1: |
Which of the following types of fire detectors works by means of a photoelectric sensor?
|
2: |
A fire caused by combustible metals would be considered which class of fire?
|
3: |
Which of the following types of water sprinkler systems works by leaving the sprinkler head open and filling the pipe only when a fire has been detected?
|
4: |
Which of the following types of card keys contains rows of copper?
|
5: |
Tony's company manufactures proprietary cellphone-tracking devices. Now that employees will be issued laptops, Tony is concerned about the loss of confidential information if an employee's laptop is stolen. Which of the following represents the best defensive method?
|
6: |
Under what conditions can halon be expected to degrade into toxic compounds?
|
7: |
According to NIST perimeter lighting standards, critical areas should be illuminated to what measurement?
|
8: |
What type of biometric error is used to signify that an authorized user has been denied legitimate access?
|
9: |
In biometrics, the point at which the FAR equals the FRR is known as which of the following?
|
10: |
RSA's SecurID is an example of which of the following?
|
11: |
Which of the following is an example of an SSO technology?
|
12: |
When discussing the security of SSO systems, which of the following is considered a disadvantage?
|
13: |
SNORT is an example of a what?
|
14: |
What type of attack is also known as a race condition?
|
15: |
I/O drivers and utilities are typically found at what protected ring level?
|
16: |
What type of CPU can interleave two or more programs for execution at any one time?
|
17: |
This portion of the CPU performs arithmetic and logical operations on the binary data.
|
18: |
What security model is also known as the Chinese Wall?
|
19: |
What piece of documentation was developed to evaluate standalone systems and is a basis of measurement for confidentiality?
|
20: |
Which level of Orange Book protection is considered mandatory protection?
|
21: |
Which of the following is considered the totality of protection mechanisms within a computer system and is responsible for enforcing security?
|
22: |
Johnny is worried that someone might be able to intercept and decrypt his VoIP phone calls. Which of the following protocols is most closely associated with VoIP?
|
23: |
Which of the following wireless standards uses direct sequence spread spectrum (DSSS) by default?
|
24: |
What is a rogue AP?
|
25: |
Pulse code modulation (PCM) is used to digitize a voice with 8 bits of sampling for transmission on a DS0 line. What is the max rate of encoding for one of these voice channels?
|
26: |
A T1 uses which of the following to multiplex DS0s into a composite T1?
|
27: |
Which of the following focuses on how to repair and restore the data center and information at an original or new primary site?
|
28: |
This type of service is used to provide protection for source code in case the manufacturer declares bankruptcy or goes broke.
|
29: |
Which of the following describes the cooperative effort between the United States and Europe to exchange information about European citizens between European firms and North American parent corporations?
|
30: |
Which of the following best describes an approved type of forensic duplication?
|
31: |
Which of the following best describes the SET protocol?
|
32: |
Which of the following information-management systems uses artificial intelligence?
|
33: |
DNS lookups are typically performed on which of the following protocols and ports?
|
34: |
Bob is worried that the program someone gave him at DEFCON has been altered from the original. Which of the following is a valid technique that Bob can use to verify its authenticity?
|
35: |
Which of the following is not an email-encryption standard?
|
36: |
Which of the following best describes link encryption?
|
37: |
Diameter uses which of the following as a base?
|
38: |
The ACID test is used to describe what?
|
39: |
Which of the following best describes a Fault Resistant Disk Systems (FRDS) system?
|
40: |
Which of the following is a stream cipher?
|
41: |
Which of the following is considered the weakest mode of DES?
|
42: |
Which ethical standard states that "access and use of the Internet is a privilege and should be treated as such by all users"?
|
43: |
Which of the following would be considered the oldest and most well-known software-development method?
|
44: |
Which of the following types of viruses can infect both boot sectors and program files?
|
45: |
HTTPS uses which of the following ports?
|
46: |
Which of the following is considered the oldest type of database system?
|
47: |
The IEEE separates the OSI data link layer into two sublayers. What are they?
|
48: |
What is considered the most current version of wireless cellular technology?
|
49: |
This protocol started as a simplified version of X.25 and is used in packet-switched networks.
|
50: |
802.11 networks are identified by which of the following?
|
51: |
ISO 17799 evolved from what regional standard?
|
52: |
A Common Criteria rating of "Functionally Tested" means the design meets what level of verification?
|
53: |
Which of the following is not addressed by the Clark-Wilson security model?
|
54: |
Which of the following individuals' roles and responsibilities would include the responsibility for maintaining and protecting the company's assets and data?
|
55: |
Which of the following is the proper formula used to calculate ALE?
|
56: |
Which of the following best describes a qualitative assessment?
|
57: |
The facilitated risk assessment process is an example of what?
|
58: |
Classification levels such as confidential and secret are tied to which data classification scheme?
|
59: |
This method of dealing with risk is considered the least prudent course of action.
|
60: |
Your employer is pleased that you have become CISSP certified and would now like you to evaluate your company's security policy. Your boss believes that encryption should be used for all network traffic and that a $50,000 encrypted database should replace the current customer database. Based on what you know about risk management, what should your decision to use encryption and purchase the new database be based on? Choose the most correct answer.
|
The CISSP Cram Sheet
A Note from Series Editor Ed Tittel
About the Author
Acknowledgments
We Want to Hear from You!
Introduction
Self-Assessment
The CISSP Certification Exam
Physical Security
Security-Management Practices
Access-Control Systems and Methodology
System Architecture and Models
Telecommunications and Network Security
Applications and Systems-Development Security
Operations Security
Business Continuity Planning
Law, Investigations, and Ethics
Cryptography
Practice Exam 1
Answers to Practice Exam 1
Practice Exam 2
Answers to Practice Exam 2