[计算机类试卷]CISSP认证考试(安全运营)模拟试卷1及答案与解析.doc
《[计算机类试卷]CISSP认证考试(安全运营)模拟试卷1及答案与解析.doc》由会员分享,可在线阅读,更多相关《[计算机类试卷]CISSP认证考试(安全运营)模拟试卷1及答案与解析.doc(30页珍藏版)》请在麦多课文档分享上搜索。
1、CISSP认证考试(安全运营)模拟试卷 1及答案与解析 1 Which of the following is not a common component of configuration management change control steps? ( A) Tested and presented ( B) Service-level agreement approval ( C) Report change to management ( D) Approval of the change 2 A change management process should include a
2、 number of procedures. Which of the following incorrectly describes a characteristic or component of a change control policy? ( A) Changes that are unanimously approved by the change control committee must be tested to uncover any unforeseen results. ( B) Changes approved by the change control commi
3、ttee should be entered into a change log. ( C) A schedule that outlines the projected phases of the change should be developed. ( D) An individual or group should be responsible for approving proposed changes. 3 The requirement of erasure is the end of the media life cycle if it contains sensitive i
4、nformation. Which of the following best describes purging? ( A) Changing the polarization of the atoms on the media. ( B) It is unacceptable when media are to be reused in the same physical environment for the same purposes. ( C) Data formerly on the media is made unrecoverable by overwriting it wit
5、h a pattern. ( D) Information is made unrecoverable, even with extraordinary effort. 4 Device backup and other availability solutions are chosen to balance the value of having information available against the cost of keeping that information available. Which of the following best describes fault-to
6、lerant technologies? ( A) They are among the most expensive solutions and are usually only for the most mission-critical information. ( B) They help service providers identify appropriate availability services for the specific customer. ( C) They are required to maintain integrity, regardless of the
7、 other technologies in place. ( D) They allow a failed component to be replaced while the system continues to run. 5 Which of the following refers to the amount of time it will be expected to take to get a device fixed and back into production? ( A) SLA ( B) MTTR ( C) Hot-swap ( D) MTBF 6 Which of t
8、he following correctly describes Direct Access and Sequential Access storage devices? ( A) Any point on a Direct Access Storage Device may be promptly reached, whereas every point in between the current position and the desired position of a Sequential Access Storage Device must be traversed in orde
9、r to reach the desired position. ( B) RAIT is an example of a Direct Access Storage Device, while RAID is an example of a Sequential Access Storage Device. ( C) MAID is a Direct Access Storage Device, while RAID is an example of a Sequential Access Storage Device. ( D) As an example of Sequential Ac
10、cess Storage, tape drives are faster than Direct Access Storage Devices. 7 There are classifications for operating system failures. Which of the following refers to what takes place when an unexpected kernel or media failure happens and the regular recovery procedure cannot recover the system to a m
11、ore consistent state, requiring an administrator to intervene? ( A) Emergency system restart ( B) Trusted recovery ( C) System cold start ( D) System reboot 8 Various levels of RAID dictate the type of activity that will take place within the RAID system. Which level is associated with byte-level pa
12、rity? ( A) RAID Level 0 ( B) RAID Level 3 ( C) RAID Level 5 ( D) RAID Level 10 9 Which of the following incorrectly describes IP spoofing and session hijacking? ( A) Address spoofing helps an attacker to hijack sessions between two users without being noticed. ( B) IP spoofing makes it harder to tra
13、ck down an attacker. ( C) Session hijacking can be prevented with mutual authentication. ( D) IP spoofing is used to hijack SSL and IPSec secure communications. 10 RAID systems use a number of techniques to provide redundancy and performance. Which of the following activities divides and writes data
14、 over several drives? ( A) Parity ( B) Mirroring ( C) Striping ( D) Hot-swapping 11 What is the difference between hierarchical storage management and storage area network technologies? ( A) HSM uses optical or tape jukeboxes, and SAN is a standard of how to develop and implement this technology. (
15、B) HSM and SAN are one and the same. The difference is in the implementation. ( C) HSM uses optical or tape jukeboxes, and SAN is a network of connected storage. ( D) SAN uses optical or tape jukeboxes, and HSM is a network of connected storage systems. 12 John and his team are conducting a penetrat
16、ion test of a clients network. The team will conduct its testing armed only with knowledge it acquired from the Web. The network staff is aware that the testing will take place, but the penetration testing team will only work with publicly available data and some information from the client. What is
17、 the degree of the teams knowledge and what type of test is the team carrying out? ( A) Full knowledge; blind test ( B) Partial knowledge; blind test ( C) Partial knowledge; double-blind test ( D) Zero knowledge; targeted test 13 What type of exploited vulnerability allows more input than the progra
18、m has allocated space to store it? ( A) Symbolic links ( B) File descriptors ( C) Kernel flaws ( D) Buffer overflows 14 There are often scenarios where the IT staff must react to emergencies and quickly apply fixes or change configurations. When dealing with such emergencies, which of the following
19、is the best approach to making changes? ( A) Review the changes within 48 hours of making them. ( B) Review and document the emergency changes after the incident is over. ( C) Activity should not take place in this manner. ( D) Formally submit the change to a change control committee and follow the
20、complete change control process. 15 Organizations should keep system documentation on hand to ensure that the system is properly cared for, that changes are controlled, and that the organization knows whats on the system. What does not need to be in this type of documentation? ( A) Functionality ( B
21、) Changes ( C) Volume of transactions ( D) Identity of system owner 16 Fred is a new security officer who wants to implement a control for detecting and preventing users who attempt to exceed their authority by misusing the access rights that have been assigned to them. Which of the following best f
22、its this need? ( A) Management review ( B) Two-factor identification and authentication ( C) Capturing this data in audit logs ( D) Implementation of a strong security policy 17 Which of the following is the best way to reduce brute-force attacks that allow intruders to uncover users passwords? ( A)
23、 Increase the clipping level. ( B) Lock out an account for a certain amount of time after the clipping level is reached. ( C) After a threshold of failed login attempts is met, the administrator must physically lock out the account. ( D) Choose a weaker algorithm that encrypts the password file. 18
24、Brandy could not figure out how Sam gained unauthorized access to her system, since he has little computer experience. Which of the following is most likely the attack Sam used? ( A) Dictionary attack ( B) Shoulder surfing attack ( C) Covert channel attack ( D) Timing attack 19 The relay agent on a
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 计算机 试卷 CISSP 认证 考试 安全 运营 模拟 答案 解析 DOC
