- 论坛徽章:
- 0
|
准备CISSP考试的都进来看看
QUESTION NO: 3\r\nWithin the realm of IT security, which of the following combinations best defines risk?\r\nA. Threat coupled with a breach.\r\nB. Threat coupled with a vulnerability.\r\nC. Vulnerability coupled with an attack.\r\nD. Threat coupled with a breach of security.\r\nAnswer: B\r\nExplanation: This is the main concept, when we talk about a possible risk we always have a possible\r\nvulnerability in the system attacked. This vulnerability can make a threat to be successful. We can say that\r\nthe level of risk can be measures through the level of vulnerabilities in our current systems and the ability of\r\nthe attackers to exploit them to make a threat successful.\r\nQUESTION NO: 4\r\nWhich of the following would be the best reason for separating the test and development\r\nenvironments?\r\nA. To restrict access to systems under test.\r\nB. To control the stability of the test environment.\r\nC. To segregate user and development staff.\r\nD. To secure access to systems under development.\r\nAnswer: B\r\nExplanation: This is the right answer, with a separation of the two environments (Test and development),\r\nwe can get a more stable and more “in control” environment, Since we are making tests in the development\r\nenvironment, we don’t want our production processes there, we don’t want to experiment things in our\r\nproduction processes. With a separation of the environments we can get a more risk free production\r\nenvironment and more control and flexibility over the test environment for the developers.\r\nQUESTION NO: 5\r\nWhich of the following statements pertaining to dealing with the media after a disaster occurred and\r\ndisturbed the organizations activities is incorrect?\r\nA. The CEO should always be the spokesperson for the company during a disaster.\r\nB. The disaster recover plan must include how the media is to be handled during the disaster.\r\nC. The organization’s spokesperson should report bad news before the press gets a hold of it through\r\nanother channel.\r\nD. An emergency press conference site should be planned ahead.\r\nAnswer: A\r\nExplanation: This is not a good practice, we cannot involves the CEO of the company to deal with the\r\nmedia in every case we have a disaster, depending on the severity of the disaster we can make the CEO talk,\r\nbut the best practice in the real world is to have a well-known person with that role, with special speaking\r\ncapabilities and knowledge about press methods. In general, the CEO always gets news of what happened,\r\nand he decides the company politics, then another designed employee (Usually from the disaster recovery\r\nteam) deals with the media.\r\nQUESTION NO: 6\r\nWhich Orange book security rating introduces security labels?\r\nA. C2\r\nB. B1\r\nC. B2\r\nD. B3\r\nAnswer: B\r\nExplanation: Class (B1) or “Labeled Security Protection” systems require all the features required for class\r\n(C2). In addition, an informal statement of the security policy model, data labeling, and mandatory access\r\ncontrol over named subjects and objects must be present. The capability must exist for accurately labeling\r\nexported information. Any flaws identified by testing must be removed.\r\nQUESTION NO: 7\r\nA Business Impact Analysis (BIA) does not:\r\nA. Recommend the appropriate recovery solution.\r\nB. Determine critical and necessary business functions and their resource dependencies.\r\nC. Identify critical computer applications and the associated outage tolerance.\r\nD. Estimate the financial impact of a disruption.\r\nAnswer: A\r\nExplanation: Remember that when we talk about a BIA (Business Impact Analysis), we are analyzing and\r\nidentifying possible issues about our infrastructure, in this kind of analysis we don’t make suggestions about\r\nwhat to do to recover from them. This is not an action plan, It’s an analysis about the business, the process that it relays on, the level of the systems and a estimative of the financial impact, or in other words, how\r\nmuch many we loose with our systems down. |
|