Page 1501 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1501

Review Questions



                1.  What is the most commonly used technique to protect against virus
                    attacks?

                    A.  Signature detection

                    B.  Heuristic detection

                    C.  Data integrity assurance

                    D.  Automated reconstruction

                2.  You are the security administrator for an e-commerce company
                    and are placing a new web server into production. What network

                    zone should you use?

                    A.  Internet

                    B.  DMZ

                    C.  Intranet

                    D.  Sandbox

                3.  Which one of the following types of attacks relies on the difference
                    between the timing of two events?

                    A.  Smurf

                    B.  TOCTOU


                    C.  Land

                    D.  Fraggle

                4.  Which one of the following techniques is most closely associated
                    with APT attacks?

                    A.  Zero-day exploit

                    B.  Social engineering

                    C.  Trojan horse

                    D.  SQL injection
   1496   1497   1498   1499   1500   1501   1502   1503   1504   1505   1506