CISSP - 3 Flashcards
The help desk is receiving many calls regarding slow web application response times today. This is impairing business. The Systems Administrator notices an increased level of connection attempt failures. This scenario could be a failure of which penetration testing stage? A. Analysis and reporting B. Vulnerability detection C. Planning and preparation D. Information Gathering
C. Planning and preparation
What is the primary reason a company would choose to perform a vulnerability assessment compared to a penetration test? A. Vulnerability assessments reveal a higher number of vulnerabilities B. Vulnerability assessments are less likely to disrupt production systems C. Vulnerability assessments are less time consuming and cost effective D. Vulnerability assessments help meet industry regulatory requirements
B. Vulnerability assessments are less likely to disrupt production systems
A security practioner has a report that details the access list for a fileshare. This list is quite long. What next steps should the Security Practioner take with this list? A. review this list with the Human Resources Manager B. review this list with the Systems Administrator C. review this list with the Data Owner D. review this list with the Network Manager
C. review this list with the Data Owner
When investigating a potential data breach by unauthorized access, the best source of information related to the activity can be found in A. Audit logs B. Performance logs C. traffic logs D. utilization logs
A. Audit logs
Which one of the following introduces a weakness with end-to-end encryption? A. Non-printable characters B. ASCII codes C. Private Keys D. Application Gateways
D. Application Gateways
Major security concern for SCADA systems using DLP3 protocols should be A. Spoofing B. Eavesdropping C. Denial of Service D. Man-in-the-middle
A. Spoofing
Information security is the responsibility of A. everyone in the organization B. corporate management C. the corporate security office D. everyone with computer access
A. everyone in the organization
Which of the following should an organization have in place to prevent employees from stealing intellectual property? A. Employee insurance plan and policies B. Employee training program and policies C. Employment agreement and policies D. Employee development plan and policies
C. Employment agreement and policies
External technical attacks against systems often begin with A. Vulnerability Scans B. Social Engineering C. Monitoring of SSL traffic D. Analysis of degaussed media
B. Social Engineering
Which of the following is the most appropriate to conduct the testing stage of a Software Development Life Cycle? A. Quality Assurance Staff B. Implementation Staff C. Security Staff D. Technical Support Staff
B. Implementation Staff
Which of the following logs can track all applications on a system? A. Accounting log B. Kernel log C. System log D. Error log
C. System log
The technical Service required for assuring the most important detail of this transaction is A. Diffie-Hellman Key exchange B. Kerberos authentication C. non-repudiation D. one-time pad
C. non-repudiation
What is certificate path validation? A. Verification of the integrity of the associated root certificate B. verification of the validity of all certificates of the certificate chain to the root certificate C. verification of the integrity of the concerned private key D. verification of the revocation status of the concerned certificate
B. verification of the validity of all certificates of the certificate chain to the root certificate
A security model provides the information security professional with a A. set of policies and procedures for the operations of a security program B. framework of security objectives and goals C. group of informal access controls to protect network resources D. list of recurring activities that test security preparedness
B. framework of security objectives and goals
Where would be the most effective place to implement a host-based intrusion detection system? A. Firewall B. World Wide Web Server C. Edge router D. External Network Intrusion Detection SYstem
C. Edge router