CISSP Practice question #183

In network forensics which of these is a common form used?
A: Catch-as-you-can.
B: Catch-and-release.
C: Stop, act and prevent.
D: Stop and release.

CBK 7: Security Operations
Source: ThorTeaches.com practice tests

Answer


A: Network forensics: Systems used to collect network data for forensics use usually come in two forms: Catch-it-as-you-can: All packets passing through a certain traffic point are captured and written to storage with analysis being done subsequently in batch mode. This approach requires large amounts of storage. Stop, look and listen: Each packet is analyzed in a basic way in memory and only certain information is saved for future analysis. This approach requires a faster processor to keep up with incoming traffic.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #182

Which remote access protocol can send data encrypted?
A: Telnet.
B: Secure Shell.
C: Command prompt.
D: Power Shell.

CBK 4: Communication and Network Security
Source: ThorTeaches.com practice tests

Answer


B: SSH (Secure Shell) is used for remote access over a network. Data is encrypted, but some resent leaks have shown the CIA may have tools that can break SSH.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #181

Which type of query languages would use SELECT, DELETE, INSERT and DROP?
A: DDL.
B: DML.
C: DRP.
D: DDR.

CBK 8: Software Development Security
Source: ThorTeaches.com practice tests

Answer


B: Data Manipulation Language (DML). Used for selecting, inserting, deleting and updating data in a database. Common DDL statements are SELECT, DELETE, INSERT, UPDATE.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #180

What do we use to prevent power fluctuations?
A: EMI.
B: UPS.
C: CPU.
D: Batteries.

CBK 3: Security Engineering
Source: ThorTeaches.com practice tests

Answer


B: UPSs (Uninterruptible Power Supplies): Ensure constant clean power to the systems. Have large battery banks that take over in the event of a power outage; they also act as surge protectors.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #179

Why is social engineering often successful?
A: It is very technical.
B: We give our employees a lot of training to raise awareness of social engineering.
C: Because of how few employees there are available for them to target.
D: People want to be helpful.

CBK 6: Security Assessment and Testing
Source: ThorTeaches.com practice tests

Answer


D: Social engineering are often more successful if they use one or more of these approaches, : Authority, intimidation, consensus , scarcity, urgency or familiarity. Often people just want to be helpful or not get in trouble.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #178

Having a single, well controlled and defined data integrity system increases all of these except what?
A: Performance.
B: Maintainability.
C: Stability.
D: Redundant data.

CBK 8: Software Development Security
Source: ThorTeaches.com practice tests

Answer


D: Having a single, well controlled, and well defined data-integrity system increases: Stability: One centralized system performs all data integrity operations. Performance: All data integrity operations are performed in the same tier as the consistency model. Re-usability: All applications benefit from a single centralized data integrity system. Maintainability: One centralized system for all data integrity administration.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #177

Semantic integrity is:
A: When every foreign key in a secondary table matches the primary key in the parent table.
B: Each attribute value is consistent with the attribute data type.
C: Each tuple has a unique primary value that is not null.
D: When the database has errors.

CBK 8: Software Development Security
Source: ThorTeaches.com practice tests

Answer


B: Semantic integrity: Each attribute value is consistent with the attribute data type.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #176

How many rotors did SIGABA use?
A: 3
B: 4
C: 10
D: 15

CBK 3: Security Engineering
Source: ThorTeaches.com practice tests

Answer


D: SIGABA: A rotor machine used by the United States throughout World War II and into the 1950s, similar to the Enigma. It was more complex, and was built after examining the weaknesses of the Enigma. No successful cryptanalysis of the machine during its service lifetime is publicly known. It used 3x 5 sets of rotors.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #175

Which type of IDS/IPS can maybe mitigate 0day attacks?
A: Heuristic based.
B: Preference matching.
C: Signature based.
D: Network based.

CBK 7: Security Operations
Source: ThorTeaches.com practice tests

Answer


A: Heuristic (Behavioral) based: Looks for abnormal behavior – can produce a lot of false positives. We build a baseline of what normal network traffic looks like and all traffic is matches to that baseline. They can at times mitigate 0day attacks. Can detect ‘out of the ordinary’ activity, not just attacks. Takes much more work and skills.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #174

Using Kerberos what does the client send to the AS?
A: User ID.
B: Authenticator.
C: Session key.
D: Plaintext password.

CBK 5: Identity and Access Management
Source: ThorTeaches.com practice tests

Answer


A: The client sends a cleartext user ID to the AS (Authentication Server) requesting services on behalf of the user.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading