CISSP Lesson 10 PreTest Flashcards
How often should monitoring be implemented?
A) Monthly
B) Quarterly
C) Perpetually
Perpetually
Which is the best countermeasure against loss of physical and infrastructure support?
A) Have a current disaster recovery plan
B) Have multiple backup generators
C) Have multiple physical controls
Have a current disaster recovery plan
What is the purpose of separation of duties?
A) Ensures that individuals are not able to perform more tasks than their security clearance allows
B) Ensures that any critical task cannot be completely executed by a single individual
Ensures that any critical task cannot be completely executed by a single individual
All audit reports should include the scope of the audit.
A) TRUE
B) FALSE
TRUE
Erasing files from a disk does not actually remove all of the data.
A) TRUE
B) FALSE
TRUE
Which types of records should be retained by a company to support data security? Choose all that apply. A) Employee records B) Event logs C) Audit trails D) Software registration documentation E) Backups of critical information
Event logs
Audit trails
Backups of critical information
Due care is the upkeep of due diligence.
A) TRUE
B) FALSE
FALSE
Which type of monitoring tools allows for a quick view of a specific metric?
A) Ad hoc
B) Real-time
C) Passive
Ad hoc
Which statement is true regarding audit reports?
A) An audit report should contain as much data as possible
B) An audit report should contain as little data as possible
C) An audit report should contain only meaningful data
An audit report should contain only meaningful data
Which process is often used to declassify data?
A) Purging
B) Degaussing
C) Sanitation
Purging
Which type of IDS contains a database of recognized attacks?
A) Host-based
B) Signature-based
C) Behavior-based
Signature-based
Which is the best countermeasure against sniffing attacks?
A) Access controls
B) Physical controls
C) Encryption
Encryption
Which tools are used to scan for vulnerabilities? Choose all that apply. A) WebSpy B) Nessus C) Nmap D) WebInspect E) NeoTrace
Nessus
Nmap
WebInspect
Which steps should be taken to protect source code? Choose all that apply. A) Archive current code B) Maintain version change history C) Keep patches current D) Apply access controls
Archive current code
Maintain version change history
Which events should be monitored? Choose all that apply. A) Access to removable storage B) Login failures C) Logins and logouts D) Database session start and end
Access to removable storage
Login failures
Logins and logouts
Database session start and end