최신 CISSP Concentrations CISSP-ISSAP 무료샘플문제:
1. In software development, which of the following analysis is used to document the services and functions that have been accidentally left out, deliberately eliminated or still need to be developed?
A) Requirement analysis
B) Gap analysis
C) Cost-benefit analysis
D) Vulnerability analysis
2. Which of the following protocols multicasts messages and information among all member devices in an IP multicast group?
A) IGMP
B) TCP
C) ARP
D) ICMP
3. John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-in-the-middle attack since the key exchange process of the cryptographic algorithm it is using does not thenticate participants. Which of the following cryptographic algorithms is being used by the We-are-secure server?
A) Diffie-Hellman
B) Blowfish
C) Twofish
D) RSA
4. You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You want to perform the following tasks: Develop a risk-driven enterprise information security architecture. Deliver security infrastructure solutions that support critical business initiatives. Which of the following methods will you use to accomplish these tasks?
A) Sherwood Applied Business Security Architecture
B) Service-oriented architecture
C) Service-oriented modeling framework
D) Service-oriented modeling and architecture
5. In which of the following Person-to-Person social engineering attacks does an attacker pretend to be an outside contractor, delivery person, etc., in order to gain physical access to the organization?
A) Important user posing attack
B) Third-party authorization attack
C) In person attack
D) Impersonation attack
질문과 대답:
질문 # 1 정답: B | 질문 # 2 정답: A | 질문 # 3 정답: A | 질문 # 4 정답: A | 질문 # 5 정답: D |