CISSP+2014年最新全真回忆题(2011-2013年)

合集下载

CISSP考试练习(习题卷31)

CISSP考试练习(习题卷31)

CISSP考试练习(习题卷31)说明:答案和解析在试卷最后第1部分:单项选择题,共100题,每题只有一个正确答案,多选或少选均不得分。

1.[单选题]在市售软件包中通常包含哪些功能专为访问控制而设计?A)密码或加密B)文件 加密C)源库 控制D)文件 身份验证2.[单选题](04160) 把字典攻击和暴力破解结合起来的,针对口令的攻击是:A)社会工程B)社会工程C)社会工程D)社会工程3.[单选题]用户需要访问权限,以便查看员工群体的平均工资。

哪种控制会阻止用户获得员工个人的工资?A)限制对预定义 查询的访问B)将数据库分离成一个小麻木的分区,每个分区都有单独的安全 级别C)实施基于角色的访问控制 (RBAC)D)减少出于统计目的访问系统的人数4.[单选题]以下哪一个是使用配置管理的主要原因?A)提供集中 管理B)减少更改次数C)减少升级过程中的错误D)在安全控制方面提供一致性5.[单选题]Robert 负责保护用于处理信用卡信息的系统。

什么样的安全控制框架应该指导他的行动?A)HIPAAB)PCI DSSC)SOXD)GLBA6.[单选题]suspicious code within the operating system?下面哪种病毒检测技术是业界最近采用的,监控可疑代码在操作系统内的执行?A)Behavior blocking行为封锁B)Fingerprint detection指纹探测C)Feature based detection基于特征检测D)Heuristic detection 启发式检测7.[单选题]以下抑制火灾的方法中,哪种方法对环境友好且最适合数据中心?A)惰性气体灭火 系统B)哈龙气体灭火 系统C)干管 洒水器D)湿管 洒水器8.[单选题]以下哪种技术可以最好地防止缓冲区溢出?Which of the following techniques BEST prevents buffer overflows?A)边界和边缘偏移Boundary and perimeter offsetB)字符集编码Character set encodingC)代码审计Code auditingD)变量类型和位长Variant type and bit length9.[单选题]下面哪一个模型实际上是一个包含模型软件开发的模型的元模型?A)瀑布模型。

2014年下半年(11月)信息系统项目管理师真题(论文)

2014年下半年(11月)信息系统项目管理师真题(论文)

2014年下半年(11月)信息系统项目管理师真题(论文)试题一论多项目的资源管理企业常面临多项目管理的问题,项目越多,管理就越复杂,多项目的范围既包括相关联的多个项目,也包括相互没有关联的多个项目,多项目管理区别于单个项目管理,已成为一种新的管理模式,它需对所有涉及的项目进行评估、计划、组织、执行与控制,如何解决多项目管理中人力资源、项目资金、工具、设备及其他资源的冲突问题成为多项目管理的关键。

请以“多项目的资源管理”为题,分别从以下几个方面进行论述:1、简要叙述你同时管理的多个信息系统工程项目,或你所在组织中同时实施的多个信息系统工程项目的基本情况(包括多项目之间的关系,项目的背景、目的、周期、交付产品等相关信息,以及你在其中担任的主要工作等)2、结合你参与过的项目,论述如何进行多项目的资源管理3、结合实际管理中遇到的问题,简要叙述多项目资源管理的效果以及经验或教训。

试题二论项目的进度管理项目时间管理包括使项目按时完成所必须的管理过程。

项目时间管理又叫进度管理,进度安排的准确程度可能比成本估计的准确程度更多重要,进度计划不能得到实施会导致市场机会的丧失或者用户不满意,并且成本也会增加,因此在考虑进度安排时要把人员的工作量与花费的时间联系起来,合理分配工作量,利用进度安排的有效分析方法来严密监视项目的进展情况,以使项目的进度不致拖延。

请以“项目的进度管理”为题,分别从以下几个方面进行论述:1、概要叙述你参与管理过的信息系统项目(包括项目的背景、项目规模、发起单位、目的、项目内容、组织结构、项目周期、交付的产品等)2、论述你对进度管理的认识,可围绕但不局限于以下要点论述。

(1)项目进度管理的基本过程(2)进度管理与范围管理的关系3、请结合论文中所提高的项目,介绍你如何对其进度进行管理(可结合进度管理的工具和方法叙述具体做法),并总结你的心得体会。

【拓展资料】信息系统项目管理师,属于计算机技术与软件(高级)专业技术资格。

CISSP考试练习(习题卷9)

CISSP考试练习(习题卷9)

CISSP考试练习(习题卷9)第1部分:单项选择题,共100题,每题只有一个正确答案,多选或少选均不得分。

1.[单选题]在业务连续性计划 (BCP) 的设计中编写计划程序的主要目的是什么?What is the MAIN purpose for writing planned procedures in the design of Business Continuity Plans (BCP)?A)尽量减少失败的风险。

Minimize the risk of failureB)消除不必要的决策。

Eliminate unnecessary decision making.C)建立责任线。

Establish lines of responsibility.D)加速恢复过程。

Accelerate the recovery process.答案:A解析:2.[单选题]以下哪项是正式信息分类计划的主要优势?A)一个。

它最大限度地减少了系统日志记录要求。

B)它支持风险评估。

C)它减少了资产漏洞。

D)它推动了审计流程。

答案:B解析:3.[单选题]Which of the following is MOST critical in a contract in a contract for data disposal on a hard drive with a third party? 在与第三方签订的硬盘数据处理合同中,以下哪项是最关键的?A)Authorized destruction times授权销毁时间B)Allowed unallocated disk space允许的未分配磁盘空间C)Amount of overwrites required所需覆盖量D)Frequency of recovered media恢复介质的频率答案:C解析:4.[单选题]When performing an investigation with the potential for legal action, what should be the analyst's FIRST consideration? 当进行可能采取法律行动的调查时,分析员应首先考虑什么?A)Chain-of-custody产销监管链B)Authorization to collect收款授权书C)Court admissibility法院受理D)Data decryption数据解密答案:A解析:5.[单选题]Between which pair of Open System Interconnection(OSI)Reference Model layers are routers used as a communications device? 路由器在哪对开放系统互连(OSI)参考模型层之间用作通信设备?A)Transport and Session传输层和会话层B)Data-Link and Transport数据链路层和传输层C)Network and Session网络层和会话层D)Physical and Data-Link物理层和数据链路层答案:B解析:6.[单选题]RAID 磁盘名称等级 1 将数据从一个磁盘组到一个磁盘组A)将数据复制到另一种磁盘或轴承上。

CISSP考试练习(习题卷3)

CISSP考试练习(习题卷3)

CISSP考试练习(习题卷3)说明:答案和解析在试卷最后第1部分:单项选择题,共100题,每题只有一个正确答案,多选或少选均不得分。

1.[单选题]你认为下列哪一个是最安全的身份验证方式?A)生物识别B)密码C)令牌D)票证授予2.[单选题]Kevin 正在为他的组织制定持续的安全监控策略。

在确定评估和监测频率时,通常不使用以下哪一项?A)威胁情报B)系统分类/影响级别C)安全控制操作负担D)组织风险承受能力3.[单选题]Brenda 的组织最近完成了对竞争对手公司的收购。

以下哪一项任务最不可能成为收购期间处理的组织流程的一部分?Brenda’s organization recently completed the acquisition of a competitor firm. Which one of the following tasks would be LEAST likely to be part of the organizational processes addressed during the acquisition?A)安保职能的整合Consolidation of security functionsB)安全工具的集成Integration of security toolsC)知识产权保护Protection of intellectual propertyD)安全政策文件Documentation of security policies4.[单选题]匿名者联盟使用的低轨离子炮(LOIC)攻击工具利用众多家用PC攻击其选定的目标。

这是一个什么类型的网络攻击例子?A)DdoSB)电离C)僵尸部落D)泪滴5.[单选题]A software developer installs a game on their organization-provided smartphone. Uponinstalling the game, the software developer is prompted to allow the game access to call logs, Short Message Service(SMS)messaging, and Global Positioning System(GPS)location data. What has the game MOST likely introduced to the smartphone? 软件开发人员在其组织提供的智能手机上安装游戏。

cissp考试回忆题集

cissp考试回忆题集

1.状态检测防火墙什么时候实施规则变更备份?A.防火墙变更之前B.防火墙变更之后C.作为完全备份的一部分D.作为增量备份的一部分2.FTP的风险?A.没有目标认证B.明文传输3.VOIP在语音通信过程当中,弱点?A.没有目标认证B.没有源认证4.(1) 假如:T为IDS控制成本费用200000美元E为每年恢复数据节省费用50000美元R是为实施控制措施之前的每年恢复费用100000美元问:实际投资回报为:A.-50000B.-100000C.100000D.150000A (投资回报就是控制前-控制后, 投资回报负值就是省了多少,正值就是赚了多少)(2) 问年度预期损失ALE怎么计算:A.(R+E)/TB.(R-E)+TC.(R-T)*ED.T/(R-E)5.ipsec隧道模式下的端到端加密,ip包头A.加密,数据不加密B.和数据一起加密C.不加密,数据加密6.实施一个安全计划,最重要的是:A 获取安全计划所需的资源B 与高层管理者访谈7.安全要求属于:A.ST安全目标B.PPC.TOE8.TOE属于A.CCB.可信计算机9.公司进行信息安全评估,打算把所有应用程序维护外包,问对服务提供商什么是最重要的?A.BIAB.风险管理C.SLA10.公司运维外包服务,问什么时候跟服务提供商确定安全要求?A.合同谈判B.合同定义11.外部审计师违反了公司安全要求,问惩罚判定来源:A.公司安全要求B.外部审计公司要求C.双方协议12.公司实施一个纵深防御政策,问由保护逐级增加的层次设计?A.边界场地出入口办公区计算机机房B.围墙场地出入口计算机机房办公区域13.802.1 b具有什么功能?共享密钥14.SSL协议双向认证,部分使用,除了客户端验证服务器,还有?A.服务器对客户端自我验证B.客户端对服务器自我验证15.实现机密性,使用以下哪个算法?(DES不安全.SHA是散列函数,RSA速度慢,当然前提这道题目得有条件,如加密消息时)A.DESB.SHA-1C.AESD.RSA16.以下哪项可以实现数字签名.完整性?A.RSAB.DSA17.同步.异步令牌同步令牌18.在PKI中哪个组件负责现实世界身份/“主体身份”(real world identity)与公钥证书绑定?A.注册机构B.根证书颁发机构C.中间证书颁发机构19.是怎么预防电缆产生的电磁辐射。

2014年下半年信息系统项目管理师真题(下午案例分析)

2014年下半年信息系统项目管理师真题(下午案例分析)

全国计算机技术与软件专业技术资格(水平)考试2014年下半年信息系统项目管理师真题(下午案例分析)(考试时间13:30~15:00 共90分钟)【第1题】某项目由A、B、C、D、E、F、G、H、I、J共10个工作包组成,项目计划执行时间为5个月。

在项目执行到第3个月末的时候,公司对项目进行了检查,检查结果如下表所示(假设项目工作量在计划期内均匀分布)。

【问题1】(4分)计算到目前为止,项目的PV、EV分别为多少?【问题2】(11分)假设该项目到目前为止已支付80万元,请计算项目的CPI和SPI,并指出项目整体的成本和进度执行情况以及项目中哪些工作包落后于计划进度,哪些工作包超前于计划进度【问题3】(10分)如果项目的当前状态代表了项目未来的执行情况,预测项目未来的结束时间和总成本。

并针对项目目前的状况,提出相应的应对措施某信息系统集成公司的项目经理李工承接了一家大型国有企业(甲方)的内部网络建设项目,接到该任务后李工组织项目组的相关人员对该项目工作进行了仔细分析,李工根据分析结果并结合自身的项目管理经验,得出该项目的总工作量为60人月,计划工期6个月。

这样的成本估算和进度计划也正好能够满足甲方的合同要求,项目的相关计划也得到了公司内部和甲方的认可。

项目开始一个月之后,李工的直接领导,公司的项目总监找到李工说,由于公司其他项目出现了问题,因此要求李工要在5个月内完成项目,同时作为补偿,可以为项目增添两名开发人员。

李工很为难,他没有当时就答应项目总监的要求,而是说考虑几天再给项目总监答复。

李工在之后的几天中,一方面在团队内部召开了几次会议,广泛听取大家的意见,同时也与公司出现问题项目的项目经理进行了沟通,基本明白了另外一个项目存在的问题和当前的状况,李工提出了自己的解决方案,将项目分为两部分来完成,第一部分任务是基本花费4个半月的时间,开发客户当前最重要和急需的系统;第二部分是计划历时2个月,开发客户需求的另外的功能。

CISSP考试练习(习题卷17)

CISSP考试练习(习题卷17)

CISSP考试练习(习题卷17)说明:答案和解析在试卷最后第1部分:单项选择题,共100题,每题只有一个正确答案,多选或少选均不得分。

1.[单选题]攻击者最有可能以以下哪项为目标来获得对系统的特权访问?A)一个。

写入系统资源的程序B)写入用户目录的程序C)包含敏感信息的日志文件D)包含系统调用的日志文件2.[单选题]组织进行安全审计的主要目的是什么? What is the PRIMARY purpose for an organization to conduct a security audit?A)确保组织遵守明确定义的标准To ensure the organization is adhering to a well-defined standardB)确保组织应用安全控制来减轻已识别的风险To ensure the organization is applying security controls to mitigate identified risksC)确保组织有效地配置信息系统To ensure the organization is configuring information systems efficientlyD)确保组织记录调查结果To ensure the organization is documenting findings3.[单选题]Joanna是她所在组织的CISO,在她的安全运营监督角色中,她希望确保对与安全相关的变更进行管理监督。

在大多数组织中,她应该关注什么系统来跟踪此类数据?A)SIEM系统The SIEM systemB)IPS系统The IPS systemC)CMS工具The CMS toolD)ITSM工具The ITSM tool4.[单选题]功能安全测试在系统开发生命周期SDLC的哪个阶段最为关键?A)操作/维护B)实施C)获取/开发D)初始化5.[单选题]组织计划购买由小型供应商开发的自定义软件产品,以支持其商业模式。

CISSP 2019年中文全真回忆题(2017-2019年)

CISSP 2019年中文全真回忆题(2017-2019年)

CISSP考试历年真题回忆(2017-2019)2019.07.15 Updated 说明1:所有真题均为考生考后回忆汇总,不代表ISC2官方,题目表述及选项和实际可能存在偏差,请考生建立在理解基础上查漏补缺,切勿背题。

说明2:所有答案均为参考答案,仅供参考,ISC2从不公布真题和答案,如有不同意见,欢迎一起交流。

1、应用程序安全的主要目标是确保:A、该软件可以有效防范黑客和外部攻击渗透;B、数据的机密性、完整性与可用性;C、软件和用户活动的可追溯性;D、防止数据被盗。

2、下列哪个架构说明:“在计算机内存中数据和编码标识之间没有内在的不同”,这可能导致注入攻击,其特点是执行数据中指令:A、Von NeumannB、Linus’ LawC、Clark and WilsonD、Bell LaPadula3、一个二进数代码重要特征是它:A、基于沙盒,增加了固有的安全性;B、自动化地管理内存操作;C、更难以进行逆向工程;D、比解释型语言更快。

4、同时争夺共享资源的两个进程协作,以这样的方式他们违反了系统的安全策略,通常被称为:A、隐蔽通道;B、拒绝服务;C、公开通道;D、对象重用。

5、通过任何强制或伪装成一个合法的实体影响他人去披露关于他们自己或他们的组织的敏感信息,这种通常被称为什么?A、垃圾箱;B、肩窥;C、网络钓鱼;D、社会工程。

6、一个组织的服务器审核日志表明,一个在上午被解雇的员工仍然可以访问下午内部网络上他的系统中的某些敏感信息。

日志还表明他被解雇之前员工已经成功登录,但在他解雇之前没有注销的记录。

这是什么类型的攻击?A、检查时间/使用时间(TOC/TOU)B、罗技炸弹C、远程访问木马(RATS)D、网络钓鱼7、针对缓冲区溢出攻击最有效的防御手段是:A、禁止动态的查询结构;B、边界检查C、编码输出D、强制内存垃圾收集8、基于角色的访问控制,以保护数据库中的数据机密性可以由以下哪项技术来加以实现?A、视图B、加密C、散列D、屏蔽9、下列那一项用于探测和纠正错误,以便于在网络上传输的完整性和机密性被维持,且可组织非授权的链路拦截。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

CISSP 2011-2013 Brain Dumps(本真題回憶建議答案僅供參考)PART I2014.01.03 Updated Single sign-on systems have a main strength and a main weakness. Choose the best answer exposing this strength and weakness.A. Users do not need to remember multiple passwords, but access to many systems can be obtained by cracking only one password, making it less secure.B. They allow the user to make use of very simple passwords; it puts undue burden on IT to administer the system.C. They force the user to make use of stronger passwords; it makes it easier for users but encourages little attention to security policies.D. They remove the burden of remembering multiple passwords from users; users need to type the same password when confronted with authentication requests for different resources.建議答案:AYour office is implementing an access control policy based on decentralized administration, which is controlled directly by the owners and creators of files. What is the major advantage and disadvantage of such an approach?A. It puts access control into the hands of those most accountable for the information, but requires security labels for enforcement.B. It puts access control into the hands of those most accountable for the information, but leads to inconsistencies in procedures and criteria.C. It puts access control into the hands of IT administrators, but leads to procedures and criteria that are too rigid and inflexible.D. It puts access control into the hands of IT administrators, but forces them to overly rely upon the file owners to implement the access controls IT puts in place.建議答案:BMost operating systems and applications allow for administrators to configure the data that will be captured in audit logs for security purposes. Which of the following is the least important item to be captured in audit logs?A. System performance output dataB. Last user who accessed the deviceC. Number of unsuccessful access attemptsD. Number of successful access attempts建議答案:AWhat is the difference between a session and a permanent cookie?A. Permanent cookies are stored in memory and session cookies are stored on theB. Session cookies are stored in memory and permanent cookies are stored on the hard driveC. Sensitive information should be held in permanent cookies, not sessionD. Session cookies are not erased when a computer is shut down建議答案:BMonica is the IT director of a large printing press. She has been made aware of several attempts of brute force password attacks within the past weeks. Which of the following reactions would suit Monica best?A. Reduce the clipping levelB. Find a more effective encryption mechanismC. Increase employee awareness through warning banners and trainingD. Implement spyware protection that is integrated into the current antivirus product建議答案:AWhy are biometric systems considered more accurate than many of the other types of authentication technologies in use today?A. They are less accurateB. They are harder to circumvent than other mechanismsC. Biometric systems achieve high CER valuesD. They have less Type I errors than Type II errors建議答案:BWhich of the following is UNTRUE of a database directory based on the X.500 standard?A. The directory has a tree structure to organize the entries using a parent-child configuration.B. Each entry has a unique name made up of attributes of a specific object.C. The attributes used in the directory are dictated by the defined schema.D. The unique identifiers are called fully qualified names.建議答案:DYou are comparing host based IDS with network based ID. Which of the following will you consider as an obvious disadvantage of host based IDS?A. It cannot analyze encrypted information.B. It is costly to remove.C. It is affected by switched networks.D. It is costly to manage.建議答案:DWhich of the following best describes the difference between content and context access control?A. Content access control is based on the sensitivity of the data and context access control is based on the prior operations.B. Content access control is based on the prior operations and context access control is based on the sensitivity of the data.C. Context pertains to the use of database views and content access control pertains to tracking the requestor 抯previous access requests.D. Context pertains to the use of the DAC model and content pertains to the use of the MAC model.建議答案:AWhy would an Ethernet LAN in a bus topology have a greater risk of unauthorized disclosure than switched Ethernet in a hub-and-spoke or star topology?A. IEEE 802.5 protocol for Ethernet cannot support encryption.B. Ethernet is a broadcast technology.C. Hub and spoke connections are highly multiplexed.D. TCP/IP is an insecure protocol.建議答案:BHow does RADIUS allow companies to centrally control remote user access?A. Once a user is authenticated a profile is generated based on his security token, which outlines what he is authorized to do within the network.B. Once a user is authenticated a pre-configured profile is assigned to him, which outlines what he is authorized to do within the network.C. Once the RADIUS client authenticates the user, the RADIUS server assigns him a pre-configured profile.D. Once the RADIUS client authenticates the user, the client assigns the user a pre-configured profile.建議答案:BTo support legacy applications that rely on risky protocols (e.g,, plain text passwords), which one of the following can be implemented to mitigate the risks on a corporate network?A. Implement strong centrally generated passwords to control use of the vulnerable applications.B. Implement a virtual private network (VPN) with controls on workstations joining the VPN.C. Ensure that only authorized trained users have access to workstations through physical access control.D. Ensure audit logging is enabled on all hosts and applications with associated frequent log reviews.建議答案:BIn the days before CIDR (Classless Internet Domain Routing), networks were commonly organized by classes. Which of the following would have been true of a Class C network?A. The first bit of the ip address would be set to zeroB. The first bit of the ip address would be set to one and the second bit set to zeroC. The first two bits of the ip address would be set to one, and the third bit set to zeroD. The first three bits of the ip address would be set to one建議答案:CTACACS+ uses the TCP transport protocol. RADIUS only encrypts the user's password as it is being transmitted from the RADIUS client to the RADIUS server. Other information, as in the username, accounting, and authorized services, are passed in cleartext. TACACS+ encrypts all of this information between the client and the server and uses the UDP protocol. QUESTION 7 What are the purposes of Attribute Value Pairs and how do they different from RADIUS and Diameter?A. AVPs are the constructs that outline how two entities will communicate. Diameter has many more AVPs, which allow for the protocol to have more capabilities than RADIUS.B. AVPs are the protocol parameters used between communicating entities. Diameter has less AVPs, which allow for the protocol to have more capabilities than RADIUS.C. AVPs are the security mechanisms that provide confidentiality and integrity for data being passed back and forth between entities. Diameter has many more AVPs, which allow for the protocol to have more security capabilities than RADIUS.D. AVPs are part of the TCP protocol. Diameter uses AVPs, because it uses TCP and RADIUS uses UDP.建議答案:AIn what way can violation clipping levels assist in violation tracking and analysis?A. Clipping levels set a baseline for normal user errors, and violations exceeding that threshold will be recorded for analysis of why the violations occurredB. Clipping levels enable a security administrator to customize the audit trail to record only those violations which are deemed to be security relevantC. Clipping levels enable the security administrator to customize the audit trail to record only actions for users with access to usercodes with a privileged statusD. Clipping levels enable a security administrator to view all reductions in security levels which have been made to usercodes which have incurred violations建議答案:AAs head of sales, Jim is the information owner for the sales department. Which of the following is not Jim's responsibility as information owner?A. Assigning information classificationsB. Dictating how data should be protectedC. Verifying the availability of dataD. Determining how long to retain data建議答案:CWhich of the following correctly describe Role based access control?A. It allows you to specify and enforce enterprise-specific security policies in a way that maps to your user profile groups.B. It allows you to specify and enforce enterprise-specific security policies in a way that maps to your organizations structure.C. It allows you to specify and enforce enterprise-specific security policies in a way that maps to your ticketing system.D. It allows you to specify and enforce enterprise-specific security policies in a way that maps to your ACL.建議答案:BWhat is a Land attack and what type of IDS can identify it based on its pattern and not behavior?A. Header has the same source and destination address and can be identified by a statisticalanomaly-based IDS.B. Header has no source and destination addresses and can be identified by a signature-based IDS.C. Header has the same source and destination address and can be identified by a traffic-based IDS.D. Header has the same source and destination address and can be identified by asignature-based IDS.建議答案:DWithin the Open Systems Interconnection (OSI) Reference Model, authentication addresses the need for a network entity to verify bothA. The identity of a remote communicating entity and the authenticity of the source of the data that are received.B. The authenticity of a remote communicating entity and the path through which communications Are received.C. The location of a remote communicating entity and the path through which communications Are received.D. The identity of a remote communicating entity and the level of security of the path through Which data are received.建議答案:AGeorge is responsible for setting and tuning the thresholds for his company 抯behavior-based IDS. Which of the following outlines the possibilities of not doing this activity properly?A. If the threshold is set too low, non-intrusive activities are considered attacks (false positives). If the threshold is set too high, then malicious activities are not identified (false negatives).B. If the threshold is set too low, non-intrusive activities are considered attacks (false negatives). If the threshold is set too high, then malicious activities are not identified (false positives).C. If the threshold is set too high, non-intrusive activities are considered attacks (false positives). If the threshold is set too low, then malicious activities are not identified (false negatives).D. If the threshold is set too high, non-intrusive activities are considered attacks (false positives). If the threshold is set too high, then malicious activities are not identified (false negatives).建議答案:AOrganizations that implement two-factor authentication often do not adequately plan. One result of this is:a. Some users will lose their tokens, smart cards, or USB keysb. Some users will store their tokens, smart cards, or USB keys with their computers, thereby defeating one of the advantages of two-factor authenticationc. Users will have trouble understanding how to use two-factor authenticationd. The cost of implementation and support can easily exceed the cost of the product itself建議答案:DSteven's staff has asked for funding to implement technology that provides Mobile IP. Which of the following would be a reason for employing this type of technology? A. Employees can move from one network to another B. Peer-to-peer networks would not be allowed C. Security staff could carry out sniffing D. Users would not be allowed to move their wireless devices and still stay connected to the network建議答案:AOne reason an organization would consider a distributed application is:A. Some components are easier to operateB. Distributed applications have a simpler architecture than other types of applicationsC. Some application components are owned and operated by other organizationsD. Distributed applications are easier to secure建議答案:CAn organization is located in an area that experiences frequent power blackouts. What will the effect of an electric generator be in this circumstance?A. The organization will have a continuous supply of electric power.B. The organization will have to establish fuel supply contracts with at least two fuel suppliers.C. Electric utility blackouts will result in short electric power outages for the organization.D. An electric generator will be of no help in this situation.建議答案:CA resource server contains an access control system. When a user requests access to an object, the system examines the permission settings for the object and the permission settings for the user, and then makes a decision whether the user may access the object. The access control model that most closely resembles this is:A. Mandatory access control (MAC)B. Discretionary access control (DAC)C. Non-interferenceD. Role based access control (RBAC)建議答案:AA security manager is setting up resource permissions in an application. The security manager has discovered that he can establish objects that contain access permissions, and then assign individual users to those objects. The access control model that most closely resembles this is:a. Access matrixb. Mandatory access control (MAC)c. Discretionary access control (DAC)d. Role based access control (RBAC)建議答案:DA security officer has declared that a new information system must be certified before it can be used. This means:a. The system must be evaluated according to established evaluation criteriab. A formal management decision is required before the system can be usedc. Penetration tests must be performed against the systemd. A code review must be performed against the system建議答案:AA computer running the Windows operating system has nearly exhausted available physical memory for active processes. In order to avoid exhausting all available memory, what should the operating system begin doing?a. Swappingb. Pagingc. Killing old processesd. Running the garbage collector建議答案:BA network engineer who is examining telecommunications circuits has found one that is labeled as a DS-1. What is the maximum throughput that may be expected from this circuit?a. Approximately 7,000k chars/secb. Approximately 56k bits/secc. Approximately 170k chars/secd. Approximately 1,544M bits/sec建議答案:CA security assessment discovered back doors in an application, and the security manager needs to develop a plan for detecting and removing back doors in the future. The most effective countermeasures that should be chosen are:a. Application firewallsb. Source code controlc. Outside code reviewsd. Peer code reviews建議答案:CAn organization’s data classification policy includes handling procedures for data at each level of sensitivity. The IT department backs up all data onto magnetic tape, resulting in tapes that contain data at all levels of sensitivity. How should these backup tapes be handled?a. According to procedures for the lowest sensitivity levelb. According to procedures for the highest sensitivity levelc. According to procedures in between the lowest and highest sensitivity levelsd. Data handling procedures do not apply to backup media, only original media建議答案:BThe purpose of the Diffie-Hellman key exchange protocol is:a. To decrypt a symmetric encryption keyb. To encrypt a symmetric encryption keyc. To permit two parties who have never communicated to establish public encryption keysd. To permit two parties who have never communicated to establish a secret encryption key建議答案:DVoice recognition as a biometric authentication method is difficult to measure because:a. Many factors, including current health and respiration rate, make sampling difficultb. Computers are not yet fast enough to adequately sample a voice printc. Voice recognition does not handle accents welld. Impatience changes voice patterns, which leads to increased False Reject Rates建議答案:AThere are four ways of dealing with risk. In the graphic that follows, which method is missing and what is the purpose of this method?A. Risk transference. Share the risk with other entities.B. Risk reduction. Reduce the risk to an acceptable level.C. Risk rejection. Accept the current risk.D. Risk assignment. Assign risk to a specific owner.建議答案:AWhich of the following is NOT a good password deployment guideline?A. Passwords must not be the same as user id or login id.B. Passwords must be changed at least once every 60 days, depending on your environment.C. Password aging must be enforced on all systems.D. Password must be easy to memorize.建議答案:DWith Java, what can be embedded in a web browser, allowing programs to be executed as they are downloaded from the World Wide Web?A. JVMB. BytecodeC. InterpreterD. Just-in-time compiler建議答案:BWhich is NOT true about Covert Channel Analysis?A. It is an operational assurance requirement that is specified in the Orange Book.B. It is required for B2 class systems in order to protect against covert storage channels.C. It is required for B2 class systems to protect against covert timing channels.D. It is required for B3 class systems to protect against both covert storage and covert timing channels.建議答案:CThe SEI Software Capability Maturity Model is based on the premise that:A. Good software development is a function of the number of expert programmers in the organization.B. The maturity of an organizationês software processes cannot be measured.C. The quality of a software product is a direct function of the quality of its associated software development and maintenance processes.D. Software development is an art that cannot be measured by conventional means.建議答案:CIn the legal field, there is a term that is used to describe a computer system so that everyone can agree on a common definition. The term describes a computer for the purposes of computer security as çany assembly of electronic equipment, hardware, software and firmware configured to collect, create, communicate, disseminate, process, store and control data or information.éThis definition includes peripheral items such as keyboards, printers, and additional memory. The term that corresponds to this definition is:A. A central processing unit (CPU)B. A microprocessorC. An arithmetic logic unit (ALU)D. An automated information system (AIS)建議答案:DWhat is the purpose of polyinstantiation?A. To restrict lower-level subjects from accessing low-level informationB. To make a copy of an object and modify the attributes of the second copyC. To create different objects that will react in different ways to the same inputD. To create different objects that will take on inheritance attributes from their class建議答案:BIn addition to ensuring that changes to the computer system take place in an identifiable and controlled environment, configuration management provides assurance that future changes:A. The application software cannot bypass system security features.B. Do not adversely affect implementation of the security policy.C. To do the operating system are always subjected to independent validation and verification.D. In technical documentation maintain an accurate description of the Trusted Computer Base. 建議答案:BWhich general TCSEC security class category describes that mandatory access policies be enforced in the TCB?A. AB. BC. CD. D建議答案:BAnother type of artificial intelligence technology involves genetic algorithms. Genetic algorithms are part of the general class known as:A. Neural networksB. Suboptimal computingC. Evolutionary computingD. Biological computing建議答案:CWhich of the following items BEST describes the standards addressed by Title II, Administrative Simplification, of the Health Insurance Portability and Accountability Act (U.S.Kennedy-Kassebaum Health Insurance and Portability Accountability Act -HIPAA-Public Law 104-19)?A. Transaction Standards, to include Code Sets; Unique Health Identifiers; Security and Electronic Signatures and PrivacyB. Transaction Standards, to include Code Sets; Security and Electronic Signatures and PrivacyC. Unique Health Identifiers; Security and Electronic Signatures and PrivacyD. Security and Electronic Signatures and Privacy建議答案:AWhich media control below is the BEST choice to prevent data remanence on magnetic tapes or floppy disks?A. Overwriting the media with new application dataB. Degaussing the mediaC. Applying a concentration of hydriodic acid (55% to 58% solution) to the gamma ferric oxide disk surfaceD. Making sure the disk is re-circulated as quickly as possible to prevent object reuse建議答案:BIn which way does a Secure Socket Layer (SSL) server prevent a "man-in-the-middle" attack?A. It uses signed certificates to authenticate the server's public key.B. A 128 bit value is used during the handshake protocol that is unique to the connection.C. It uses only 40 bits of secret key within a 128 bit key length.D. Every message sent by the SSL includes a sequence number within the message contents. 建議答案:AYou are running a packet sniffer on a network and see a packet with a long string of long string of "90 90 90 90...." in the middle of it traveling to an x86-based machine. This could be indicative of what?A. Over-subscription of the traffic on a backboneB. A source quench packetC. a FIN scanD. A buffer overflow建議答案:CWhich of the following statements pertaining to air conditioning for an information processing facility is correct?A. The AC units must be controllable from outside the areaB. The AC units must keep negative pressure in the room so that smoke and other gases are forced out of the roomC. The AC units must be n the same power source as the equipment in the room to allow for easier shutdownD. The AC units must be dedicated to the information processing facilities建議答案:DWhich of the following correctly describe "good" security practice?A. Accounts should be monitored regularly.B. You should have a procedure in place to verify password strength.C. You should ensure that there are no accounts without passwords.D. All of the choices.建議答案:DIn Unix, which file is required for you to set up an environment such that every used on the other host is a trusted user that can log into this host without authentication?A. /etc/shadowB ./etc/host.equivC. /etc/passwdD. None of the choices.建議答案:BWhich of the following would best describe the difference between white-box testing andblack-box testing?A. White-box testing is performed by an independent programmer teamB. Black-box testing uses the bottom-up approachC. White-box testing examines the program internal logical structureD. Black-box testing involves the business units建議答案:CWhich question is NOT true concerning Application Control?A. It limits end users use of applications in such a way that only particular screens are visibleB. Only specific records can be requested choiceC. Particular uses of application can be recorded for audit purposesD. Is non-transparent to the endpoint applications so changes are needed to the applications involved建議答案:DWhich one of the following control steps is usually NOT performed in data warehousing applications?A. Monitor summary tables for regular use.B. Control meta data from being used interactively.C. Monitor the data purging plan.D. Reconcile data moved between the operations environment and data warehouse.建議答案:ANormalizing data within a database includes all of the following except which?A. Eliminating repeating groups by putting them into separate tablesB. Eliminating redundant dataC. Eliminating attributes in a table that are not dependent on the primary key of that tableD. Eliminating duplicate key fields by putting them into separate tables建議答案:DWhich of the following statements pertaining to RADIUS is incorrect?A. A RADIUS server can act as a proxy server, forwarding client requests to other authentication domains.B. Most of RADIUS clients have a capability to query secondary RADIUS servers for redundancyC. Most RADIUS servers have built-in database connectivity for billing and reporting purposesD. Most RADIUS servers can work with DIAMETER servers.建議答案:DA database administrator (DBA) is responsible for carrying out security policy, which includes controlling which users have access to which data. The DBA has been asked to make just certain fields in some database tables visible to some new users. What is the best course of action for the DBA to take?A. Implement column-based access controlsB. Export the table to a data warehouse, including only the fields that the users are permitted to seeC. Clone the table, including only the fields that the users are permitted to seeD. Create a view that contains only the fields that the users are permitted to see建議答案:DAn organization that is building a disaster recovery capability needs to reengineer its application servers to meet new recovery requirements of 40-hour RPO and 24-hour RTO. Which of the following approaches will best meet this objective?A. Active/Passive server cluster with replicationB. Tape backup and restore to a hot siteC. Tape backup and restore to a cold siteD. Server cluster with shared storage建議答案:AWhich of the following statements pertaining to RADIUS is incorrect?A. A RADIUS server can act as a proxy server, forwarding client requests to other authentication domains.B. Most of RADIUS clients have a capability to query secondary RADIUS servers for redundancyC. Most RADIUS servers have built-in database connectivity for billing and reporting purposesD. Most RADIUS servers can work with DIAMETER servers.建議答案:DWhy is it important to understand the cost of downtime of critical business processes?A. Management will be able to make decisions about the cost of mitigating controls and contingency plansB. Management will be able to determine which processes are the most criticalC. Management will be able to establish a training budgetD. Management will be able to compare recovery costs with those in similar organizations建議答案:AWhat is the PRIMARY reason that reciprocal agreements between independent organizations for backup processing capability are seldom used?A. Lack of successful recoveries using reciprocal agreements.B. Legal liability of the host site in the event that the recovery fails.C. Dissimilar equipment used by disaster recovery organization members.D. Difficulty in enforcing the reciprocal agreement.建議答案:D。

相关文档
最新文档