CISSP Practice Test Flashcards
What is the correct definition of penetration testing?
test procedure performed by security professionals with management approval
Based on the Federal Privacy Act of 1974, which type of permission must be obtained by a government agency to disclose private information that the agency collected?
- written permission
You are researching computer crimes. All of the following are categories of this type of crime, EXCEPT:
- computer-targeted crime
- computer-commerce crime
- computer-incidental crime
- computer-assisted crime
- computer-commerce crime
You have developed the information security policy for your organization. Which step should precede the adoption of this policy?
- obtaining management approval
Which security threat often uses tracking cookies to collect and report on a user’s activities?
- spyware
Which statement is true of symmetric cryptography?
- Symmetric cryptography is faster than asymmetric cryptography
Your company must comply with a cybersecurity certification body’s requirements. Management has requested that you perform a test prior to applying for this certification. Which type of test should you perform?
- Perform an internal assessment or audit using personnel from within the company.
You are the security administrator for your organization. A user in the IT department informs you that a print server was recently the victim of a teardrop attack. Which statement correctly defines the attack that has occurred?
- It involves the use of malformed fragmented packets and causes the target system to either freeze or crash
What information is true of an information processing facility?
- Doors and frames should have the same fire rating
Which type of virus is specifically designed to infect programs as they are loaded into memory?
- Resident virus
Which type of channel is used when one process writes data to a hard drive and another process reads it?
- covert storage channel
You are designing employee termination process guidelines. Which activity is NOT included in the employee termination process?
- signing a non-disclosure agreement
A security technician reports to you that a file server is experiencing unscheduled initial program loads (IPLs). Which statement BEST explains this problem?
- The system is rebooting
Your company has implemented a host-based intrusion detection system (HIDS). You have recently become concerned with your problems when these systems are implemented. What is a major problem when deploying this type of system?
- It must be deployed on each computer that needs it
What does sending data across an insecure network, such as the Internet, primarily affect?
- confidentiality and integrity
During which step of incident response does root cause analysis occur?
- review
What is used in evolutionary computing?
- genetic algorithms
Which statement is true of a multilevel security mode?
- The multilevel security mode involves the use of sensitivity labels
Which statement is NOT true regarding multicast transmissions?
- A message has one source and destination address
Which statement is true of the dedicated security mode?
- All users have the clearance and formal approval required to access all of the data
Which security principle identifies sensitive data and ensures that unauthorized entities cannot access it?
- confidentiality
Which access control model uses the star (*) integrity axiom and the simple integrity axiom?
- Biba model
What is a physical barrier that acts as the first line of defense against an intruder?
- a fence
Given two messages, M1 and M2, what is the LEAST likely outcome when using the same one-way hash function, H, to encrypt the messages?
- H(M1) = H(M2)