Page 1276 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1276

Review Questions



                1.  Which of the following is the best response after detecting and
                    verifying an incident?

                    A.  Contain it.

                    B.  Report it.

                    C.  Remediate it.

                    D.  Gather evidence.

                2.  Which of the following would security personnel do during the
                    remediation stage of an incident response?


                    A.  Contain the incident

                    B.  Collect evidence

                    C.  Rebuild system

                    D.  Root cause analysis

                3.  Which of the following are DoS attacks? (Choose three.)

                    A.  Teardrop

                    B.  Smurf

                    C.  Ping of death

                    D.  Spoofing


                4.  How does a SYN flood attack work?

                    A.  Exploits a packet processing glitch in Windows systems

                    B.  Uses an amplification network to flood a victim with packets

                    C.  Disrupts the three-way handshake used by TCP

                    D.  Sends oversized ping packets to a victim

                5.  A web server hosted on the internet was recently attacked,
                    exploiting a vulnerability in the operating system. The operating
                    system vendor assisted in the incident investigation and verified
   1271   1272   1273   1274   1275   1276   1277   1278   1279   1280   1281