计算机类
公务员类
工程类
语言类
金融会计类
计算机类
医学类
研究生类
专业技术资格
职业技能资格
学历类
党建思政类
单选题Cross-site scripting (XSS) is an application security vulnerability usually found in Web applications. What type of XSS vulnerability occurs when a victim is tricked into opening a URL programmed with a rogue script to steal sensitive information?
进入题库练习
单选题Which of the following is considered the second generation of programming languages?
进入题库练习
单选题Robert has been given the responsibility of installing doors that provide different types of protection. He has been told to install doors that provide failsafe, fail-secure, and fail-soft protection. Which of the following statements is true about secure door types?
进入题库练习
单选题There are several types of volumetric IDSs. What type of IDS emits a measurable magnetic field that it monitors for disruptions?
进入题库练习
单选题The common law system is broken down into which of the following categories?
进入题库练习
单选题Before an effective physical security program can be rolled out, a number of steps must be taken. Which of the following steps comes first in the process of rolling out a security program?
进入题库练习
单选题Which of the following statements does not correctly describe SOAP and Remote Procedure Calls?
进入题库练习
单选题______is a set of extensions to DNS that provides to DNS clients (resolvers) origin authentication of DNS data to reduce the threat of DNS poisoning, spoofing, and similar attack types.
进入题库练习
单选题Sam is the security manager of a company that makes most of its revenue from its intellectual property. Sam has implemented a process improvement program that has been certified by an outside entity. His company received a Level 2 during an appraisal process, and he is putting in steps to increase this to a Level 3. A year ago when Sam carried out a risk analysis, he determined that the company was at too much of a risk when it came to potentially losing trade secrets. The countermeasure his team implemented reduced this risk, and Sam determined that the annualized loss expectancy of the risk of a trade secret being stolen once in a hundred-year period is now $400.
进入题库练习
单选题Both de facto and proprietary interior protocols are in use today. Which of the following is a proprietary interior protocol that chooses the best path between the source and destination?
进入题库练习
单选题David is preparing a server room at a new branch office. What locking mechanisms should he use for the primary and secondary server room entry doors?
进入题库练习
单选题Several teams should be involved in carrying out the business continuity plan. Which team is responsible for starting the recovery of the original site?
进入题库练习
单选题The NIST organization has defined best practices for creating continuity plans. Which of the following phases deals with identifying and prioritizing critical functions and systems?
进入题库练习
单选题The relay agent on a mail server plays a role in spam prevention. Which of the following incorrectly describes mail relays?
进入题库练习
单选题Therearemanydifferenttypesofaccesscontrolmechanismsthatarecommonlyembeddedintoalloperatingsystems.Whichofthefollowingisthemechanismthatismissinginthisgraphic?
进入题库练习
单选题There are several types of intrusion detection systems (IDSs). What type of IDS builds a profile of an environment"s normal activities and assigns an anomaly score to packets based on the profile?
进入题库练习
单选题WhichtypeofWANtunnelingprotocolismissingfromthetablethatfollows?
进入题库练习
单选题Which of the following best describes how SAML, SOAP, and HTTP commonly work together in an environment that provides Web services?
进入题库练习
单选题Authorization creep is to access controls what scope creep is to software development. Which of the following is not true of authorization creep?
进入题库练习
单选题The integrity of data is not related to which of the following?
进入题库练习
单选题Paisley is helping her company identify potential site locations for a new facility. Which of the following is not an important factor when choosing a location?
进入题库练习
单选题Whattechnologywithinidentitymanagementisillustratedinthegraphicthatfollows?
进入题库练习
单选题The following scenario is to be used for questions 30, 31, and 32.Greg is the security facility officer of a financial institution. His boss has told him that visitors need a secondary screening before they are allowed into sensitive areas within the building. Greg has also been told by the network administrators that after the new HVAC system was installed throughout the facility, they have noticed that power voltage to the systems in the data center sags.
进入题库练习
单选题Brian has been asked to work on the virtual directory of his company"s new identity management system. Which of the following best describes a virtual directory?
进入题库练习
单选题A change management process should include a number of procedures. Which of the following incorrectly describes a characteristic or component of a change control policy?
进入题库练习
单选题The following scenario will be used to answer questions 30, 31 and 32. Jeff is leading the business continuity group in his company. They have completed a business impact analysis and have determined that if the company's credit card processing functionality was unavailable for 48 hours the company would most likely experience such a large financial hit that it would have to go out of business. The team has calculated that this functionality needs to be up and running within 28 hours after experiencing a disaster for the company to stay in business. The team has also determined that the restoration steps must be able to restore data that are one hour old or less.
进入题库练习
单选题Widgets Inc.'s software development processes are documented and the organization is capable of producing its own standard of software processes. Which of the following Capability Maturity Model Integration levels best describes Widgets Inc.?
进入题库练习
单选题There are four categories of software licensing. Which of the following refers to software sold at a reduced cost?
进入题库练习
单选题Which of the following is not an effective countermeasure against spam?
进入题库练习
单选题Which of the following is not a responsibility of the memory manager?
进入题库练习
单选题It is not unusual for business continuity plans to become out of date. Which of the following is not a reason why plans become outdated?
进入题库练习
单选题The Information Technology Infrastructure Library(ITIL) consists of five sets of instructional books. Which of the following is considered the core set and focuses on the overall planning of the intended IT services?
进入题库练习
单选题There are two main functions that Trusted Platform Modules (TPMs) carry out within systems today. Which of the following best describes these two functions?
进入题库练习
单选题The following scenario will be used for questions 26, 27, and 28.Trent is the new manager of his company's internal software development department. He has been told by his management that the group needs to be compliant with the international standard that provides guidance to organizations in integrating security into the processes used for managing their applications. His new boss told him that he should join and get familiar with the Web Application Security Consortium, and Trent just received an e-mail stating that one of the company's currently deployed applications has a zero day vulnerability.
进入题库练习
单选题Which of the following incorrectly describes the concept of executive succession planning?
进入题库练习
单选题Which of the following describes object-oriented programming deferred commitment?
进入题库练习
单选题After a disaster occurs, a damage assessment needs to take place. Which of the following steps occurs last in a damage assessment?
进入题库练习
单选题Differentaccesscontrolmodelsprovidespecifictypesofsecuritymeasuresandfunctionalityinapplicationsandoperatingsystems.Whatmodelisbeingexpressedinthegraphicthatfollows?
进入题库练习
单选题Thereareseveraldifferenttypesofdatabases.Whichtypedoesthegraphicthatfollowsillustrate?
进入题库练习
单选题Certain types of attacks have been made more potent by which of the following advances to microprocessor technology?
进入题库练习
单选题In computer programming, cohesion and coupling are used to describe modules of code. Which of the following is a favorable combination of cohesion and coupling?
进入题库练习
单选题With what phase of a business continuity plan does a company proceed when it is ready to move back into its original site or a new site?
进入题库练习
单选题What discipline combines the physical environment and sociology issues that surround it to reduce crime rates and the fear of crime?
进入题库练习
单选题There are many types of viruses that hackers can use to damage systems. Which of the following is not a correct description of a polymorphic virus?
进入题库练习
单选题Organizations should keep system documentation on hand to ensure that the system is properly cared for, that changes are controlled, and that the organization knows what's on the system. What does not need to be in this type of documentation?
进入题库练习
单选题Whattypeofinfrastructuralsetupisillustratedinthegraphicthatfollows?
进入题库练习
单选题Hereisagraphicofabusinesscontinuitypolicy.Whichcomponentismissingfromthisgraphic?
进入题库练习
单选题Angela wants to group together computers by department to make it easier for them to share network resources. Which of the following will allow her to group computers logically?
进入题库练习
单选题What type of exploited vulnerability allows more input than the program has allocated space to store it?
进入题库练习
单选题Thereareseveraldifferenttypesofcentralizedaccesscontrolprotocols.Whichofthefollowingisillustratedinthegraphicthatfollows?
进入题库练习
单选题High availability (HA) is a combination of technologies and processes that work together to ensure that specific critical functions are always up and running at the necessary level. To provide this level of high availability, a company has to have a long list of technologies and processes that provide redundancy, fault tolerance, and failover capabilities. Which of the following best describes these characteristics?
进入题库练习
单选题There are two main types of symmetric ciphers: stream and block. Which of the following is not an attribute of a good stream cipher?
进入题库练习
单选题Whatarethethreetypesofpoliciesthataremissingfromthefollowinggraphic?
进入题库练习
单选题Which of the following is the best description of a component-based system development method?
进入题库练习
单选题Amultitaskingoperatingsystemcanhaveseveralprocessesrunningatthesametime.Whatarethecomponentswithintheprocessesthatareshowninthegraphicthatfollows?
进入题库练习
单选题For what purpose was the COSO framework developed?
进入题库练习
单选题Which of the following is a common association of the Clark-Wilson access model?
进入题库练习
单选题Cyberlaw categorizes computer-related crime into three categories. Which of the following is an example of a crime in which the use of a computer would be categorized as incidental?
进入题库练习
单选题An outline for a physical security design should include program categories and the necessary countermeasures for each. What category do locks and access controls belong to?
进入题库练习
单选题Thereareseveralsecurityenforcementcomponentsthatarecommonlybuiltintooperatingsystems.Whichcomponentisillustratedinthegraphicthatfollows?
进入题库练习
单选题Which of the following refers to the amount of time it will be expected to take to get a device fixed and back into production?
进入题库练习
单选题RAID systems use a number of techniques to provide redundancy and performance. Which of the following activities divides and writes data over several drives?
进入题库练习
单选题There are several types of password management approaches used by identity management systems. Which of the following reduces help-desk call volume, but is also criticized for the ease with which a hacker could gain access to multiple resources if a password is compromised?
进入题库练习
单选题Whattypeoftechnologyisrepresentedinthegraphicthatfollows?
进入题库练习
单选题As a CISSP candidate, you must sign a Code of Ethics. Which of the following is from the (ISC) 2 Code of Ethics for the CISSP?
进入题库练习
单选题The Recovery Time Objective (RTO) and Maximum Tolerable Downtime (MTD) metrics have similar roles, but their values are very different. Which of the following best describes the difference between RTO and MTD metrics?
进入题库练习
单选题Charlie is a new security manager at a textile company that develops its own proprietary software for internal business processes. Charlie has been told that the new application his team needs to develop must comply with the ISO/IEC 42010 standard. He has found out that many of the critical applications have been developed in the C programming language and has asked for these applications to be reviewed for a specific class of security vulnerabilities.
进入题库练习
单选题Preplanned business continuity procedures provide organizations a number of benefits. Which of the following is not a capability enabled by business continuity planning?
进入题库练习
单选题The requirement of erasure is the end of the media life cycle if it contains sensitive information. Which of the following best describes purging?
进入题库练习
单选题Two commonly used networking protocols are TCP and UPD. Which of the following correctly describes the two?
进入题库练习
单选题If implemented properly, a one-time pad is a perfect encryption scheme. Which of the following incorrectly describes a requirement for implementation?
进入题库练习
单选题Thereareseveraldifferenttypesofauthenticationtechnologies.Whichtypeisbeingshowninthegraphicthatfollows?
进入题库练习
单选题The following scenario will be used for questions 30 and 31.Stephanie has been put in charge of developing incident response and forensics procedures her company needs to carry out if an incident occurs. She needs to ensure that their procedures map to the international principles for gathering and protecting digital evidence. She also needs to ensure that if and when internal forensics teams are deployed, they have labels, tags, evidence bags, cable ties, imaging software, and other associated tools.
进入题库练习
单选题Whattypeofriskanalysisapproachdoesthefollowinggraphicprovide?
进入题库练习
单选题Whattypeoftelecommunicationtechnologyisillustratedinthegraphicthatfollows?
进入题库练习
单选题Whatarethethreetypesofpoliciesthataremissingfromthefollowinggraphic?
进入题库练习
单选题Sally is carrying out a software analysis on her company"s proprietary application. She has found out that it is possible for an attacker to force an authorization step to take place before the authentication step is completed successfully. What type of issue would allow for this type of compromise to take place?
进入题库练习
单选题Bethany is working on a mandatory access control (MAC) system. She has been working on a file that was classified as Secret. She can no longer access this file because it has been reclassified as Top Secret. She deduces that the project she was working on has just increased in confidentiality and she now knows more about this project than her clearance and need-to-know allows. Which of the following refers to a concept that attempts to prevent this type of scenario from occurring?
进入题库练习
单选题The operations team is responsible for defining which data gets backed up and how often. Which type of backup process backs up files that have been modified since the last time all data was backed up?
进入题库练习
单选题John is responsible for providing a weekly report to his manager outlining the week's security incidents and mitigation steps. What steps should he take if a report has no information?
进入题库练习
单选题What type of fence detects if someone attempts to climb or cut it?
进入题库练习
单选题Which of the following does not describe privacy-aware role-based access control?
进入题库练习
单选题Differenttypesofmaterialarebuiltintowallsandotherconstructsofvarioustypesofbuildingsandfacilities.Whattypeofmaterialisshowninthefollowingphoto?
进入题库练习
单选题Layer 2 of the OSI model has two sublayers. What are those sublayers, and what are two IEEE standards that describe technologies at that layer?
进入题库练习
单选题Electrical power is being provided more through smart grids, which allow for self-healing, resistance to physical and cyberattacks, increased efficiency, and better integration of renewable energy sources. Countries want their grids to be more reliable, resilient, flexible, and efficient. Why does this type of evolution in power infrastructure concern many security professionals?
进入题库练习
单选题There are different ways that operating systems can carry out software I/O procedures. Which of the following is used when the CPU sends data to an I/O device and then works on another process's request until the I/O device is ready for more data?
进入题库练习
单选题Amultitaskingoperatingsystemcanhaveseveralprocessesrunningatthesametime.Whatarethecomponentswithintheprocessesthatareshowninthegraphicthatfollows?
进入题库练习
单选题As with logical access controls, audit logs should be produced and monitored for physical access controls. Which of the following statements is correct about auditing physical access?
进入题库练习
单选题Whatisthemissingsecondstepinthegraphicthatfollows?
进入题库练习
单选题Thereareseveraldifferenttypesofauthenticationtechnologies.Whichtypeisbeingshowninthegraphicthatfollows?
进入题库练习
单选题Severaldifferenttypesofsmokeandfiredetectorscanbeused.Whattypeofdetectorisshowninthefollowinggraphic?
进入题库练习
单选题Which of the following occurs in a PK.I environment?
进入题库练习
单选题The following scenario will be used for questions 28 and 29.Jack has been told that successful attacks have been taking place and data that have been encrypted by his company's software systems have leaked to the company's competitors. Through Jack's investigation he has discovered that the lack of randomness in the seeding values used by the encryption algorithms in the company's software uncovered patterns and allowed for successful reverse engineering.
进入题库练习
单选题Which of the following correctly best describes an object-oriented database?
进入题库练习
单选题Whattypeoftechnologyisrepresentedinthegraphicthatfollows?
进入题库练习
单选题Management support is critical to the success of a business continuity plan. Which of the following is the most important to be provided to management to obtain their support?
进入题库练习
单选题Risk assessment has several different methodologies. Which of the following official risk methodologies was not created for the purpose of analyzing security risks?
进入题库练习
单选题As his company's business continuity coordinator, Matthew is responsible for helping recruit members to the business continuity planning (BCP) committee. Which of the following does not correctly describe this effort?
进入题库练习
单选题Which of the following indicates to a packet where to go and how to communicate with the right service or protocol on the destination computer?
进入题库练习
单选题Guidelines should be followed to allow secure remote administration. Which of the following is not one of those guidelines?
进入题库练习
单选题Tom works at a large retail company that recently deployed radio-frequency identification (RFID) to better manage its inventory processes. Employees use scanners to gather product-related information instead of manually looking up product data. Tom has found out that malicious customers have carried out attacks on the RFID technology to reduce the amount they pay on store items. Which of the following is the most likely reason for the existence of this type of vulnerability?
进入题库练习
单选题Whattypeofsecurityencryptioncomponentismissingfromthetablethatfollows?
进入题库练习
单选题Jill is establishing a companywide sales program that will require different user groups with different privileges to access information on a centralized database. How should the security manager secure the database?
进入题库练习
单选题Which of the following is a correct description of the pros and cons associated with third-generation programming languages?
进入题库练习
单选题Whattypeofriskanalysisapproachdoesthefollowinggraphicprovide?
进入题库练习
单选题There are different types of approaches to regulations. Which of the following is an example of self-regulation?
进入题库练习
单选题Gizmos and Gadgets has restored its original facility after a disaster. What should be moved in first?
进入题库练习
单选题IDSs can detect intruders by employing electromechanical systems or volumetric systems. Which of the following correctly describes these systems?
进入题库练习
单选题Which of the following is a legal form of eavesdropping when performed with prior consent or a warrant?
进入题库练习