Page 1278 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1278

B.  Honeynet

                    C.  Padded cell


                    D.  Pseudo flaw
              10.  Of the following choices, what is the best form of anti-malware

                    protection?

                    A.  Multiple solutions on each system

                    B.  A single solution throughout the organization

                    C.  Anti-malware protection at several locations

                    D.  One-hundred-percent content filtering at all border gateways

               11.  When using penetration testing to verify the strength of your
                    security policy, which of the following is not recommended?

                    A.  Mimicking attacks previously perpetrated against your system

                    B.  Performing attacks without management knowledge


                    C.  Using manual and automated attack tools

                    D.  Reconfiguring the system to resolve any discovered
                        vulnerabilities

               12.  What is used to keep subjects accountable for their actions while
                    they are authenticated to a system?

                    A.  Authentication

                    B.  Monitoring

                    C.  Account lockout

                    D.  User entitlement reviews


               13.  What type of a security control is an audit trail?

                    A.  Administrative

                    B.  Detective

                    C.  Corrective

                    D.  Physical
   1273   1274   1275   1276   1277   1278   1279   1280   1281   1282   1283