Page 1501 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1501
Review Questions
1. What is the most commonly used technique to protect against virus
attacks?
A. Signature detection
B. Heuristic detection
C. Data integrity assurance
D. Automated reconstruction
2. You are the security administrator for an e-commerce company
and are placing a new web server into production. What network
zone should you use?
A. Internet
B. DMZ
C. Intranet
D. Sandbox
3. Which one of the following types of attacks relies on the difference
between the timing of two events?
A. Smurf
B. TOCTOU
C. Land
D. Fraggle
4. Which one of the following techniques is most closely associated
with APT attacks?
A. Zero-day exploit
B. Social engineering
C. Trojan horse
D. SQL injection

