欢迎来到天天文库
浏览记录
ID:12496267
大小:86.50 KB
页数:12页
时间:2018-07-17
《cissp操作安全习题》由会员上传分享,免费在线阅读,更多相关内容在行业资料-天天文库。
1、CISSP认证考试培训习题CBKDomain7-运作安全1.OperationsSecurityseekstoprimarilyprotectagainstwhichofthefollowing?A.objectreuseB.facilitydisasterC.compromisingemanationsD.assetthreatsD2.Notifyingtheappropriatepartiestotakeactioninordertodeterminetheextentoftheseverityofanincidentandtoremediatethe
2、incident'seffectsincludes:A.IntrusionEvaluation(IE)andResponseB.IntrusionRecognition(IR)andResponseC.IntrusionProtection(IP)andResponseD.IntrusionDetection(ID)andResponseD3.Whatisthemainissuewithmediareuse?A.DegaussingB.DataremanenceC.MediadestructionD.PurgingB4.Thistypeofcontroli
3、susedtoensurethattransactionsareproperlyenteredintothesystemonce.Elementsofthistypeofcontrolmayincludecountingdataandtimestampingitwiththedateitwasenteredoredited?A.ProcessingControlsB.OutputControlsC.InputControlsA.Input/OutputControlsC1.Whichofthefollowingquestionsislesslikelyto
4、helpinassessingcontrolsoveraudittrails?A.Doestheaudittrailprovideatraceofuseractions?B.Areincidentsmonitoredandtrackeduntilresolved?C.Isaccesstoonlinelogsstrictlycontrolled?D.Isthereseparationofdutiesbetweensecuritypersonnelwhoadministertheaccesscontrolfunctionandthosewhoadministe
5、rtheaudittrail?B2.Whichofthefollowingisthemostreliable,securemeansofremovingdatafrommagneticstoragemediasuchasamagnetictape,oracassette?A.DegaussingB.ParityBitManipulationC.CertificationD.BufferoverflowA3.WhatisthemostsecurewaytodisposeofinformationonaCD-ROM?A.SanitizingB.Physical
6、damageC.DegaussingD.PhysicaldestructionD4.Whichofthefollowingensuresthatsecurityisnotbreachedwhenasystemcrashorothersystemfailureoccurs?A.trustedrecoveryB.hotswappableC.redundancyD.securebootA1.Hardwareavailabilityreportsallowtheidentificationofthefollowingproblemsexceptfor:A.Inad
7、equatetrainingforoperatorsB.ExcessiveoperatingsystemsmaintenanceC.UserdissatisfactionD.InadequatehardwarefacilitiesC2.Whichofthefollowingisnotavalidreasontouseexternalpenetrationservicefirmsratherthancorporateresources?A.Theyaremorecost-effectiveB.TheyofferalackofcorporatebiasC.Th
8、eyusehighlytalentedex-hackersD.Th
此文档下载收益归作者所有