Page 1278 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1278
B. Honeynet
C. Padded cell
D. Pseudo flaw
10. Of the following choices, what is the best form of anti-malware
protection?
A. Multiple solutions on each system
B. A single solution throughout the organization
C. Anti-malware protection at several locations
D. One-hundred-percent content filtering at all border gateways
11. When using penetration testing to verify the strength of your
security policy, which of the following is not recommended?
A. Mimicking attacks previously perpetrated against your system
B. Performing attacks without management knowledge
C. Using manual and automated attack tools
D. Reconfiguring the system to resolve any discovered
vulnerabilities
12. What is used to keep subjects accountable for their actions while
they are authenticated to a system?
A. Authentication
B. Monitoring
C. Account lockout
D. User entitlement reviews
13. What type of a security control is an audit trail?
A. Administrative
B. Detective
C. Corrective
D. Physical

