Go Back on CISSP Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

CISSP Practice Test


Page 18 out of 298 Pages

Topic 9: Exam Set A

Which of the following is an attacker MOST likely to target to gain privileged access to a system?


A.

Programs that write to system resources


B.

Programs that write to user directories


C.

Log files containing sensitive information


D.

Log files containing system calls





A.
  

Programs that write to system resources



Logical access control programs are MOST effective when they are


A.

approved by external auditors.


B.

combined with security token technology.


C.

maintained by computer security officers.


D.

made part of the operating system.





D.
  

made part of the operating system.



What is the MOST effective countermeasure to a malicious code attack against a mobile system?


A.

Sandbox


B.

Change control


C.

Memory management


D.

Public-Key Infrastructure (PKI)





A.
  

Sandbox



The process of mutual authentication involves a computer system authenticating a user and authenticating the


A.

user to the audit process.


B.

computer system to the user.


C.

user's access to all authorized objects.


D.

computer system to the audit process





B.
  

computer system to the user.



The Hardware Abstraction Layer (HAL) is implemented in the


A.

system software.


B.

system hardware.


C.

application software.


D.

network hardware.





A.
  

system software.




Page 18 out of 298 Pages
Previous