CISSP Lesson 9 PreTest Flashcards

2
Q

A PDA has which kind of memory?
A) Persistent
B) Sequential
C) Volatile

A

Volatile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Network isolation is an example of which type of security architecture?
A) Process isolation
B) Privilege isolation
C) Hardware segmentation

A

Hardware segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which statements are true concerning relational databases? Choose all that apply.
A) Contains transparent program integration with object-oriented programming languages
B) Consists of a logical collection of tables
C) Relationships are not stored in the database
D) Stores exactly the same object model that is used at the application level
E) Implements concurrency control

A

Consists of a logical collection of tables

Relationships are not stored in the database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Preparing data for transfer from client to server is a function of an agent component in a distributed environment.
A) TRUE
B) FALSE

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NIACAP is the certification standard for which organization?
A) Department of Defense
B) United States Executive Branch
C) US Postal Service

A

United States Executive Branch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What may be the result of reusing objects?
A) Increased volatility
B) Increased stability
C) Increased risk for attacks

A

Increased stability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which is an example of an aggregate function?
A) Count()
B) Select()
C) OR

A

Count()

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is polyinstantiation?
A) The ability to obtain information of a higher sensitivity by combining information from lower levels of sensitivity
B) The ability to allow multiple database objects to exist with the same key
C) The ability to deduce information about data at sensitivity levels for which a user is not cleared

A

The ability to allow multiple database objects to exist with the same key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Buffer overflows are always the result of SYN floods.
A) TRUE
B) FALSE

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a downside to developing an application for a local environment?
A) The platform may not be secure
B) The platform is expensive to implement
C) The platform may be volatile

A

The platform may be volatile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a cracker?
A) A person who attempts to compromise a system for an unauthorized purpose
B) A person who has a passion for learning more about computers
C) A person who compromises a telephone company system to obtain free long distance services

A

A person who attempts to compromise a system for an unauthorized purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of attack is a piece of code included in a software product that allows a person to bypass all access controls?
A) Worms
B) Trap doors
C) Logic bombs

A

Trap doors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who generally implements pseudo flaws?
A) End users
B) Developers
C) Attackers

A

Developers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which column name is the best example of a candidate key?
A) First name
B) Last name
C) Customer number

A

Customer number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the best definition of a foreign key?
A) A duplicate key from another table
B) The primary key from another table
C) The candidate key from another table

A

The primary key from another table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In which mode of operation should developers operate most of the time?
A) Supervisor
B) Administrator
C) User

A

User

18
Q

Which type of attack is a sequence of destructive instructions embedded in a common document?
A) Multipartite
B) Stealth
C) Macro

A

Macro

19
Q
Which are the phases in the systems development life cycle? Choose all that apply.
A) Conceptual definition
B) Functional requirements determination
C) Protection specifications development
D) Design review
E) Code review walk-through
F) System test review
A
Conceptual definition
Functional requirements determination
Protection specifications development
Design review
Code review walk-through
System test review
20
Q

Data hiding is a technique in which the details of where the data is stored are hidden.
A) TRUE
B) FALSE

A

TRUE

21
Q
Which is an example of primary memory?
A) Memory stick
B) RAM
C) Hard Disk
D) CD-ROM
A

RAM