[计算机类试卷]CISSP认证考试(法律、法规、调查与合规)模拟试卷1及答案与解析.doc
《[计算机类试卷]CISSP认证考试(法律、法规、调查与合规)模拟试卷1及答案与解析.doc》由会员分享,可在线阅读,更多相关《[计算机类试卷]CISSP认证考试(法律、法规、调查与合规)模拟试卷1及答案与解析.doc(32页珍藏版)》请在麦多课文档分享上搜索。
1、CISSP认证考试(法律、法规、调查与合规)模拟试卷 1及答案与解析 1 Cyberlaw categorizes computer-related crime into three categories. Which of the following is an example of a crime in which the use of a computer would be categorized as incidental? ( A) Carrying out a buffer overflow to take control of a system ( B) The electron
2、ic distribution of child pornography ( C) Attacking financial systems to steal funds ( D) Capturing passwords as they are sent to the authentication server 2 Which organization has been developed to deal with economic, social, and governance issues, and with how sensitive data is transported over bo
3、rders? ( A) European Union ( B) Council of Europe ( C) Safe Harbor ( D) Organisation for Economic Co-operation and Development 3 Different countries have different legal systems. Which of the following correctly describes customary law? ( A) Not many countries work under this law purely; most instea
4、d use a mixed system where this law, which deals mainly with personal conduct and patterns of behavior, is an integrated component. ( B) It covers all aspects of human life, but is commonly divided into responsibilities and obligations to others, and religious duties. ( C) It is a rule-based law foc
5、used on codified law. ( D) Based on previous interpretations of laws, this system reflects the communitys morals and expectations. 4 Widgets Inc. wishes to protect its logo from unauthorized use. Which of the following will protect the logo and ensure that others cannot copy and use it? ( A) Patent
6、( B) Copyright ( C) Trademark ( D) Trade secret law 5 There are four categories of software licensing. Which of the following refers to software sold at a reduced cost? ( A) Shareware ( B) Academic software ( C) Freeware ( D) Commercial software 6 There are different types of approaches to regulatio
7、ns. Which of the following is an example of self-regulation? ( A) The Health Insurance Portability and Accountability Act ( B) The Sarbanes-Oxley Act ( C) The Computer Fraud and Abuse Act ( D) PCI Data Security Standard 7 Which of the following means that a company did all it could have reasonably d
8、one to prevent a security breach? ( A) Downstream liability ( B) Responsibility ( C) Due diligence ( D) Due care 8 There are three different types of incident response teams. Which of the following correctly describes a virtual team? ( A) It consists of experts who have other duties within the organ
9、ization. ( B) It can be cost prohibitive to smaller organizations. ( C) It is a hybrid model. ( D) Core members are permanently assigned to the team. 9 A suspected crime has been reported within your organization. Which of the following steps should the incident response team take first? ( A) Establ
10、ish a procedure for responding to the incident. ( B) Call in forensics experts. ( C) Determine that a crime has been committed. ( D) Notify senior management. 10 During an incident response, what stage involves mitigating the damage caused by an incident? ( A) Investigation ( B) Containment ( C) Tri
11、age ( D) Analysis 11 Which of the following is a correct statement regarding computer forensics? ( A) It is the study of computer technology. ( B) It is a set of hardware-specific processes that must be followed in order for evidence to be admissible in a court of law. ( C) It encompasses network an
12、d code analysis, and may be referred to as electronic data discovery. ( D) Computer forensics responsibilities should be assigned to a network administrator before an incident occurs. 12 Which of the following dictates that all evidence be labeled with information indicating who secured and validate
13、d it? ( A) Chain of custody ( B) Due care ( C) Investigation ( D) Motive, Opportunity, and Means 13 There are several categories of evidence. How is a witnesss oral testimony categorized? ( A) Best evidence ( B) Secondary evidence ( C) Circumstantial evidence ( D) Conclusive evidence 14 For evidence
14、 to be legally admissible, it must be authentic, complete, sufficient, and reliable. Which characteristic refers to the evidence having a reasonable and sensible relationship to the findings? ( A) Complete ( B) Reliable ( C) Authentic ( D) Sufficient 15 Which of the following best describes exigent
15、circumstances? ( A) The methods used to capture a suspects actions are neither legal nor ethical. ( B) Enticement is used to capture a suspects actions. ( C) Hacking does not actually hurt anyone. ( D) The seizure of evidence by law enforcement because there is concern that a suspect will attempt to
16、 destroy it. 16 What role does the Internet Architecture Board play regarding technology and ethics? ( A) It creates criminal sentencing guidelines. ( B) It issues ethics-related statements concerning the use of the Internet. ( C) It edits Request for Comments. ( D) It maintains ten commandments for
17、 ethical behavior. 17 Which of the following statements is not true of dumpster diving? ( A) It is legal. ( B) It is unethical. ( C) It is illegal. ( D) It is a nontechnical attack. 18 Which of the following is a legal form of eavesdropping when performed with prior consent or a warrant? ( A) Denial
18、 of Service ( B) Dumpster diving ( C) Wiretapping ( D) Data diddling 19 What type of common law deals with violations committed by individuals against government laws, which are created to protect the public? ( A) Criminal law ( B) Civil law ( C) Tort law ( D) Regulatory law 20 During what stage of
19、incident response is it determined if the source of the incident was internal or external, and how the offender penetrated and gained access to the asset? ( A) Analysis ( B) Containment ( C) Tracking ( D) Follow-up 21 Which of the following is not true of a forensics investigation? ( A) The crime sc
20、ene should be modified as necessary. ( B) A file copy tool may not recover all data areas of the device that are necessary for investigation. ( C) Contamination of the crime scene may not negate derived evidence, but it should still be documented. ( D) Only individuals with knowledge of basic crime
21、scene analysis should have access to the crime scene. 22 Great care must be taken to capture clues from a computer or device during a forensics exercise. Which of the following does not correctly describe the efforts that should be taken to protect an image? ( A) The original image should be hashed
22、with MD5 and/or SHA-256. ( B) Two time-stamped images should be created. ( C) New media should be properly purged before images are created on them. ( D) Some systems must be imaged while they are running. 23 Which of the following attacks can be best prevented by limiting the amount of electrical s
23、ignals emitted from a computer system? ( A) Salami attack ( B) Emanations capturing ( C) Password sniffing ( D) IP spoofing 24 As a CISSP candidate, you must sign a Code of Ethics. Which of the following is from the (ISC)2 Code of Ethics for the CISSP? ( A) Information should be shared freely and op
24、enly; thus, sharing confidential information should be ethical. ( B) Think about the social consequences of the program you are writing or the system you are designing. ( C) Discourage unnecessary fear or doubt. ( D) Do not participate in Internet-wide experiments in a negligent manner. 25 What conc
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 计算机 试卷 CISSP 认证 考试 法律 法规 调查 合规 模拟 答案 解析 DOC
