EEPROM can be program
21、med multiple times. ( B) A UV light is used to erase data on EEPROM, while onboard programming circuitry and signals erase data on EPROM. ( C) The process used to delete data on PROM erases one byte at a time, while to erase data on an EPROM chip, you must remove it from the hardware. ( D) The volta
22、ge used to write bits into the memory cells of EPROM burns out the fuses that connect individual memory cells, while UV light is used to write to the memory cells of PROM. 18 There are different ways that operating systems can carry out software I/O procedures. Which of the following is used when th
23、e CPU sends data to an I/O device and then works on another processs request until the I/O device is ready for more data? ( A) I/O using DMA ( B) Interrupt-driven I/O ( C) Programmable I/O ( D) Premapped I/O 19 The Information Technology Infrastructure Library(ITIL) consists of five sets of instruct
24、ional books. Which of the following is considered the core set and focuses on the overall planning of the intended IT services? ( A) Service Operation ( B) Service Design ( C) Service Transition ( D) Service Strategy 20 Widgets Inc.s software development processes are documented and the organization
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 计算机 试卷 CISSP 认证 考试 安全 体系结构 设计 模拟 答案 解析 DOC
