版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
PAGEPAGE1652022年ISC2CISSP英文考试参考题库(含答案)一、单选题1.
Tominimizethevulnerabilitiesofaweb-basedapplication,whichofthefollowingFIRSTactionswilllockdownthesystemandminimizetheriskofanattack?A、Applythelatestvendorpatchesandupdates.B、Runavulnerabilityscanner.C、Reviewaccesscontrols.D、Installanantivirusontheserver.答案:A2.
Asecurityprofessionalhasbeenassignedtoassessawebapplication.TheassessmentreportremendsswitchingtoSecurityAssertionMarkupLanguage(SAML).WhatisthePRIMARYsecuritybenefitinswitchingtoSAML?A、Itenablessinglesign-on(SSO)forwebapplications.B、ItusesTransportLayerSecurity(TLS)toaddressconfidentiality.C、Itlimitsunnecessarydataentryonwebforms.D、Theusers'passwordisnotpassedduringauthentication.答案:D3.
Whichofthefollowingisincludedinchangemanagement?A、Technicalreviewbybusinessowner.B、UserAcceptanceTesting(UAT)beforeimplementation.C、Cost-benefitanalysis(CBA)afterimplementation.D、Businesscontinuitytesting.答案:D4.
WhichofthefollowingBESTensurestheintegrityoftransactionstointendedrecipients?A、Publickeyinfrastructure(PKI).B、Blockchaintechnology.C、Pre-sharedkey(PSK).D、Weboftrust.答案:A5.
WhichofthefollowingmeasuresservesastheBESTmeansforprotectingdataonputers,smartphones,andexternalstoragedeviceswhentravelingtohigh-riskcountries?A、Reviewapplicabledestinationcountrylaws,forensicallycleandevicespriortotravel,andonlydownloadsensitivedataoveravirtualprivatenetwork(VPN)uponarrivingatthedestination.B、LeverageaSecureSocketLayer(SSL)connectionoveravirtualprivatenetwork(VPN)todownloadsensitivedatauponarrivingatthedestination.C、Keeplaptops,externalstoragedevices,andsmartphonesinthehotelroomwhennotinuse.D、Usemulti-factorauthentication(MFA)togainaccesstodatastoredonlaptopsorexternalstorage
Devicesandbiometricfingerprintaccesscontrolmechanismstounlocksmartphones.答案:D6.
Ahealthcareinsuranceorganizationchoseavendortodevelopasoftwareapplication.Uponreviewofthedraftcontract,theinformationsecurityprofessionalnoticesthatsoftwaresecurityisnotaddressed.WhatistheBESTapproachtoaddresstheissue?A、Updatethecontracttorequirethevendortoperformsecuritycodereviews.B、Updatetheservicelevelagreement(SLA)toprovidetheorganizationtherighttoauditthevendor.C、Updatethecontractsothatthevendorisobligatedtoprovidesecuritycapabilities.D、Updatetheservicelevelagreement(SLA)torequirethevendortoprovidesecuritycapabilities.答案:B7.
Anorganizationoutgrewitsinternaldatacenterandisevaluatingthird-partyhostingfacilities.Inthisevaluation,whichofthefollowingisaPRIMARYfactorforselection?A、Facilityprovidesanacceptablelevelofrisk.B、Facilityprovidesdisasterrecovery(DR)services.C、Facilityhasphysicalaccessprotectionmeasures.D、Facilityprovidesthemostcost-effectivesolution.答案:D8.
WhatdocumentationisproducedFIRSTwhenperforminganeffectivephysicallosscontrolprocess?A、Deterrentcontrolslist.B、Securitystandardslist.C、Assetvaluationlist.D、Inventorylist.答案:D9.
AChiefInformationOfficer(CIO)hasdelegatedresponsibilityoftheirsystemsecuritytotheheadoftheinformationtechnology(IT)department.WhilecorporatepolicydictatesthatonlytheCIOcanmakedecisionsonthelevelofdataprotectionrequired,technicalimplementationdecisionsaredonebytheheadoftheITdepartment.WhichofthefollowingBESTdescribesthesecurityrolefilledbytheheadoftheITdepartment?A、Systemsecurityofficer.B、Systemprocessor.C、Systemcustodian.D、Systemanalyst.答案:C10.
WhichofthefollowingwouldbetheBESTmitigationpracticeforman-in-the-middle(MITM)VoiceoverInternetProtocol(VoIP)attacks?A、UseSecureShell(SSH)protocol.B、UseFileTransferProtocol(FTP).C、UseTransportLayerSecurity(TLS)protocol.D、UseMediaGatewayControlProtocol(MGCP).答案:C11.
Whichofthefollowingwouldqualifyasanexceptiontothe"righttobeforgotten"oftheGeneralDataProtectionRegulation(GDPR)?A、Fortheestablishment,exercise,ordefenseoflegalclaims.B、Thepersonaldatahasbeenlawfullyprocessedandcollected.C、Forthereasonsofprivateinterest.D、Thepersonaldataremainsnecessarytothepurposeforwhichitwascollected.答案:A12.
Adatabaseserverforafinancialapplicationisscheduledforproductiondeployment.WhichofthefollowingcontrolswillBESTpreventtampering?A、Datasanitization.B、Datavalidation.C、Serviceaccountsremoval.D、Loggingandmonitoring.答案:B13.
WhatisthePRIMARYreasonforcriminallawbeingdifficulttoenforcewhendealingwithcybercrime?A、Jurisdictionishardtodefine.B、Lawenforcementagenciesareunderstaffed.C、Extraditiontreatiesarerarelyenforced.D、Numerouslanguagebarriersexist.答案:A14.
Ifthewideareanetwork(WAN)issupportingconvergedapplicationslikeVoiceoverInternetProtocol(VoIP),whichofthefollowingbeesevenMOREessentialtotheassuranceofthenetwork?A、Boundaryrouting.B、ClasslessInter-DomainRouting(CIDR).C、InternetProtocol(IP)routinglookups.D、Deterministicrouting.答案:C15.
Thequalityassurance(QA)departmentisshort-staffedandisunabletotestallmodulesbeforetheanticipatedreleasedateofanapplication.WhatsecuritycontrolisMOSTlikelytobeviolated?A、Changemanagement.B、Separationofenvironments.C、Programmanagement.D、Mobilecodecontrols.答案:A16.
Whichofthefollowingshouldbeincludedinagooddefense-in-depthstrategyprovidedbyobject-orientedprogrammingforsoftwaredevelopment?A、Polymorphism.B、Inheritance.C、Polyinstantiation.D、Encapsulation.答案:C17.
WhichofthefollowingistheBESTapproachtoimplementmultipleserversonavirtualsystem?A、Implementoneprimaryfunctionpervirtualserverandapplyindividualsecurityconfigurationforeachvirtualserver.B、Implementmultiplefunctionswithinthesamevirtualserverandapplyindividualsecurityconfigurationstoeachfunction.C、Implementoneprimaryfunctionpervirtualserverandapplyhighsecurityconfigurationonthehostoperatingsystem.D、Implementmultiplefunctionspervirtualserverandapplythesamesecurityconfigurationforeachvirtualserver.答案:A18.
UndertheGeneralDataProtectionRegulation(GDPR),whatisthemaximumamountoftimeallowedforreportingapersonaldatabreach?A、24hours.B、48hours.C、72hours.D、96hours.答案:C19.
Asoftwaredeveloperwishestowritecodethatwillexecutesafelyandonlyasintended.WhichofthefollowingprogramminglanguagetypesisMOSTlikelytoachievethisgoal?A、Weaklytyped.B、Dynamicallytyped.C、Stronglytyped.D、Staticallytyped.答案:C20.
Anorganizationwouldliketoensurethatallnewusershaveapredefineddepartmentalaccesstemplateapplieduponcreation.Theorganizationwouldalsolikeadditionalaccessforuserstobegrantedonaper-projectbasis.WhattypeofuseraccessadministrationisBESTsuitedtomeettheorganization'sneeds?A、Decentralized.B、Hybrid.C、Centralized.D、Federated.答案:B21.
Clothingretaileremployeesareprovisionedwithuseraccountsthatprovideaccesstoresourcesatpartnerbusinesses.Allpartnerbusinessesusemonidentityandaccessmanagement(IAM)protocolsanddifferingtechnologies.UndertheExtendedIdentityprinciple,whatistheprocessflowbetweenpartnerbusinessestoallowthisIAMaction?A、ClothingretaileractsasUserSelfService,confirmsidentityofuserusingindustrystandards,thensendscredentialstopartnerbusinessesthatactasaServiceProviderandallowsaccesstoservices.B、Clothingretaileractsasidentityprovider(IdP),confirmsidentityofuserusingindustrystandards,thensendscredentialstopartnerbusinessesthatactasaServiceProviderandallowsaccesstoservices.C、ClothingretaileractsasServiceProvider,confirmsidentityofuserusingindustrystandards,thensendscredentialstopartnerbusinessesthatactasanidentityprovider(IdP)andallowsaccessto
Resources.D、ClothingretaileractsasAccessControlProvider,confirmsaccessofuserusingindustrystandards,thensendscredentialstopartnerbusinessesthatactasaServiceProviderandallowsaccesstoresources.答案:B22.
Apanyneedstoprovidesharedaccessofsensitivedataonacloudstoragetoexternalbusinesspartners.WhichofthefollowingidentitymodelsistheBESTtoblindidentityproviders(IdP)andrelyingparties(RP)sothatsubscriberlistsofotherpartiesarenotdisclosed?A、Proxiedfederation.B、Dynamicregistration.C、Federationauthorities.D、Staticregistration.答案:A23.
Whichtechniquehelpssystemdesignersconsiderpotentialsecurityconcernsoftheirsystemsandapplications?A、Threatmodeling.B、Manualinspectionsandreviews.C、Sourcecodereview.D、Penetrationtesting.答案:A24.
Whichofthefollowingdepartmentsinitiatestherequest,approval,andprovisioningbusinessprocess?A、Operations.B、Security.C、Humanresources(HR).D、Informationtechnology(IT).答案:A25.
Anorganizationisconsideringpartneringwithathird-partysupplierofcloudservices.Theorganizationwillonlybeprovidingthedataandthethird-partysupplierwillbeprovidingthesecuritycontrols.WhichofthefollowingBESTdescribesthisserviceoffering?A、PlatformasaService(PaaS).B、AnythingasaService(XaaS).C、InfrastructureasaService(IaaS).D、SoftwareasaService(SaaS).答案:D26.
Whenconductingathird-partyriskassessmentofanewsupplier,whichofthefollowingreportsshouldbereviewedtoconfirmtheoperatingeffectivenessofthesecurity,availability,confidentiality,andprivacytrustprinciples?A、ServiceOrganizationControl(SOC)1,Type2.B、ServiceOrganizationControl(SOC)2,Type2.C、InternationalOrganizationforStandardization(ISO)27001.D、InternationalOrganizationforStandardization(ISO)27002.答案:B27.
Aninformationsecurityprofessionalisreviewinguseraccesscontrolsonacustomer-facingapplication.Theapplicationmusthavemulti-factorauthentication(MFA)inplace.Theapplicationcurrentlyrequiresausernameandpasswordtologin.WhichofthefollowingoptionswouldBESTimplementMFA?A、Geolocatetheuserandparetopreviouslogins.B、Requireapre-selectednumberaspartofthelogin.C、Havetheuseranswerasecretquestionthatisknowntothem.D、Enteranautomaticallygeneratednumberfromahardwaretoken.答案:D28.
Whichofthefollowingissecuritycontrolvolatility?A、Areferencetotheimpactofthesecuritycontrol.B、Areferencetothelikelihoodofchangeinthesecuritycontrol.C、Areferencetohowunpredictablethesecuritycontrolis.D、Areferencetothestabilityofthesecuritycontrol.答案:B29.
WhichofthefollowingoutsourcingagreementprovisionshastheHIGHESTpriorityfromasecurityoperationsperspective?A、Conditionstopreventtheuseofsubcontractors.B、Termsforcontractrenegotiationincaseofdisaster.C、Rootcauseanalysisforapplicationperformanceissue.D、Escalationprocessforproblemresolutionduringincidents.答案:D30.
WhataretheessentialelementsofaRiskAssessmentReport(RAR)?A、Executivesummary,bodyofthereport,andappendices.B、Executivesummary,graphofrisks,andprocess.C、Tableofcontents,testingcriteria,andindex.D、Tableofcontents,chapters,andexecutivesummary.答案:A31.
Auserisallowedtoaccessthefilelabeled"FinancialForecast,"butonlybetween9:00am.and5:00p.m.,MondaythroughFriday.Whichtypeofaccessmechanismshouldbeusedtoacplishthis?A、Minimumaccesscontrol.B、Limitedrole-basedaccesscontrol(RBAC).C、Accesscontrollist(ACL).D、Rule-basedaccesscontrol.答案:D32.
WhichofthefollowingistheBESTwaytoprotectanorganization'sdataassets?A、Encryptdataintransitandatrestusingup-to-datecryptographicalgorithms.B、Monitorandenforceadherencetosecuritypolicies.C、RequireMulti-FactorAuthentication(MFA)andSeparationofDuties(SoD).D、CreatetheDemilitarizedZone(DMZ)withproxies,firewallsandhardenedbastionhosts.答案:B33.
Buildingblocksforsoftware-definednetworks(SDN)requirewhichofthefollowing?A、TheSDNisposedentirelyofclient-serverpairs.B、Random-accessmemory(RAM)isusedinpreferencetovirtualmemory.C、TheSDNismostlyposedofvirtualmachines(VM).D、Virtualmemoryisusedinpreferencetorandom-accessmemory(RAM).答案:C34.
Asecurityprofessionalneedstofindasecureandefficientmethodofencryptingdataonanendpoint.Whichsolutionincludesarootkey?A、Bitlocker.B、TrustedPlatformModule(TPM).C、Virtualstoragearraynetwork(VSAN).D、Hardwaresecuritymodule(HSM).答案:B35.
WhichfactorsMUSTbeconsideredwhenclassifyinginformationandsupportingassetsforriskmanagement,legaldiscovery,andpliance?A、Systemownerrolesandresponsibilities,datahandlingstandards,storageandsecuredevelopmentlifecyclerequirements.B、plianceofficerolesandresponsibilities,classifiedmaterialhandlingstandards,storagesystemlifecyclerequirements.C、Datastewardshiproles,datahandlingandstoragestandards,datalifecyclerequirements.D、Systemauthorizationrolesandresponsibilities,cloudputingstandards,lifecyclerequirements.答案:A36.
WhatisthePRIMARYpurposeofcreatingandreportingmetricsforasecurityawareness,training,andeducationprogram?A、Measuretheeffectoftheprogramontheorganization'sworkforce.B、Makeallstakeholdersawareoftheprogram'sprogress.C、Facilitatesupervisionofperiodictrainingevents.D、plywithlegalregulationsanddocumentduediligenceinsecuritypractices.答案:A37.
Anorganizationhasdevelopedawayforcustomerstoshareinformationfromtheirwearabledeviceswitheachother.Unfortunately,theuserswerenotinformedastowhatinformationcollectedwouldbeshared.Whattechnicalcontrolsshouldbeputinplacetoremedytheprivacyissuewhilestilltryingtoacplishtheorganization'sbusinessgoals?A、Shareonlywhattheorganizationdecidesisbest.B、Stopsharingdatawiththeotherusers.C、Defaulttheusertonotshareanyinformation.D、Informtheuserofthesharingfeaturechangesafterimplemented.答案:C38.
WhichofthefollowingcontributesMOSTtotheeffectivenessofasecurityofficer?A、Developingpreciseandpracticalsecurityplans.B、Integratingsecurityintothebusinessstrategies.C、Understandingtheregulatoryenvironment.D、Analyzingthestrengthsandweaknessoftheorganization.答案:C39.
mercialoff-the-shelf(COTS)softwarepresentswhichofthefollowingadditionalsecurityconcerns?A、VendorstakeontheliabilityforCOTSsoftwarevulnerabilities.B、In-housedevelopedsoftwareisinherentlylesssecure.C、COTSsoftwareisinherentlylesssecure.D、ExploitsforCOTSsoftwarearewelldocumentedandpubliclyavailable.答案:D40.
Usingtheciphertextandresultantcleartextmessagetoderivethemonoalphabeticcipherkeyisanexampleofwhichmethodofcryptanalyticattack?A、Known-plaintextattack.B、Ciphertext-onlyattack.C、Frequencyanalysis.D、Probable-plaintextattack.答案:A41.
Acorporationdoesnothaveaformaldatadestructionpolicy.DuringwhichphaseofacriminallegalproceedingwillthishavetheMOSTimpact?A、Sentencing.B、Trial.C、Discovery.D、Arraignment.答案:C42.
WhatisthePRIMARYbenefitofincidentreportingandputercrimeinvestigations?A、plyingwithsecuritypolicy.B、Repairingthedamageandpreventingfutureoccurrences.C、Providingevidencetolawenforcement.D、Appointingaputeremergencyresponseteam.答案:C43.
Whenreviewingvendorcertificationsforhandlingandprocessingofpanydata,whichofthefollowingistheBESTServiceOrganizationControls(SOC)certificationforthevendortopossess?A、SOC1Type1B、SOC2Type1C、SOC2Type2D、SOC3答案:C44.
WhichWideAreaNetwork(WAN)technologyrequiresthefirstrouterinthepathtodeterminethefullpaththepacketwilltravel,removingtheneedforotherroutersinthepathtomakeindependentdeterminations?A、SynchronousOpticalNetworking(SONET).B、MultiprotocolLabelSwitching(MPLS).C、FiberChannelOverEthernet(FCoE).D、SessionInitiationProtocol(SIP).答案:B45.
Asubscriptionservicewhichprovidespower,climatecontrol,raisedflooring,andtelephonewiringbutNOTtheputerandperipheralequipmentisBESTdescribedasa:A、coldsite.B、warmsite.C、hotsite.D、reciprocalsite.答案:A46.
Aninformationsecurityadministratorwishestoblockpeer-to-peer(P2P)trafficoverHypertextTransferProtocol(HTTP)tunnels.WhichofthefollowinglayersoftheOpenSystemsInterconnection(OSI)modelrequiresinspection?A、Application.B、Transport.C、Session.D、Presentation.答案:A47.
WhenconfiguringExtensibleAuthenticationProtocol(EAP)inaVoiceoverInternetProtocol(VoIP)network,whichofthefollowingauthenticationtypesistheMOSTsecure?A、EAP-ProtectedExtensibleAuthenticationProtocol(PEAP).B、EAP-TransportLayerSecurity(TLS).C、EAP-TunneledTransportLayerSecurity(TLS).D、EAP-FlexibleAuthenticationviaSecureTunneling.答案:B48.
Asecurityengineerisrequiredtointegratesecurityintoasoftwareprojectthatisimplementedbysmallgroupsthatquickly,continuously,andindependentlydevelop,test,anddeploycodetothecloud.TheengineerwillMOSTlikelyintegratewithwhichsoftwaredevelopmentprocess?A、DevopsIntegratedProductTeam(IPT).B、StructuredWaterfallProgrammingDevelopment.C、Service-orientedarchitecture(SOA).D、SpiralMethodology.答案:D49.
Ahospital'sbuildingcontrolssystemmonitorsandoperatestheenvironmentalequipmenttomaintainasafeandfortableenvironment.Whichofthefollowingcouldbeusedtominimizetheriskofutilitysupplyinterruption?A、Digitalprotectionandcontroldevicescapableofminimizingtheadverseimpacttocriticalutility.B、Standardizedbuildingcontrolssystemsoftwarewithhighconnectivitytohospitalnetworks.C、Lockoutmaintenancepersonnelfromthebuildingcontrolssystemaccessthatcanimpactcriticalutilitysupplies.D、Digitaldevicesthatcanturnequipmentoffandcontinuouslycyclerapidlyinordertoincreasesuppliesandconcealactivityonthehospitalnetwork.答案:A50.
Whichsectionoftheassessmentreportaddressesseparatevulnerabilities,weaknesses,andgaps?A、Findingsdefinitionsection.B、Riskreviewsection.C、Executivesummarywithfulldetails.D、Keyfindingssection.答案:B51.
Whichofthefollowingtechniquesevaluatesthesecuredesignprinciplesofnetworkorsoftwarearchitectures?A、Riskmodeling.B、Waterfallmethod.C、Threatmodeling.D、Fuzzing.答案:C52.
WhichofthefollowingBESTdescribesthepurposeofthereferencemonitorwhendefiningaccesscontroltoenforcethesecuritymodel?A、Strongoperationalsecuritytokeepunitmemberssafe.B、Policiestovalidateorganizationrules.C、Cyberhygienetoensureorganizationscankeepsystemshealthy.D、Qualitydesignprinciplestoensurequalitybydesign.答案:B53.
Informationsecuritypractitionersareinthemidstofimplementinganewfirewall.WhichofthefollowingfailuremethodswouldBESTprioritizesecurityintheeventoffailure?A、Failover.B、Fail-Closed.C、Fail-Safe.D、Fail-Open.答案:B54.
Beforeallowingawebapplicationintotheproductionenvironment,thesecuritypractitionerperformsmultipletypesofteststoconfirmthatthewebapplicationperformsasexpected.Totesttheusernamefield,thesecuritypractitionercreatesatestthatentersmorecharactersintothefieldthanisallowed.WhichofthefollowingBESTdescribesthetypeoftestperformed?A、Misusecasetesting.B、Interfacetesting.C、Websessiontesting.D、Penetrationtesting.答案:A55.
Whatprocessfacilitatesthebalanceofoperationalandeconomiccostsofprotectivemeasureswithgainsinmissioncapability?A、Performancetesting.B、Riskassessment.C、Securityaudit.D、Riskmanagement.答案:D56.
WhichofthefollowingBESTdescribesthepurposeofBorderGatewayProtocol(BGP)?A、ProvideRoutingInformationProtocol(RIP)version2advertisementstoneighboringlayer3devices.B、Maintainalistofnetworkpathsbetweeninternetrouters.C、Providefirewallservicestocloud-enabledapplications.D、Maintainalistofefficientnetworkpathsbetweenautonomoussystems.答案:D57.
WhatistheMOSTeffectivemethodtoenhancesecurityofasinglesign-on(SSO)solutionthatinterfaceswithcriticalsystems?A、Two-factorauthentication.B、Reusabletokensforapplicationlevelauthentication.C、Highperformanceencryptionalgorithms.D、SecureSocketsLayer(SSL)forallmunications.答案:A58.
Adeveloperiscreatinganapplicationthatrequiressecureloggingofalluseractivity.WhatistheBESTpermissionthedevelopershouldassigntothelogfiletoensurerequirementsaremet?A、Execute.B、Read.C、Write.D、Append.答案:D59.
WhatHypertextTransferProtocol(HTTP)responseheadercanbeusedtodisabletheexecutionofinlineJavaScriptandtheexecutionofeval()-typefunctions?A、X-XSS-Protection.B、Content-Security-Policy.C、X-Frame-Options.D、Strict-Transport-Security.答案:B60.
Afirmwithinthedefenseindustryhasbeendirectedtoplywithcontractualrequirementsforencryptionofagovernmentclient'sControlledUnclassifiedInformation(CUI).WhatencryptionstrategyrepresentshowtoprotectdataatrestintheMOSTefficientandcost-effectivemanner?A、Performlogicalseparationofprograminformation,usingvirtualizedstoragesolutionswithencryptionmanagementintheback-enddisksystems.B、Performlogicalseparationofprograminformation,usingvirtualizedstoragesolutionswithbuilt-inencryptionatthevirtualizationlayer.C、Performphysicalseparationofprograminformationandencryptonlyinformationdeemedcritical
Bythedefenseclient.D、Implementdataatrestencryptionacrosstheentirestorageareanetwork(SAN).答案:D61.
WhichofthefollowingistheBESToptiontoreducethenetworkattacksurfaceofasystem?A、Disablingunnecessaryportsandservices.B、Ensuringthattherearenogroupaccountsonthesystem.C、Uninstallingdefaultsoftwareonthesystem.D、Removingunnecessarysystemuseraccounts.答案:A62.
Inaquarterlysystemaccessreview,anactiveprivilegedaccountwasdiscoveredthatdidnotexistinthepriorreviewontheproductionsystem.Theaccountwascreatedonehourafterthepreviousaccessreview.WhichofthefollowingistheBESToptiontoreduceoverallriskinadditiontoquarterlyaccessreviews?A、Implementbi-annualreviews.B、Createpoliciesforsystemaccess.C、Implementandreviewrisk-basedalerts.D、Increaselogginglevels.答案:B63.
SecuritySoftwareDevelopmentLifeCycle(SDLC)expectsapplicationcodetobewritteninaconsistentmannertoalloweaseofauditingandwhichofthefollowing?A、Protecting.B、Copying.C、Enhancing.D、Executing.答案:A64.
WhichofthefollowingdescribestheBESTmethodofmaintainingtheinventoryofsoftwareandhardwarewithintheorganization?A、Maintainingtheinventorythroughabinationofassetownerinterviews,open-sourcesystemmanagement,andopen-sourcemanagementtools.B、Maintainingtheinventorythroughabinationofdesktopconfiguration,administrationmanagement,andprocurementmanagementtools.C、Maintainingtheinventorythroughabinationofonpremisestorageconfiguration,cloudmanagement,andpartnermanagementtools.D、Maintainingtheinventorythroughabinationofsystemconfiguration,networkmanagement,andlicensemanagementtools.答案:D65.
WhichofthefollowingistheMOSTsignificantkeymanagementproblemduetothenumberofkeyscreated?A、Exponentialgrowthwhenusingsymmetrickeys.B、Exponentialgrowthwhenusingasymmetrickeys.C、Storageofthekeysrequireincreasedsecurity.D、Keysaremoredifficulttoprovisionandrevoke.答案:A66.
AsecurityprofessionalhasreviewedarecentsiteassessmentandhasnotedthataserverroomonthesecondfloorofabuildinghasHeating,Ventilation,andAirConditioning(HVAC)intakesonthegroundlevelthathaveultravioletlightfiltersinstalled,Aero-KFiresuppressionintheserverroom,andpre-actionfiresuppressiononfloorsabovetheserverroom.Whichofthefollowingchangescanthesecurityprofessionalremendtoreduceriskassociatedwiththeseconditions?A、RemovetheultravioletlightfiltersontheHVACintakeandreplacethefiresuppressionsystemontheupperfloorswithadrysystem.B、ElevatetheHVACintakebyconstructingaplenumorexternalshaftoveritandconverttheserverroomfiresuppressiontoapre-actionsystem.C、AddadditionalultravioletlightfilterstotheHVACintakesupplyandreturnductsandchangeserverroomfiresuppressiontoFM-200D、ApplyadditionalphysicalsecurityaroundtheHVACintakesandupdateupperfloorfiresuppressiontoFM-200答案:A67.
WhatistheFIRSTstepinreducingtheexposureofanetworktoInternetControlMessageProtocol(ICMP)basedattacks?A、Implementnetworkaccesscontrollists(ACL).B、Implementanintrusionpreventionsystem(IPS).C、Implementawebapplicationfirewall(WAF).D、Implementegressfilteringattheorganization'snetworkboundary.答案:A68.
Acloudserviceproviderrequiresitscustomerorganizationstoenablemaximumauditloggingforitsdatastorageserviceandtoretainthelogsfortheperiodofthreemonths.Theauditlogginggenehasextremelyhighamountoflogs.WhatistheMOSTappropriatestrategyforthelogretention?A、Keepalllogsinanonlinestorage.B、Keeplastweek'slogsinanonlinestorageandtherestinanofflinestorage.C、Keeplastweek'slogsinanonlinestorageandtherestinanear-linestorage.D、Keepalllogsinanofflinestorage.答案:B69.
WhichofthefollowinggoalsrepresentsamodernshiftinriskmanagementaccordingtoNationalInstituteofStandardsandTechnology(NIST)?A、Provideanimprovedmissionacplishmentapproach.B、Focusonoperatingenvironmentsthatarechanging,evolving,andfullofemergingthreats.C、Enablemanagementtomakewell-informedrisk-baseddecisionsjustifyingsecurityexpenditure.D、Secureinformationtechnology(IT)systemsthatstore,mass,ortransmitorganizationalinformation.答案:B70.
WhyisitimportantthatseniormanagementclearlymunicatestheformalMaximumTolerableDowntime(MTD)decision?A、Toprovideeachmanagerwithprecisedirectiononselectinganappropriaterecoveryalternative.B、Todemonstratetotheboardofdirectorsthatseniormanagementismittedtocontinuity
Recoveryefforts.C、Toprovideaformaldeclarationfromseniormanagementasrequiredbyinternalaudittodemonstratesoundbusinesspractices.D、Todemonstratetotheregulatorybodiesthatthepanytakesbusinesscontinuityseriously.答案:A71.
WhichofthefollowingmethodsprovidestheMOSTprotectionforusercredentials?A、Forms-basedauthentication.B、Self-registration.C、Basicauthentication.D、Digestauthentication.答案:D72.
Employeetraining,riskmanagement,anddatahandlingproceduresandpoliciescouldbecharacterizedaswhichtypeofsecuritymeasure?A、Preventative.B、Management.C、Non-essential.D、Administrative.答案:D73.
Ahospitalhasallowedvirtualprivatenetworking(VPN)accesstoremotedatabasedevelopers.Uponauditingtheinternalconfiguration,thenetworkadministratordiscoveredthatsplit-tunnelingwasenabled.Whatistheconcernwiththisconfiguration?A、Thenetworkintrusiondetectionsystem(NIDS)willfailtoinspectSecureSocketsLayer(SSL)traffic.B、Remotesessionswillnotrequiremulti-layerauthentication.C、Remoteclientsarepermittedtoexchangetrafficwiththepublicandprivatenetwork.D、MultipleInternetProtocolSecurity(IPSec)tunnelsmaybeexploitableinspecificcircumstances.答案:C74.
Whichofthefollowingattacktypescanbeusedtopromisetheintegrityofdataduringtransmission?A、Synchronizationflooding.B、Sessionhijacking.C、Keylogging.D、Packetsniffing.答案:B75.
ASimplePowerAnalysis(SPA)attackagainstadevicedirectlyobserveswhichofthefollowing?A、Magnetism.B、Generation.C、Consumption.D、Staticdischarge.答案:C76.WhatisthebenefitofusingNetworkAdmissionControl(NAC)?A、NAConlysupportsWindowsoperatingsystems(OS).B、NACsupportsvalidationoftheendpoint'ssecurityposturepriortoallowingthesessiontogointoanauthorizedstate.C、NACcanrequiretheuseofcertificates,passwords,orabinationofbothbeforeallowingnetworkadmission.D、Operatingsystem(OS)versionscanbevalidatedpriortoallowingnetworkaccess.答案:B77.
WhichofthefollowingisMOSTappropriatetocollectevidenceofazero-dayattack?A、Honeypot.B、Antispam.C、Antivirus.D、Firewall.答案:A78.
Theacquisitionofpersonaldatabeingobtainedbyalawfulandfairmeansisanexampleofwhatprinciple?A、CollectionLimitationPrinciple.B、OpennessPrinciple.C、PurposeSpecificationPrinciple.D、DataQualityPrinciple.答案:A79.
InwhichprocessMUSTsecuritybeconsideredduringtheacquisitionofnewsoftware?A、Requestforproposal(RFP).B、Implementation.C、Vendorselection.D、Contractnegotiation.答案:A80.
WhichsecurityauditstandardprovidestheBESTwayforanorganizationtounderstandavendor'sInformationSystems(IS)inrelationtoconfidentiality,integrity,andavailability?A、ServiceOrganizationControl(SOC)2.B、StatementonStandardsforAttestationEngagements(SSAE)18.C、StatementonAuditingStandards(SAS)70.D、ServiceOrganizationControl(SOC)1.答案:A81.
Thesecurityoperationscenter(SOC)hasreceivedcredibleintelligencethatathreatactorisplanningtoattackwithmultiplevariantsofadestructivevirus.Afterobtainingasamplesetofthisvirus'variantsandreverseengineeringthemtounderstandhowtheywork,amonalitywasfound.Allvariantsarecodedtowritetoaspecificmemorylocation.Itisdeterminedthisvirusisofnothreattotheorganizationbecausetheyhadtheforesighttoenablewhatfeatureonallendpoints?A、AddressSpaceLayoutRandomization(ASLR).B、TrustedPlatformModule(TPM).C、Virtualization.D、Processisolation.答案:A82.
WhatistheMOSTimportantcriterionthatneedstobeadheredtoduringthedatacollectionprocessofanactiveinvestigation?A、Maintainingthechainofcustody.B、Capturinganimageofthesystem.C、Outliningallactionstakenduringtheinvestigation.D、plyingwiththeorganization'ssecuritypolicy.答案:A83.
Ascanreportreturnedmultiplevulnerabilitiesaffectingseveralproductionserversthataremissioncritical.Attemptstoapplythepatchesinthedevelopmentenvironmenthavecausedtheserverstocrash.WhatistheBESTcourseofaction?A、Mitigatetheriskswithpensatingcontrols.B、Upgradethesoftwareaffectedbythevulnerability.C、Removetheaffectedsoftwarefromtheservers.D、Informmanagementofpossiblerisks.答案:A84.
Afinancialorgani
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2024年度场地转租赁合同格式
- 2024年度专业危险品物流服务合同
- 2024保险销售工作计划(31篇)
- 2024版房产共有权转让合同要点
- 2023年金融信息化项目招商引资方案
- 2024年度建筑施工合同:甲方委托乙方进行建筑施工乙方按照约定完成工程确保项目在2024年度内完工
- 银行贷款合同范本格式
- 2024年度新车型研发合作与许可合同
- 2024年塔吊施工材料供应合同
- 公益课程合同范本
- 静脉留置针操作常见并发症预防及处理课件
- 护士执业变更申请表
- 高中文言文整理使动和意动用法-课件
- 多维自我体像关系调查问卷(MBSRQ)中文修订版及评分方法
- 思明区公开招聘非在编聘用人员报名表
- 计量标准考核规范(JJF1033-2023年)
- Unit 4 Then and Now(Grammar time and Fun time) (教学设计)-2022-2023学年英语六年级上册
- 运用品管圈QCC管理工具消化内科-运用“日间病房”优化科室管理指标PDCA
- 行政诉讼法知到章节答案智慧树2023年湖南师范大学、湖南大学、中南大学、湘潭大学
- 网络信息辨别真伪 课件
- 北教版四年级综合实践下册 第十一课饮料中的学问
评论
0/150
提交评论