CISSP官方習(xí)題集(中英對照)場景套題整理_第1頁
CISSP官方習(xí)題集(中英對照)場景套題整理_第2頁
CISSP官方習(xí)題集(中英對照)場景套題整理_第3頁
CISSP官方習(xí)題集(中英對照)場景套題整理_第4頁
CISSP官方習(xí)題集(中英對照)場景套題整理_第5頁
已閱讀5頁,還剩6頁未讀 繼續(xù)免費閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)

文檔簡介

1、Refer to the information below to answer the question.A new employee is given a laptop computer with full administrator access. This employee does not have a personal computer at home and has a child that uses the computer to send and receive email, search the web, and use instant messaging. The org

2、anizations Information Technology (IT) department discovers that a peer-to-peer program has been installed on the computer using the employees access. Which of the following could have MOST likely prevented the Peer-toPeer (P2P) program from being installed on the computer?一名新員工拿到了具有管理員全權(quán)訪問權(quán)限的筆記本電腦。

3、他家里沒有個人電腦,有個孩子 也使用這臺電腦發(fā)送和接受電子郵件,搜索網(wǎng)頁,并使用即時消息。機構(gòu)信息技術(shù)(IT)部 門發(fā)現(xiàn)有個對等程序已通過該員工的訪問權(quán)安裝在了電腦上。以下哪一項最有可能阻止對等(P2P, Peer-to-Peer)程序在計算機上的安裝?Removing employees full access to the computer 去除員工對計算機的完全訪問權(quán)Supervising their childs use of the computer 監(jiān)督員工孩子對計算機的使用Limiting computers access to only the employee 限制計算機只能

4、由員工使用Ensuring employee understands their business conduct guidelines 確保員工理解公司的業(yè)務(wù) 行為準那么Answer: ARefer to the information below to answer the question.A new employee is given a laptop computer with full administrator access. This employee does not have a personal computer at home and has a child that

5、uses the computer to send and receive email, search the web, and use instant messaging. The organizations Information Technology (IT) department discovers that a peer-to-peer program has been installed on the computer using the employees access. Which of the following solutions would have MOST likel

6、y detected the use of peer-to-peer programs when the computer was connected to the office network?一名新員工拿到了具有管理員全權(quán)訪問權(quán)限的筆記本電腦。他家里沒有個人電腦,有個孩子 也使用這臺電腦發(fā)送和接受電子郵件,搜索網(wǎng)頁,并使用即時消息。機構(gòu)信息技術(shù)(IT)部 門發(fā)現(xiàn)有個對等程序已通過該員工的訪問權(quán)安裝在了電腦上。以下哪一個解決方案最有可能檢測到計算機與辦公室網(wǎng)絡(luò)連接時使用了對等程序?Anti-virus software 防病毒軟件Intrusion Prevention System (IP

7、S)入侵防御系統(tǒng)(IPS)Anti-spyware software 反間諜軟件Integrity checking so代ware 完整性檢查軟件Answer: BRefer to the information below to answer the question.A new employee is given a laptop computer with full administrator access. This employee does not have a personal computer at home and has a child that uses the com

8、puter to send and receive email, search the web, and use instant messaging. The organizations Information Technology (IT) department discovers that a peer-to-peer program has been installed on the computer using the employees access. Which of the following methods is the MOST effective way of removi

9、ng theTable BTable AUserClearance LevelARestrictedBConfidentialCSecretDTop SecretFilesSecurity Class1Restricted2Confidential3Secret4Top SecretIn a Bell-LaPadula system, which user cannot write to File 3?在Bell-LaPadula系統(tǒng)中,哪個用戶無法寫入文件3?User AUser BUserCUser DAnswer: DRefer to the information below to a

10、nswer the question.In a Multilevel Security (MLS) system, the following sensitivity labels are used in increasing levels of sensitivity: restricted, confidential, secret, top secret. Table A lists the clearance levels for four users, while Table B lists the security classes of four different files.在

11、多級平安(MLS)系統(tǒng)中,以下靈敏度標簽用于增加靈敏度級別:受限,機密,秘密,最 高機密。表A列出了四個用戶的清除級別,而表B列出了四個不同文件的平安級別。Table ATable BUserClearance LevelARestrictedBConfidentialCSecretDTop SecretUserClearance LevelARestrictedBConfidentialCSecretDTop SecretFilesSecurity Class1Restricted2Confidential3Secret4Top SecretIn a Bell-LaPadula system

12、, which user has the MOST restrictions when writing data to any of the four files?在Bell-LaPadula系統(tǒng)中,哪個用戶在向四個文件中的任何一個寫入數(shù)據(jù)時都最受限制?User AUser BUserCUser DAnswer: DRefer to the information below to answer the question.Desktop computers in an organization were sanitized for re-use in an equivalent securit

13、y environment. The data was destroyed in accordance with organizational policy and all marking and other external indications of the sensitivity of the data that was formerly stored on the magnetic drives were removed.某機構(gòu)對桌面計算機進行消毒,以便在相等的平安性環(huán)境下重新使用。 數(shù)據(jù)以符合該機構(gòu)政策的方式加以銷毀,所有標記以及此前存儲在磁盤驅(qū)動器上的其他外部 數(shù)據(jù)其敏感性標志均

14、以消除。After magnetic drives were degaussed twice according to the product manufacturers directions, what is the MOST LIKELY security issue with degaussing?按照產(chǎn)品制造商的指示對磁盤驅(qū)動器進行兩次消磁后,以下哪一項為哪一項與消磁相關(guān)的最可能的 平安問題?Commercial products often have serious weaknesses of the magnetic force available in the degausser

15、 product.商業(yè)化消磁器產(chǎn)品中的可用磁力往往具有嚴重缺陷Degausser products may not be properly maintained and operated. 可能沒有正確維護和操 作消磁產(chǎn)品The inability to turn the drive around in the chamber for the second pass due to human error. 由于人為錯誤而導(dǎo)致第二次消磁時驅(qū)動器無法在腔室內(nèi)轉(zhuǎn)動Inadequate record keeping when sanitizing media.在消毒介質(zhì)時記錄保存不當 Answer:

16、BRefer to the information below to answer the question.Desktop computers in an organization were sanitized for re-use in an equivalent security environment. The data was destroyed in accordance with organizational policy and all marking and other external indications of the sensitivity of the data t

17、hat was formerly stored on the magnetic drives were removed.某機構(gòu)對桌面計算機進行消毒,以便在相等的平安性環(huán)境下重新使用。數(shù)據(jù)以符合該機構(gòu)政 策的方式加以銷毀,所有標記以及此前存儲在磁盤驅(qū)動器上的其他外部數(shù)據(jù)其敏感性標志均 以消除。Organizational policy requires the deletion of user data from Personal Digital Assistant (PDA) devices before disposal. It may not be possible to delete t

18、he user data if the device is malfunctioning. Which destruction method below provides the BEST assurance that the data has been removed?機構(gòu)的政策要求在處置個人數(shù)字助理(PDA)設(shè)備以前從中刪除用戶數(shù)據(jù)。如果設(shè)備出現(xiàn)故 障,可能無法刪除用戶數(shù)據(jù)。以下哪一項銷毀方法最有效地確保數(shù)據(jù)已刪除?Knurling 刻痕Grinding 磨碎Shredding 切碎Degaussing 消磁Answer: CRefer to the information below t

19、o answer the question.A large, multinational organization has decided to outsource a portion of their Information Technology (IT) organization to a third-party providers facility. This provider will be responsible for the design, development, testing, and support of several critical, customer-based

20、applications used by the organization.一家大型跨國公司決定將其信息技術(shù)(ITJnformation Technology)組織的一局部外包給第三 方供應(yīng)商。這一供應(yīng)商將負責設(shè)計、開發(fā)和測試公司使用的幾個基于客戶的關(guān)鍵性應(yīng)用程序, 并負責對應(yīng)用程序提供支持。The third party needs to have第三方需要具備processes that are identical to that of the organization doing the outsourcing. 與等業(yè)務(wù)夕卜包 的組織完全相同的流程access to the origi

21、nal personnel that were on staff at the organization, 組織員工的原始人員 訪問權(quán)限the ability to maintain all of the applications in languages they are familiar with. 使用熟悉的語 言維護所有應(yīng)用程序的能力access to the skill sets consistent with the programming languages used by the organization. 能訪問與組織使用的編程語言一致的技能集Answer: DRefer t

22、o the information below to answer the question.A large, multinational organization has decided to outsource a portion of their Information Technology (IT) organization to a third-party providers facility. This provider will be responsible for the design, development, testing, and support of several

23、critical, customer-based applications used by the organization.一家大型跨國公司決定將其信息技術(shù)(ITJnformation Technology)組織的一局部外包給第三 方供應(yīng)商。這一供應(yīng)商將負責設(shè)計、開發(fā)和測試公司使用的幾個基于客戶的關(guān)鍵性應(yīng)用程序, 并負責對應(yīng)用程序提供支持。The organization should ensure that the third partys physical security controls are in place so that they組織應(yīng)確保第三方的物理平安控制措施到位,以便a

24、re more rigorous than the original controls.比原來的控制措施更嚴格are able to limit access to sensitive information.能夠限制對敏感信息的訪問allow access by the organization staff at any time.允許組織員工隨時存取cannot be accessed by subcontractors of the third party.不能由第三方的分包商訪問 Answer: BRefer to the information below to answer the

25、 question.A large, multinational organization has decided to outsource a portion of their Information Technology (IT) organization to a third-party providers facility. This provider will be responsible for the design, development, testing, and support of several critical, customer-based applications

26、 used by the organization.一家大型跨國公司決定將其信息技術(shù)(ITJnformation Technology)組織的一局部外包給第三 方供應(yīng)商。這一供應(yīng)商將負責設(shè)計、開發(fā)和測試公司使用的幾個基于客戶的關(guān)鍵性應(yīng)用程序, 并負責對應(yīng)用程序提供支持。What additional considerations are there if the third party is located in a different country? 如果第三方位于其他國家,有哪些額外的考慮事項?The organizational structure of the third party

27、 and how it may impact timelines within the organization第三方的組織結(jié)構(gòu)以及可能以何種方式影響公司的日程The ability of the third party to respond to the organization in a timely manner and with accurate information第三方對公司作出及時響應(yīng)和提供準確信息的能力The effects of transborder data flows and customer expectations regarding the storage or

28、 processing of their data跨境數(shù)據(jù)流的影響以及客戶對其數(shù)據(jù)存儲和處理方面的期望The quantity of data that must be provided to the third party and how it is to be used 必須提供 給第三方的數(shù)據(jù)量及其使用方式Answer: CPeer-to-Peer (P2P) program from the computer?一名新員工拿到了具有管理員全權(quán)訪問權(quán)限的筆記本電腦。他家里沒有個人電腦,有個孩子 也使用這臺電腦發(fā)送和接受電子郵件,搜索網(wǎng)頁,并使用即時消息。機構(gòu)信息技術(shù)(IT)部 門發(fā)現(xiàn)有個對

29、等程序已通過該員工的訪問權(quán)安裝在了電腦上。以下哪一個方法是從計算機刪除對等(P2P, Peer-to-Peer)程序的最有效方式?Run software uninstall 運行軟件卸載Re-image the computer重新映像計算機Find and remove all installation files 查找并刪除所有安裝文件Delete all cookies stored in the web browser cache 刪除存儲在 WEB 瀏覽器緩存中的所有 cookieAnswer: BRefer to the information below to answer t

30、he question.A new employee is given a laptop computer with full administrator access. This employee does not have a personal computer at home and has a child that uses the computer to send and receive email, search the web, and use instant messaging. The organization/s Information Technology (IT) de

31、partment discovers that a peer-to-peer program has been installed on the computer using the employees access. Which of the following documents explains the proper use of the organizations assets?一名新員工拿到了具有管理員全權(quán)訪問權(quán)限的筆記本電腦。他家里沒有個人電腦,有個孩子 也使用這臺電腦發(fā)送和接受電子郵件,搜索網(wǎng)頁,并使用即時消息、。機構(gòu)信息技術(shù)(IT)部 門發(fā)現(xiàn)有個對等程序已通過該員工的訪問權(quán)安裝

32、在了電腦上。以下哪一個文檔解釋了對機構(gòu)資產(chǎn)的正確使用?Human resources policy 人力資源政策Acceptable use policy可接受的使用政策Code of ethics 道德準那么Access control policy 訪問控制政策Answer: BRefer to the information below to answer the question.A security practitioner detects client-based attacks on the organization/s network. A plan will be neces

33、sary to address these concerns.平安從業(yè)者檢測到機構(gòu)網(wǎng)絡(luò)上基于客戶端的攻擊,將需 要有一個計劃來解決這些顧慮。In the plan, what is the BEST approach to mitigate future internal client-based attacks? 在該計劃中,以下哪一項為哪一項減緩未來內(nèi)部的基于客戶端攻擊的最正確方法?Block all client side web exploits at the perimeter.在外圍攔截所有客戶端的 web 漏洞Remove all non-essential client-sid

34、e web services from the network.從網(wǎng)絡(luò)刪除所有非必需 的客戶端web服務(wù)Screen for harmful exploits of client-side services before implementation. 在實施前篩查客戶 端服務(wù)的有害漏洞Harden the client image before deployment.在部署前強化客戶映像Answer: DRefer to the information below to answer the question.A security practitioner detects client-ba

35、sed attacks on the organizations network. A plan will be necessary to address these concerns.平安從業(yè)者檢測到機構(gòu)網(wǎng)絡(luò)上基于客戶端的攻擊,將需 要有一個計劃來解決這些顧慮。In addition to web browsers, what PRIMARY areas need to be addressed concerning mobile code used for malicious purposes?針對惡意目的所用的移動代碼,除了網(wǎng)絡(luò)瀏覽器之外,需要解 決以下哪些主要領(lǐng)域Text editor

36、s, database, and Internet phone applications 文本編輯器,數(shù)據(jù)庫和網(wǎng)絡(luò) 應(yīng)用 程序Email, presentation, and database applications 電子郵件,演示和數(shù)據(jù)庫應(yīng)用程序Image libraries, presentation and spreadsheet applications 圖像庫,演示和電子表格應(yīng)用程序Email, media players, and instant messaging applications 電子郵件,媒體播放器和即時消息 應(yīng)用程序Answer: DRefer to the in

37、formation below to answer the question.A security practitioner detects client-based attacks on the organizations network. A plan will be necessary to address these concerns.平安從業(yè)者檢測到機構(gòu)網(wǎng)絡(luò)上基于客戶端的攻擊,將需 要有一個計劃來解決這些顧慮。What MUST the plan include in order to reduce client-side exploitation?為了減少客戶端漏洞被 利用,該計劃

38、必須包括以下哪一項?Approved web browsers批準的網(wǎng)絡(luò)瀏覽器Network firewall procedures 網(wǎng)絡(luò)防火墻規(guī)程Proxy configuration 代理配置Employee education 員工教育Answer: DRefer to the information below to answer the question.A security practitioner detects client-based attacks on the organizations network. A plan will be necessary to addre

39、ss these concerns.平安從業(yè)者檢測到機構(gòu)網(wǎng)絡(luò)上基于客戶端的攻擊,將需 要有一個計劃來解決這些顧慮。What is the BEST reason for the organization to pursue a plan to mitigate client-based attacks? 以 下哪一項為哪一項機構(gòu)貫徹計劃以緩解客戶端攻擊的最正確理由?Client privilege administration is inherently weaker than server privilege administration. 客戶 端權(quán)限管理本質(zhì)上比服務(wù)器權(quán)限管理更微弱Cli

40、ent hardening and management is easier on clients than on servers.在客戶端踐彳亍客戶強 化和管理比在服務(wù)器上更簡單Client-based attacks are more common and easier to exploit than server and network based attacks.與基于服務(wù)器和網(wǎng)絡(luò)的攻擊相比,基于客戶端的攻擊更為常見也更容易利用 D. Client-based attacks have higher financial impact.基于客戶端的攻擊其財務(wù)影響更大 Answer: CR

41、efer to the information below to answer the question.A large organization uses unique identifiers and requires them at the start of every system session. Application access is based on job classification. The organization is subject to periodic independent reviews of access controls and violations.

42、The organization uses wired and wireless networks and remote access. The organization also uses secure connections to branch offices and secure backup and recovery strategies for selected information and processes.一個大型組織使用唯一的身份標識,并要求他們在每次系統(tǒng)會話的開始時使用。應(yīng)用程序訪 問是基于工作職責的分類。該組織定期對面問控制和違規(guī)進行獨立的審核。該組織使用了有 線和無線

43、網(wǎng)絡(luò),以及遠程訪問。該組織還使用了到分支機構(gòu)的平安連接,以及針對某些選擇 的信息和流程實施平安的備份和恢復(fù)策略。Which of the following BEST describes the access control methodology used?以下哪項最好的描述了該組織采用的訪問控制方法?Least privilege 最小特權(quán)Lattice Based Access Control (LBAC)基于柵格的訪問控制Role Based Access Control (RBAC)基于角色的訪 問控制Lightweight Directory Access Control (LDA

44、P)輕量目錄訪問控制 Answer: CRefer to the information below to answer the question.A large organization uses unique identifiers and requires them at the start of every system session. Application access is based on job classification. The organization is subject to periodic independent reviews of access cont

45、rols and violations. The organization uses wired and wireless networks and remote access. The organization also uses secure connections to branch offices and secure backup and recovery strategies for selected information and processes.一個大型組織使用唯一的身份標識,并要求他們在每次系統(tǒng)會話的開始時使用。應(yīng)用程序訪 問是基于工作職責的分類。該組織定期對面問控制和違

46、規(guī)進行獨立的審核。該組織使用了有 線和無線網(wǎng)絡(luò),以及遠程訪問。該組織還使用了到分支機構(gòu)的平安連接,以及針對某些選擇 的信息和流程實施平安的備份和恢復(fù)策略。In addition to authentication at the start of the user session, best practice would require reauthentication除了在用戶會話開始時進行身份驗證,最正確做法應(yīng)在什么情況下要求重新認證?periodically during a session.在會話期間定期的for each business process.對每個業(yè)務(wù)流程at syste

47、m sign-off.從系統(tǒng)注銷時after a period of inactivity.在(會話)不活躍一段時間之后Answer: DRefer to the information below to answer the question.A large organization uses unique identifiers and requires them at the start of every system session. Application access is based on job classification. The organization is subje

48、ct to periodic independent reviews of access controls and violations. The organization uses wired and wireless networks and remote access. The organization also uses secure connections to branch offices and secure backup and recovery strategies for selected information and processes.一個大型組織使用唯一的身份標識,

49、并要求他們在每次系統(tǒng)會話的開始時使用。應(yīng)用程序訪 問是基于工作職責的分類。該組織定期對面問控制和違規(guī)進行獨立的審核。該組織使用了有 線和無線網(wǎng)絡(luò),以及遠程訪問。該組織還使用了到分支機構(gòu)的平安連接,以及針對某些選擇 的信息和流程實施平安的備份和恢復(fù)策略。Following best practice, where should the permitted access for each department and job classification combination be specified?按照最正確實踐,每個部門和工作分類組合的訪問許可應(yīng)在哪里指定?Security procedu

50、res 平安程序Security standards 平安標準Human resource policy 人力資源政策Human resource standards 人力資源標準Answer: BRefer to the information below to answer the question.A large organization uses unique identifiers and requires them at the start of every system session. Application access is based on job classificat

51、ion. The organization is subject to periodic independent reviews of access controls and violations. The organization uses wired and wireless networks and remote access. The organization also uses secure connections to branch offices and secure backup and recovery strategies for selected information

52、and processes.一個大型組織使用唯一的身份標識,并要求他們在每次系統(tǒng)會話的開始時使用。應(yīng)用程序訪 問是基于工作職責的分類。該組織定期對面問控制和違規(guī)進行獨立的審核。該組織使用了有 線和無線網(wǎng)絡(luò),以及遠程訪問。該組織還使用了到分支機構(gòu)的平安連接,以及針對某些選擇 的信息和流程實施平安的備份和恢復(fù)策略。What MUST the access control logs contain in addition to the identifier?那么訪問控制日志除了身份標識以外還必須包含什么內(nèi)容?Time of the access 訪 問的時間Security classificati

53、on 平安分類Denied access attempts 拒絕訪問嘗試Associated clearance相關(guān)的身份級別Answer: ARefer to the information below to answer the question.An organization has hired an information security officer to lead their security department. The officer has adequate people resources but is lacking the other necessary comp

54、onents to have an effective security program. There are numerous initiatives requiring security involvement.某機構(gòu)聘用了平安官來領(lǐng)導(dǎo)其平安部門。這名平安官由足夠的人力資源,但是缺少有效平安 計劃所的其他必要構(gòu)成局部。有許多行動方案都要求平安方面的介入。Which of the following is considered the MOST important priority for the information security officer?以下哪一項被認為是信息平安官最重要的

55、優(yōu)先事項?Formal acceptance of the security strategy 正工1接受平安策W各Disciplinary actions taken against unethical behavior 對不道德行為采取的紀律處分Development of an awareness program for new employees 為新員工制定平安意識培訓(xùn)計劃 D. Audit of all organization system configurations for faults 審計機構(gòu)所有系統(tǒng)配置是否存在過 錯Answer: ARefer to the infor

56、mation below to answer the question.An organization has hired an information security officer to lead their security department. The officer has adequate people resources but is lacking the other necessary components to have an effective security program. There are numerous initiatives requiring sec

57、urity involvement. 某機構(gòu)聘用了平安官來領(lǐng)導(dǎo)其平安部門。這名平安官由足夠的人力資源,但是缺少有效平安 計劃所的其他必要構(gòu)成局部。有許多行動方案都要求平安方面的介入。The effectiveness of the security program can PRIMARILY be measured through 衡量平安計劃有效性的主要手段是audit findings.審計發(fā)現(xiàn)risk elimination.風險消除audit requirements. 審計要求customer satisfaction.客戶滿意度Answer: ARefer to the infor

58、mation below to answer the question.An organization has hired an information security officer to lead their security department. The officer has adequate people resources but is lacking the other necessary components to have an effective security program. There are numerous initiatives requiring sec

59、urity involvement.某機構(gòu)聘用了平安官來領(lǐng)導(dǎo)其平安部門。這名平安官由足夠的人力資源,但是缺少有效平安 計劃所的其他必要構(gòu)成局部。有許多行動方案都要求平安方面的介入。Given the number of priorities, which of the following will MOST likely influence the selection of top initiatives?考慮到一定數(shù)量的優(yōu)先事項,以下哪一項最有可能影響對頂級舉措的選擇?Severity of risk風險的嚴重程度Complexity of strategy 策略的復(fù)雜性Frequency

60、of incidents 事故的頻率Ongoing awareness不斷的平安意識教育Answer: ARefer to the information below to answer the question.An organization has hired an information security officer to lead their security department. The officer has adequate people resources but is lacking the other necessary components to have an e

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
  • 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論