[计算机类试卷]CISSP认证考试(访问控制)模拟试卷1及答案与解析.doc
《[计算机类试卷]CISSP认证考试(访问控制)模拟试卷1及答案与解析.doc》由会员分享,可在线阅读,更多相关《[计算机类试卷]CISSP认证考试(访问控制)模拟试卷1及答案与解析.doc(36页珍藏版)》请在麦多课文档分享上搜索。
1、CISSP认证考试(访问控制)模拟试卷 1及答案与解析 1 Which of the following does not correctly describe a directory service? ( A) It manages objects within a directory by using namespaces. ( B) It enforces security policy by carrying out access control and identity management functions. ( C) It assigns namespaces to each
2、object in databases that are based on the X.509 standard and are accessed by LDAP. ( D) It allows an administrator to configure and manage how identification takes place within the network. 2 Hannah has been assigned the task of installing Web access management(WAM) software. What is the best descri
3、ption for what WAM is commonly used for? ( A) Control external entities requesting access through X.500 databases ( B) Control external entities requesting access to internal objects ( C) Control internal entities requesting access through X.500 databases ( D) Control internal entities requesting ac
4、cess to external objects 3 There are several types of password management approaches used by identity management systems. Which of the following reduces help-desk call volume, but is also criticized for the ease with which a hacker could gain access to multiple resources if a password is compromised
5、? ( A) Management password reset ( B) Self-service password reset ( C) Password synchronization ( D) Assisted password reset 4 A number of attacks can be performed against smart cards. Side-channel is a class of attacks that doesnt try to compromise a flaw or weakness. Which of the following is not
6、a side-channel attack? ( A) Differential power analysis ( B) Microprobing analysis ( C) Timing analysis ( D) Electromagnetic analysis 5 Which of the following does not describe privacy-aware role-based access control? ( A) It is an example of a discretionary access control model. ( B) Detailed acces
7、s controls indicate the type of data that users can access based on the datas level of privacy sensitivity. ( C) It is an extension of role-based access control. ( D) It should be used to integrate privacy policies and access control policies. 6 What was the direct predecessor to Standard Generalize
8、d Markup Language(SGML)? ( A) Hypertext Markup Language (HTML) ( B) Extensible Markup Language (XML) ( C) LaTeX ( D) Generalized Markup Language (GML) 7 Brian has been asked to work on the virtual directory of his companys new identity management system. Which of the following best describes a virtu
9、al directory? ( A) Meta-directory ( B) User attribute information stored in an HR database ( C) Virtual container for data from multiple sources ( D) A service that allows an administrator to configure and manage how identification takes place 8 Emily is listening to network traffic and capturing pa
10、sswords as they are sent to the authentication server. She plans to use the passwords as part of a future attack. What type of attack is this? ( A) Brute-force attack ( B) Dictionary attack ( C) Social engineering attack ( D) Replay attack 9 Which of the following correctly describes a federated ide
11、ntity and its role within identity management processes? ( A) A nonportable identity that can be used across business boundaries ( B) A portable identity that can be used across business boundaries ( C) An identity that can be used within intranet virtual directories and identity stores ( D) An iden
12、tity specified by domain names that can be used across business boundaries 10 Phishing and pharming are similar. Which of the following correctly describes the difference between phishing and pharming? ( A) Personal information is collected from victims through legitimate-looking Web sites in phishi
13、ng attacks, while personal information is collected from victims via e-mail in pharming attacks. ( B) Phishing attacks point e-mail recipients to a form where victims input personal information, while pharming attacks use pop-up forms at legitimate Web sites to collect personal information from vict
14、ims. ( C) Victims are pointed to a fake Web site with a domain name that looks similar to a legitimate sites in a phishing attack, while victims are directed to a fake Web site as a result of a legitimate domain name being incorrectly translated by the DNS server ( D) Phishing is a technical attack,
15、 while pharming is a type of social engineering. 11 Security countermeasures should be transparent to users and attackers. Which of the following does not describe transparency? ( A) User activities are monitored and tracked without negatively affecting system performance. ( B) User activities are m
16、onitored and tracked without the user knowing about the mechanism that is carrying this out. ( C) Users are allowed access in a manner that does not negatively affect business processes. ( D) Unauthorized access attempts are denied and logged without the intruder knowing about the mechanism that is
17、carrying this out. 12 What markup language allows for the sharing of application security policies to ensure that all applications are following the same security rules? ( A) XML ( B) SPML ( C) XACML ( D) GML 13 The importance of protecting audit logs generated by computers and network devices is hi
18、ghlighted by the fact that it is required by many of todays regulations. Which of the following does not explain why audit logs should be protected? ( A) If not properly protected, these logs may not be admissible during a prosecution. ( B) Audit logs contain sensitive data and should only be access
19、ible to a certain subset of people. ( C) Intruders may attempt to scrub the logs to hide their activities. ( D) The format of the logs should be unknown and unavailable to the intruder. 14 Harrison is evaluating access control products for his company. Which of the following is not a factor he needs
20、 to consider when choosing the products? ( A) Classification level of data ( B) Level of training that employees have received ( C) Logical access controls provided by products ( D) Legal and regulation issues 15 There are several types of intrusion detection systems (IDSs). What type of IDS builds
21、a profile of an environments normal activities and assigns an anomaly score to packets based on the profile? ( A) State-based ( B) Statistical anomaly-based ( C) Misuse detection system ( D) Protocol signature-based 16 A rule-based IDS takes a different approach than a signature-based or anomalybase
22、d system. Which of the following is characteristic of a rule-based IDS? ( A) Uses IF/THEN programming within expert systems ( B) Identifies protocols used outside of their common bounds ( C) Compares patterns to several activities at once ( D) Can detect new attacks 17 Sam plans to establish mobile
23、phone service using the personal information he has stolen from his former boss. What type of identity theft is this? ( A) Phishing ( B) True name ( C) Pharming ( D) Account takeover 18 Of the following, what is the primary item that a capability listing is based upon? ( A) A subject ( B) An object
24、( C) A product ( D) An application 19 Alex works for a chemical distributor that assigns employees tasks that separate their duties and routinely rotates job assignments. Which of the following best describes the differences between these countermeasures? ( A) They are the same thing with different
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 计算机 试卷 CISSP 认证 考试 访问 控制 模拟 答案 解析 DOC
