CISSP Practice question #186

In software testing, installation testing would test what?
A: That the software installs correctly on the customers hardware.
B: Lost or missing features after major code changes.
C: interfaces between components in the software.
D: Processes and security alerts when encountering errors.

CBK 6: Security Assessment and Testing
Source: ThorTeaches.com practice tests

Answer


A: Installation testing: Assures that the system is installed correctly and working at actual customer’s hardware.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #185

Which protocol transports files in plaintext?
A: FTP.
B: SFTP.
C: FTPS
D: HTTPS:

CBK 4: Communication and Network Security
Source: ThorTeaches.com practice tests

Answer


A: FTP (File Transfer Protocol): Transfers files to and from servers. No confidentiality or Integrity checks. Data is sent in plaintext. Should also not be used, since the vast majority of what we transport is over unsecure networks.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #184

Jane is looking at the Kerberos implementation we have in place and is working on the KDC, what is part of the KDC?
A: AS.
B: PSG.
C: TGT.
D: KDR.

CBK 5: Identity and Access Management
Source: ThorTeaches.com practice tests

Answer


A: The KDC (Key Distribution Center) consists of the AS (Authentication Server) and the TGS (Ticket Granting Server).

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #183

In network forensics which of these is a common form used?
A: Catch-as-you-can.
B: Catch-and-release.
C: Stop, act and prevent.
D: Stop and release.

CBK 7: Security Operations
Source: ThorTeaches.com practice tests

Answer


A: Network forensics: Systems used to collect network data for forensics use usually come in two forms: Catch-it-as-you-can: All packets passing through a certain traffic point are captured and written to storage with analysis being done subsequently in batch mode. This approach requires large amounts of storage. Stop, look and listen: Each packet is analyzed in a basic way in memory and only certain information is saved for future analysis. This approach requires a faster processor to keep up with incoming traffic.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #182

Which remote access protocol can send data encrypted?
A: Telnet.
B: Secure Shell.
C: Command prompt.
D: Power Shell.

CBK 4: Communication and Network Security
Source: ThorTeaches.com practice tests

Answer


B: SSH (Secure Shell) is used for remote access over a network. Data is encrypted, but some resent leaks have shown the CIA may have tools that can break SSH.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #181

Which type of query languages would use SELECT, DELETE, INSERT and DROP?
A: DDL.
B: DML.
C: DRP.
D: DDR.

CBK 8: Software Development Security
Source: ThorTeaches.com practice tests

Answer


B: Data Manipulation Language (DML). Used for selecting, inserting, deleting and updating data in a database. Common DDL statements are SELECT, DELETE, INSERT, UPDATE.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #180

What do we use to prevent power fluctuations?
A: EMI.
B: UPS.
C: CPU.
D: Batteries.

CBK 3: Security Engineering
Source: ThorTeaches.com practice tests

Answer


B: UPSs (Uninterruptible Power Supplies): Ensure constant clean power to the systems. Have large battery banks that take over in the event of a power outage; they also act as surge protectors.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #179

Why is social engineering often successful?
A: It is very technical.
B: We give our employees a lot of training to raise awareness of social engineering.
C: Because of how few employees there are available for them to target.
D: People want to be helpful.

CBK 6: Security Assessment and Testing
Source: ThorTeaches.com practice tests

Answer


D: Social engineering are often more successful if they use one or more of these approaches, : Authority, intimidation, consensus , scarcity, urgency or familiarity. Often people just want to be helpful or not get in trouble.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #178

Having a single, well controlled and defined data integrity system increases all of these except what?
A: Performance.
B: Maintainability.
C: Stability.
D: Redundant data.

CBK 8: Software Development Security
Source: ThorTeaches.com practice tests

Answer


D: Having a single, well controlled, and well defined data-integrity system increases: Stability: One centralized system performs all data integrity operations. Performance: All data integrity operations are performed in the same tier as the consistency model. Re-usability: All applications benefit from a single centralized data integrity system. Maintainability: One centralized system for all data integrity administration.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #177

Semantic integrity is:
A: When every foreign key in a secondary table matches the primary key in the parent table.
B: Each attribute value is consistent with the attribute data type.
C: Each tuple has a unique primary value that is not null.
D: When the database has errors.

CBK 8: Software Development Security
Source: ThorTeaches.com practice tests

Answer


B: Semantic integrity: Each attribute value is consistent with the attribute data type.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading