CISSP操作安全习题
CISSP考试练习(习题卷23)

CISSP考试练习(习题卷23)第1部分:单项选择题,共100题,每题只有一个正确答案,多选或少选均不得分。
1.[单选题]哪些美国政府分类标签适用于一旦披露可能对国家安全造成严重损害并要求分类机构能够描述或识别将造成的损害的信息?A)机密B)秘密C)机密D)绝密答案:B解析:2.[单选题]在IKE / IPsec因特网密钥交换协议/网络网际安全协议中,关于预共享密钥身份验证,哪一项不是正确的?A)预共享密钥身份验证通常基于简单的密码。
B)需要一个PKI公钥基础设施来工作。
C)只需要一个对所有VPN连接的预共享密钥。
D)对庞大用户群体的昂贵的密钥管理。
答案:B解析:3.[单选题]互联网通常被称为一个全球的网络是由于:A)端点网络和互联网提供商覆盖全球B)限制网络和互联网提供商覆盖全球C)私有网络和互联网提供商覆盖全球D)公有网络和互联网提供商覆盖全球答案:D解析:<p>Internet It specifically refers to the global network of public networks and Internet Service Providers (ISPs) throughout the world.</p>4.[单选题]以下哪一项可能导致对凭据管理系统的拒绝服务 (DoS) 攻击?A)延迟撤销或销毁 凭据B)修改证书 撤销 名单C)未经授权的续订或 重新发行D)退役后令牌使用答案:B解析:5.[单选题]以下哪一项被认为是防止电子邮件欺骗的最佳做法?A)垃圾邮件过滤B)加密 签名C)统一资源定位器 (URL) 过滤D)反向域名服务 (DNS) 查找答案:B解析:the adopting organization?A)数据分类Data classificationB)网络控制Network controlC)应用层控制Application layer controlD)人身安全Physical security答案:A解析:7.[单选题]这个职位最能在下面的情况下:雇员从多个账户刮取小额资金,将资金存入自己的银行账户中?A)数据摆弄B)数据诡计C)数据隐藏D)数据屏蔽答案:B解析:8.[单选题]安全操作中心 (SOC)在服务器上收到事件响应通知,服务器上插有主动入侵者,该入侵者已植入后门。
CISSP考试练习(习题卷9)

CISSP考试练习(习题卷9)第1部分:单项选择题,共100题,每题只有一个正确答案,多选或少选均不得分。
1.[单选题]在业务连续性计划 (BCP) 的设计中编写计划程序的主要目的是什么?What is the MAIN purpose for writing planned procedures in the design of Business Continuity Plans (BCP)?A)尽量减少失败的风险。
Minimize the risk of failureB)消除不必要的决策。
Eliminate unnecessary decision making.C)建立责任线。
Establish lines of responsibility.D)加速恢复过程。
Accelerate the recovery process.答案:A解析:2.[单选题]以下哪项是正式信息分类计划的主要优势?A)一个。
它最大限度地减少了系统日志记录要求。
B)它支持风险评估。
C)它减少了资产漏洞。
D)它推动了审计流程。
答案:B解析:3.[单选题]Which of the following is MOST critical in a contract in a contract for data disposal on a hard drive with a third party? 在与第三方签订的硬盘数据处理合同中,以下哪项是最关键的?A)Authorized destruction times授权销毁时间B)Allowed unallocated disk space允许的未分配磁盘空间C)Amount of overwrites required所需覆盖量D)Frequency of recovered media恢复介质的频率答案:C解析:4.[单选题]When performing an investigation with the potential for legal action, what should be the analyst's FIRST consideration? 当进行可能采取法律行动的调查时,分析员应首先考虑什么?A)Chain-of-custody产销监管链B)Authorization to collect收款授权书C)Court admissibility法院受理D)Data decryption数据解密答案:A解析:5.[单选题]Between which pair of Open System Interconnection(OSI)Reference Model layers are routers used as a communications device? 路由器在哪对开放系统互连(OSI)参考模型层之间用作通信设备?A)Transport and Session传输层和会话层B)Data-Link and Transport数据链路层和传输层C)Network and Session网络层和会话层D)Physical and Data-Link物理层和数据链路层答案:B解析:6.[单选题]RAID 磁盘名称等级 1 将数据从一个磁盘组到一个磁盘组A)将数据复制到另一种磁盘或轴承上。
CISSP考试练习(习题卷8)

CISSP考试练习(习题卷8)第1部分:单项选择题,共100题,每题只有一个正确答案,多选或少选均不得分。
1.[单选题]以下所有项目都应包含在业务影响分析中,即 (BIA)调查问卷,以排除问题A)确定发生业务中断的风险B)确定业务流程的技术依赖性C)识别业务中断的运营影响D)识别业务中断的财务影响答案:B解析:2.[单选题](04143) 在变更生产系统的数据库模式时,应该执行以下哪些活动?A)在开发环境构建变更,进行用户验收测试,制定回退策略,在生产环境实施变更B)在开发环境构建变更,进行用户验收测试,制定回退策略,在生产环境实施变更C)在开发环境构建变更,进行用户验收测试,制定回退策略,在生产环境实施变更D)在开发环境构建变更,进行用户验收测试,制定回退策略,在生产环境实施变更答案:C解析:3.[单选题]Which of the following vulnerabilities can be BEST detected using automated analysis? 使用自动分析可以最好地检测以下哪种漏洞?A)Valid cross-site request forgery(CSRF)vulnerabilities有效的跨站点请求伪造(CSRF)漏洞B)Multi-step process attack vulnerabilities多步骤进程攻击漏洞C)Business logic flaw vulnerabilities业务逻辑缺陷漏洞D)Typical source code vulnerabilities典型的源代码漏洞答案:D解析:4.[单选题]测试自定义应用程序代码的最有效方法是什么?A)阴性 测试B)白盒 测试C)笔配对 测试D)黑匣子 测试答案:B解析:5.[单选题]This statement is the formal requirement for:橙皮书指出,"硬件和软件功能应提供可以用于定期验证[可信计算基]TCB的现场硬件和固件元素的正确操作"。
CISSP考试练习(习题卷27)

CISSP考试练习(习题卷27)第1部分:单项选择题,共100题,每题只有一个正确答案,多选或少选均不得分。
1.[单选题]管理人要求管理高级成员对会计系统数据库进行具体更改。
管理员被特别指示不要跟踪或证明机票的变化。
以下哪一个是最好的行动方针?A)忽略请求,不执行电子 更改。
B)按要求执行更改,并依靠下一次审计来检测和报告 情况。
C)执行更改,但无论如何创建更改票证,以确保具有完全 可追溯性。
D)使用公司举报流程直接通知审计委员会或内部审计 。
答案:D解析:2.[单选题]以下哪一项是缓解零日漏洞的最佳方法?(选择最佳答案)Which one of the following is the BEST way to mitigate zero-day exploits?(Select the best answer)A)修补系统以修复零日漏洞。
Patching a system to fix the zero-day vulnerability.B)通过向媒体写入随机数据来擦除媒体Wiping media by writing random data to itC)强化系统,使其仅提供所需的功能Hardening a system so that it provides only required functionalityD)通过向媒体写入一系列零来擦除媒体Wiping media by writing a series of zeroes to it答案:C解析:3.[单选题]Lauren 在网络连接的两端监测流量,她发现某个公共IP 地址的入站流量出现在生产网络的内部边缘,其内部主机使用的是RFC1918预留地址,她估计该网络在边界处使用什么样的技术?A)NATB)VLANC)S/NATD)BGP答案:A解析:网络地址转换(NAT)将内部地址转换为外部地址。
VLAN(虚拟局域网)用于逻辑划分网络,BGP(边界网关协议)是路由协议,S/NAT 是生造的词。
CISSP考试练习(习题卷3)

CISSP考试练习(习题卷3)第1部分:单项选择题,共100题,每题只有一个正确答案,多选或少选均不得分。
1.[单选题]你认为下列哪一个是最安全的身份验证方式?A)生物识别B)密码C)令牌D)票证授予答案:A解析:<p>Biometric authentication systems take advantage of an individual's unique physical characteristics in order to authenticate that person's identity. Various forms of biometric authentication include face, voice, eye, hand, signature, and fingerprint, each have their own advantages and disadvantages. When combined with the use of a PIN it can provide two factors authentication.</p>2.[单选题]Kevin 正在为他的组织制定持续的安全监控策略。
在确定评估和监测频率时,通常不使用以下哪一项?A)威胁情报B)系统分类/影响级别C)安全控制操作负担D)组织风险承受能力答案:C解析:根据 NIST SP 800-137,组织应使用以下因素来确定评估和监控频率:安全控制波动性、系统分类/影响级别、提供关键功能的安全控制或特定评估对象、已识别弱点的安全控制、组织风险容忍度、威胁信息、漏洞信息、风险评估结果、监控策略审查的输出和报告要求。
3.[单选题]Brenda 的组织最近完成了对竞争对手公司的收购。
以下哪一项任务最不可能成为收购期间处理的组织流程的一部分?Brenda’s organization recently completed the acquisition of a competitor firm. Which one of the following tasks would be LEAST likely to be part of the organizational processes addressed during the acquisition?A)安保职能的整合Consolidation of security functionsB)安全工具的集成Integration of security toolsC)知识产权保护Protection of intellectual propertyD)安全政策文件Documentation of security policies答案:C解析:与收购(一家公司购买另一家公司)相比,在资产剥离(子公司被分拆为一个独立的组织)期间,知识产权保护是一个更大的问题。
CISSP考试练习(习题卷17)

CISSP考试练习(习题卷17)第1部分:单项选择题,共100题,每题只有一个正确答案,多选或少选均不得分。
1.[单选题]攻击者最有可能以以下哪项为目标来获得对系统的特权访问?A)一个。
写入系统资源的程序B)写入用户目录的程序C)包含敏感信息的日志文件D)包含系统调用的日志文件答案:A解析:2.[单选题]组织进行安全审计的主要目的是什么? What is the PRIMARY purpose for an organization to conduct a security audit?A)确保组织遵守明确定义的标准To ensure the organization is adhering to a well-defined standardB)确保组织应用安全控制来减轻已识别的风险To ensure the organization is applying security controls to mitigate identified risksC)确保组织有效地配置信息系统To ensure the organization is configuring information systems efficientlyD)确保组织记录调查结果To ensure the organization is documenting findings答案:A解析:3.[单选题]Joanna是她所在组织的CISO,在她的安全运营监督角色中,她希望确保对与安全相关的变更进行管理监督。
在大多数组织中,她应该关注什么系统来跟踪此类数据?A)SIEM系统The SIEM systemB)IPS系统The IPS systemC)CMS工具The CMS toolD)ITSM工具The ITSM tool答案:D解析:IT服务管理或ITSM工具包括变更管理以及Joanna正在寻找的批准和审查流程的类型。
SIEM 帮助处理安全日志和事件,IPS查找入侵和不需要的流量,CMS是一种内容管理工具。
CISSP考试练习(习题卷13)

CISSP考试练习(习题卷13)第1部分:单项选择题,共100题,每题只有一个正确答案,多选或少选均不得分。
1.[单选题]Frank 的团队正在测试他公司的开发人员为其应用程序基础架构构建的新 API。
以下哪一项不是您希望Frank 的团队发现的常见 API 问题?A)不正确的加密B)对象级授权问题C)用户认证问题D)缺乏速率限制答案:A解析:2.[单选题]您的公司实施了一个基于生物识别的系统来控制对计算机房的访问。
当阈值(1 到 10)设置为 5 时,错误接受率 (FAR) 和错误拒绝率 (FRR) 成功 10 分之 5 。
以下哪一项是高级计算机房实体安全的最佳配置?(Wentz QOTD)A)降低交叉错误率(CER)B)提高等差错率(EER)。
C)降低可(敏感性)D)提高阈值(threshold)答案:D解析:3.[单选题]下列哪一项是安全的主要目标?A)网络的边界范围B)CIA 三元组C)独立系统D)互联网答案:B解析:安全的主要目的和目标是保密性、完整性和有效性,通常称为CIA 三元组。
4.[单选题]RAID磁盘阵列软件可以在操作系统中运行得更快,因为它既不使用硬件级的对等驱动器?A)简单涂磁也不磁盘镜像。
B)硬涂磁也不磁盘镜像C)简单奇偶校验也不磁盘镜像D)简单涂磁也不奇偶校验答案:A解析:<p>This is true, if we do not use parity in our RAID implementation, like RAID 1 (Mirroring) or RAID 0 (Stripping) we can improve performance because the CPU does not need waste cycles to make the parity calculations. For example this can be achieved in Windows 2000 server through the use of RAID 0 (No fault tolerance, just stripping in 64kb chunks) or RAID 1 (Mirroring through a file system driver). This is not the case of RAID 5 that actually use parity to provide fault tolerance.</p>5.[单选题]What do Capability Maturity Models(CMM)serve as a benchmark for in an organization? 能力成熟度模型(CMM)作为组织中的基准是什么?A)Experience in the industry行业经验B)Definition of security profiles安全配置文件的定义C)Human resource planning efforts人力资源规划工作D)Procedures in systems development系统开发过程答案:D解析:6.[单选题]All of the following items should be included in a Business ImpactAnalysis(BIA)questionnaire EXCEPT questions that以下所有项目都应包括在业务影响分析(BIA)问卷中,但以下问题除外:A)determine the risk of a business interruption occurring确定发生业务中断的风险B)determine the technological dependence of the business processes确定业务流程的技术依赖性C)Identify the operational impacts of a business interruption确定业务中断的运营影响D)Identify the financial impacts of a business interruption确定业务中断的财务影响答案:B解析:7.[单选题]为什么会发生缓冲区溢出?A)因为缓冲区只能容纳这么多的数据。
CISSP考试练习(习题卷18)

CISSP考试练习(习题卷18)第1部分:单项选择题,共100题,每题只有一个正确答案,多选或少选均不得分。
1.[单选题]当证书颁发机构创建Renee的数字证书时,它使用什么密钥对完成的证书进行数字签名?A)Renee的公钥B)Renee的私钥C)CA的公钥D)CA的私钥答案:D解析:证书创建过程的最后一步是数字签名。
在此步骤中,证书颁发机构使用自己的私钥对证书进行签名。
The last step of the certificate creation process is the digital signature.During this step, the certificate authority signs the certificate using its own private key.2.[单选题]媒体标记和媒体标签有何区别?A)媒体标记是指使用人可读的安全属性,而媒体 标记是指在内部数据结构中使用安全属性 。
B)媒体标记是指 使用人可读的安全属性,而媒体 标记是指在内部数据结构中使用安全属性 。
C)媒体标签是指公共政策/法律要求的安全属性,而媒体标记是指内部组织政策所要求的安全属性。
D)媒体标记是指公共政策/法律要求的安全属性,而媒体标记是指由内部组织政策重新标记的安全属性。
答案:D解析:3.[单选题]Computer programs based on human logic using if-then statements and inference engines, also known as?通过使用IF-then语句和推理引擎的,基于人类逻辑的计算机程序,也被称为?A)Expert system.专家系统B)Artificial neural network.人工神经网络C)Distributed computing environment.分布式计算环境D)Enterprise Java-beans.企业java bean答案:A解析:4.[单选题]以下哪项是实现使用中数据控件的主要好处?A)一个。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
CISSP认证考试培训习题CBK Domain 7 - 运作安全1.Operations Security seeks to primarily protect against which of thefollowing?A.object reuseB.facility disasterpromising emanationsD.asset threatsD2.Notifying the appropriate parties to take action in order to determine theextent of the severity of an incident and to remediate the incident's effects includes:A.Intrusion Evaluation (IE) and ResponseB.Intrusion Recognition (IR) and ResponseC.Intrusion Protection (IP) and ResponseD.Intrusion Detection (ID) and ResponseD3.What is the main issue with media reuse?A.DegaussingB.Data remanenceC.Media destructionD.PurgingB4.This type of control is used to ensure that transactions are properly enteredinto the system once. Elements of this type of control may include counting data and time stamping it with the date it was entered or edited?A.Processing ControlsB.Output ControlsC.Input ControlsD.Input/Output ControlsC5.Which of the following questions is less likely to help in assessing controlsover audit trails?A.Does the audit trail provide a trace of user actions?B.Are incidents monitored and tracked until resolved?C.Is access to online logs strictly controlled?D.Is there separation of duties between security personnel who administer theaccess control function and those who administer the audit trail?B6.Which of the following is the most reliable, secure means of removing datafrom magnetic storage media such as a magnetic tape, or a cassette?A.DegaussingB.Parity Bit ManipulationC.CertificationD.Buffer overflowA7.What is the most secure way to dispose of information on a CD-ROM?A.SanitizingB.Physical damageC.DegaussingD.Physical destructionD8.Which of the following ensures that security is not breached when a systemcrash or other system failure occurs?A.trusted recoveryB.hot swappableC.redundancyD.secure bootA9.Hardware availability reports allow the identification of the followingproblems except for:A.Inadequate training for operatorsB.Excessive operating systems maintenanceer dissatisfactionD.Inadequate hardware facilitiesC10.Which of the following is not a valid reason to use external penetrationservice firms rather than corporate resources?A.They are more cost-effectiveB.They offer a lack of corporate biasC.They use highly talented ex-hackersD.They insure a more complete reportingC11.When it comes to magnetic media sanitization, what difference can be madebetween clearing and purging information?A.Clearing completely erases the media whereas purging only removes file headers,allowing the recovery of files.B.Clearing renders information unrecoverable by a keyboard attack and purgingrenders information unrecoverable against laboratory attack.C.They both involve rewriting the media.D.Clearing renders information unrecoverable against a laboratory attack andpurging renders information unrecoverable to a keyboard attack.B12.What security procedure forces an operator into collusion with an operatorof a different category to have access to unauthorized data?A.Enforcing regular password changes.B.Management monitoring of audit logs.C.Limiting the specific accesses of operations personnel.D.Job rotation of people through different assignments.C13.Who is responsible for setting user clearances to computer-basedinformation?A.Security administratorsB.OperatorsC.Data ownersD.Data custodiansA14.Which of the following is used to interrupt opportunity to create collusion tosubvert operation for fraudulent purposes?A.Separation of dutiesB.Rotation of dutiesC.Principle of need-to-knowD.Principle of least privilegeB15.Unrestricted access to production programs should be given to which of thefollowing?A.maintenance programmers onlyB.system owner, on requestC.no oneD.auditorsC16.Overwriting and/or degaussing is used to clear and purge all of the followingexcept which of the following?A.random access memoryB.read-only memoryC.magnetic core memoryD.magnetic hard disksB17.An electrical device (AC or DC) which can generate coercive magnetic forcefor the purpose of reducing magnetic flux density to zero on storage media or other magnetic media is called:A. a magnetic field.B. a degausser.C.magnetic remanence.D.magnetic saturation.B18.Which of the following in not a critical security aspect of OperationsControls?A.Controls over hardwareB.Data media usedC.Operators using resourcesD.Environmental controlsD19.Which of the following should not be accessible by a computer operator?A.Operations documentationputer consoleC.Source code of applicationsrmation security guidelinesC20.Which one of the following functions provides the least effectiveorganizational reporting structure for the Information Systems Security function?A.IS quality assuranceB.IS resource managementC.IS operationsD.Corporate securityC21.What should a company do first when disposing of personal computers thatonce were used to store confidential data?A.Overwrite all data on the hard disk with zeroesB.Delete all data contained on the hard diskC.Demagnetize the hard diskD.Low level format the hard disk22.What is the most effective means of determining how controls arefunctioning within an operating system?A.Interview with computer operatorB.Review of software control features and/or parametersC.Review of operating system manualD.Interview with product vendorB23.Which TCSEC (Orange Book) level requires the system to clearly identifyfunctions of security administrator to perform security-related functions?A.C2B.B1C.B2D.B3D24.According to the Orange Book, which security level is the first to requiretrusted recovery?A.A1B.B2C.B3D.B1C25.Which of the following are functions that are compatible in a properlysegregated environment?A.Application programming and computer operation.B.Systems programming and job control analysis.C.Access authorization and database administration.D.System development and systems maintenance.D26.Which of the following rules is less likely to support the concept of leastprivilege?A.The number of administrative accounts should be kept to a minimum.B.Administrators should use regular accounts when performing routine operationslike reading mail.C.Permissions on tools that are likely to be used by hackers should be as restrictiveas possible.D.Only data to and from critical systems and applications should be allowedthrough the firewall.D27.Which level of "least privilege" enables operators the right to modify datadirectly in its original location, in addition to data copied from the original location?A.Access ChangeB.Read/WriteC.Access RewriteD.Access ModifyA28.Which of the following is not an Orange Book-defined life cycle assurancerequirement?A.Security testingB.Design specification and testingC.Trusted distributionD.System integrityD29.Which of the following questions is less likely to help in assessing controlsover production?A.Are there processes for ensuring that only authorized users pick up, receive, ordeliver input and output information and media?B.Are audit trails used for receipt of sensitive inputs/outputs?C.Is media sanitized for reuse?D.Are confidentiality or security agreements required for employees assigned towork with sensitive information?D30.Ensuring that printed reports reach proper users and that receipts aresigned before releasing sensitive documents are examples of:A.Deterrent controlsB.Output controlsrmation flow controlsD.Asset controlsB31.Intrusion Detection (ID) and Response is not a:A.preventive control.B.detective control.C.monitoring control.D.reactive control.A32.A periodic review of user account management should not determine:A.Conformity with the concept of least privilege.B.Whether active accounts are still being used.C.Strength of user-chosen passwords.D.Whether management authorizations are up-to-date.C33.The primary reason for enabling software audit trails is which of thefollowing?A.Improve system efficiency.B.Improve response time for users.C.Establish responsibility and accountability.D.Provide useful information to track down processing errors.C34.Which of the following is true related to network sniffing?A.Sniffers allow an attacker to monitor data passing across a network.B.Sniffers alter the source address of a computer to disguise and exploit weakauthentication methods.C.Sniffers take over network connections.D.Sniffers send IP fragments to a system that overlap with each other.A35.Which of the following questions is less likely to help in assessing controlsover hardware and software maintenance?A.Is access to all program libraries restricted and controlled?B.Are integrity verification programs used by applications to look for evidences ofdata tampering, errors, and omissions?C.Is there version control?D.Are system components tested, documented, and approved prior to promotion toproduction?B36.This type of vulnerability enables the intruder to re-route data traffic from anetwork device to a personal machine. This diversion enables the intruder to capture data traffic to and from the devices for analysis or modification, or to steal the password file from the server and gain access to user accounts:work Address Translationwork Address Hijackingwork Address Supernettingwork Address Sniffing37.Which of the following is NOT a technique used to perform a penetrationtest?A.sending noiseB.scanning and probingC.war dialingD.sniffingA38.In what way can violation clipping levels assist in violation tracking andanalysis?A.Clipping levels set a baseline for normal user errors, and violations exceeding thatthreshold will be recorded for analysis of why the violations occurred.B.Clipping levels enable a security administrator to customize the audit trail torecord only those violations which are deemed to be security relevant.C.Clipping levels enable the security administrator to customize the audit trail torecord only actions for users with access to usercodes with a privileged status. D.Clipping levels enable a security administrator to view all reductions in securitylevels which have been made to usercodes which have incurred violations.A39.Which of the following are functions that are compatible in a properlysegregated environment?A.Data entry and job schedulingB.Database administration and systems securityC.Systems analyst and application programmingD.Security administration and systems programmingC40.Which of the following is not concerned with configuration management?A.HardwareB.SoftwareC.DocumentationD.They all are concerned with configuration management.D41.What is the main objective of proper separation of duties?A.To prevent employees from disclosing sensitive information.B.To ensure access controls are in place.C.To ensure that no single individual can compromise a system.D.To ensure that audit trails are not tampered with.C42.Which trusted facility management concept implies that two operators mustreview and approve the work of each other?A.Two-man controlB.Dual controlC.Double controlD.Segregation controlA43.Which choice below is NOT a security goal of an audit mechanism?A.Deter perpetrators' attempts to bypass the system protection mechanismsB.Review employee production output recordsC.Review patterns of access to individual objectsD.Discover when a user assumes a functionality with privileges greater than hisownB44.Which choice below would NOT be considered a benefit of employingincident-handling capability?A.An individual acting alone would not be able to subvert a security process orcontrol.B.It enhances internal communications and the readiness of the organization torespond to incidents.C.It assists an organization in preventing damage from future incidents.D.Security training personnel would have a better understanding of users'knowledge of security issues.A45.Which choice below is the BEST description of operational assurance?A.Operational assurance is the process of examining audit logs to reveal usage thatidentifies misuse.B.Operational assurance has the benefit of containing and repairing damage fromincidents.C.Operational assurance is the process of reviewing an operational system to seethat security controls are functioning correctly.D.Operational assurance is the process of performing pre-employment backgroundscreening.C46.Which choice below MOST accurately describes a Covert Storage Channel?A. A process that manipulates observable system resources in a way that affectsresponse timeB.An information transfer path within a systemC. A communication channel that allows a process to transfer information in amanner that violates the system's security policyD.An information transfer that involves the direct or indirect writing of a storagelocation by one process and the direct or indirect reading of the storage location by another processD47.Which choice below is NOT an example of a media control?A.Sanitizing the media before dispositionB.Printing to a printer in a secured roomC.Physically protecting copies of backup mediaD.Conducting background checks on individualsD48.Which statement below is the BEST example of "separation of duties"?A.An activity that checks on the system, its users, or the environment.B.Getting users to divulge their passwords.C.One person initiates a request for a payment and another authorizes that samepayment.D. A data entry clerk may not have access to run database analysis reports.C49.Which minimum TCSEC security class category specifies "trusteddistribution" controls?A.C2B.B2C.B3D.A1D50.Which statement below is accurate about the concept of Object Reuse?A.Object reuse protects against physical attacks on the storage medium.B.Object reuse ensures that users do not obtain residual information from systemresources.C.Object reuse applies to removable media only.D.Object reuse controls the granting of access rights to objects.B。