Добавил:
Я за два дня прошел весь курс ТВиМС Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
!ОСНОВНАЯ КНИГА КУРСА! Chapple M. (ISC)2 CISSP Certified IS...Study Guide 9ed 2021.pdf
Скачиваний:
1
Добавлен:
20.06.2025
Размер:
15.75 Mб
Скачать

Review Questions

797

Review Questions

1.Which security principle involves the knowledge and possession of sensitive material as an aspect of one’s occupation?

A.Principle of least privilege

B.Separation of duties

C.Need to know

D.As-needed basis

2.An organization ensures that users are granted access to only the data they need to perform specific work tasks. What principle are they following?

A.Principle of least permission

B.Separation of duties (SoD)

C.Need to know

D.Job rotation

3.What concept is used to grants users only the rights and permissions they need to complete their job responsibilities?

A.Need to know

B.Mandatory vacations

C.Least privilege principle

D.Service-­level agreement (SLA)

4.A large organization using a Microsoft domain wants to limit the amount of time users have elevated privileges. Which of the following security operation concepts can be used to support this goal?

A.Principle of least permission

B.Separation of duties

C.Need to know

D.Privileged account management

5.An administrator is granting permissions to a database. What is the default level of access the administrator should grant to new users in the organization?

A.Read

B.Modify

C.Full access

D.No access

798Chapter 16  Managing Security Operations

6.You want to apply the least privilege principle when creating new accounts in the software development department. Which of the following should you do?

A.Create each account with only the rights and permissions needed by the employee to perform their job.

B.Give each account full rights and permissions to the servers in the software development department.

C.Create each account with no rights and permissions.

D.Add the accounts to the local Administrators group on the new employee’s computer.

7.Your organization has divided a high-­level auditing function into several individual job tasks. These tasks are divided between three administrators. None of the administrators can perform all of the tasks. What does this describe?

A.Job rotation

B.Mandatory vacation

C.Separation of duties

D.Least privilege

8.A financial organization commonly has employees switch duty responsibilities every 6 months. What security principle are they employing?

A.Job rotation

B.Separation of duties

C.Mandatory vacations

D.Least privilege

9.Which of the following is one of the primary reasons an organization enforces a mandatory vacation policy?

A.To rotate job responsibilities

B.To detect fraud

C.To increase employee productivity

D.To reduce employee stress levels

10.Your organization has contracted with a third-­party provider to host cloud-­based servers. Management wants to ensure there are monetary penalties if the third party doesn’t meet their contractual responsibilities related to uptimes and downtimes. Which of the following is the best choice to meet this requirement?

A.MOU

B.ISA

C.SLA

D.SED

Review Questions

799

11.Which one of the following is a cloud-­based service model that gives an organization the most control and requires the organization to perform all maintenance on operating systems and applications?

A.Infrastructure as a service (IaaS)

B.Platform as a service (PaaS)

C.Software as a service (SaaS)

D.Public

12.Which one of the following is a cloud-­based service model that allows users to access email via a web browser?

A.Infrastructure as a service (IaaS)

B.Platform as a service (PaaS)

C.Software as a service (SaaS)

D.Public

13.The IT department routinely uses images when deploying new systems. Of the following choices, what is a primary benefit of using images?

A.Provides a baseline for configuration management

B.Improves patch management response times

C.Reduces vulnerabilities from unpatched systems

D.Provides documentation for changes

14.A server administrator recently modified the configuration for a server to improve performance. Unfortunately, when an automated script runs once a week, the modification causes the server to reboot. It took several hours of troubleshooting to ultimately determine the problem wasn’t with the script but instead with the modification. What could have prevented this?

A.Vulnerability management

B.Patch management

C.Change management

D.Blocking all scripts

15.Which of the following steps would be included in a change management process? (Choose three.)

A.Immediately implement the change if it will improve performance.

B.Request the change.

C.Create a rollback plan for the change.

D.Document the change.

800Chapter 16  Managing Security Operations

16.A new CIO learned that an organization doesn’t have a change management program. The CIO insists one be implemented immediately. Of the following choices, what is a primary goal of a change management program?

A.Personnel safety

B.Allowing rollback of changes

C.Ensuring that changes do not reduce security

D.Auditing privilege access

17.Systems within an organization are configured to receive and apply patches automatically. After receiving a patch, 55 of the systems automatically restarted and booted into a stop error. What could have prevented this problem without sacrificing security?

A.Disable the setting to apply the patches automatically.

B.Implement a patch management program to approve all patches.

C.Ensure systems are routinely audited for patches.

D.Implement a patch management program that tests patches before deploying them.

18.A security administrator wants to verify the existing systems are up to date with current patches. Of the following choices, what is the best method to ensure systems have the required patches?

A.Patch management system

B.Patch scanner

C.Penetration tester

D.Fuzz tester

19.A recent attack on servers within your organization caused an excessive outage. You need to check systems for known issues that attackers may use to exploit other systems in your network. Which of the following is the best choice to meet this need?

A.Versioning tracker

B.Vulnerability scanner

C.Security audit

D.Security review

20.Which one of the following processes is most likely to list all security risks within a system?

A.Configuration management

B.Patch management

C.Hardware inventory

D.Vulnerability scan

Chapter

17

Preventing

and Responding to Incidents

THE CISSP EXAMTOPICS COVERED INTHIS CHAPTER INCLUDE:

Domain 7.0: Security Operations

■■7.2 Conduct logging and monitoring activities

■■7.2.1 Intrusion detection and prevention

■■7.2.2 Security Information and Event Management (SIEM)

■■7.2.3 Continuous monitoring

■■7.2.4 Egress monitoring

■■7.2.5 Log management

■■7.2.6Threat intelligence (e.g., threat feeds, threat hunting)

■■7.6 Conduct incident management

■■7.6.1 Detection

■■7.6.2 Response

■■7.6.3 Mitigation

■■7.6.4 Reporting

■■7.6.5 Recovery

■■7.6.6 Remediation

■■7.6.7 Lessons learned

■■7.7 Operate and maintain detective and preventative measures

■■7.7.2 Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)

■■7.7.3 Whitelisting/blacklisting

■■7.7.4Third-­party provided security services

■■7.7.5 Sandboxing

■■7.7.6 Honeypots/honeynets

■■7.7.7 Anti-malware

■■7.7.8 Machine learning and Artificial Intelligence (AI) based tools

Domain 8.0: Software Development Security

■■8.2 Identify and apply security controls in software development ecosystems

■■8.2.7 Security Orchestration, Automation, and Response (SOAR)

Соседние файлы в предмете Информационная безопасность автоматизированных систем