当前位置:网站首页>Daily CISSP certification common mistakes (April 14, 2022)
Daily CISSP certification common mistakes (April 14, 2022)
2022-04-23 18:18:00 【Tang Junfei - Mingxue Online】
CISSP Certification is often wrong ( From Mingxue online test platform :https://www.maxstu.com/page/1773704)
【 The answer is analyzed after the question 】
subject 1
Q:Melissa Be responsible for the safety compliance work of its organization , And was told that the organization would not install the patch until one month after it was released Windows Patch , Unless there are zero day vulnerabilities being actively exploited . Why do companies delay patching like this ?
Melissa is in charge of her organization’s security compliance efforts and has been told that the organization does not install Windows patches until a month has passed since the patch has been released unless there is a zero-day exploit that is being actively exploited. Why would the company delay patching like this?
A、 In order to minimize the impact of installation on the business
To minimize business impact of the installation
B、 To identify any defects in the patch
To allow any flaws with the patch to be identified
C、 In order to prevent malware in the patch from being installed before it is identified
To prevent malware in the patches from being installed before it is identified
D、 In order to distribute the patch to all systems
To allow the patch to be distributed to all systems
subject 2
Q:Fred Our company wants to ensure the integrity of e-mail sent through its central e-mail server . If the confidentiality of the message is not important ,Fred What solutions should be suggested ?
Fred's company wants to ensure the integrity of email messages sent via its central email servers. If the confidentiality of the messages is not critical, what solution should Fred suggest?
A、 Digitally sign and encrypt all messages , To ensure integrity
Digitally sign and encrypt all messages to ensure integrity.
B、 digital signature , But don't encrypt all messages
Digitally sign but don’t encrypt all messages.
C、 Use TLS Protect message , Ensure its integrity
Use TLS to protect messages, ensuring their integrity.
D、 Provide a hash in each message using a hash algorithm , To prove that it hasn't changed
Use a hashing algorithm to provide a hash in each message to prove that it hasn't changed.
subject 3
Q: service ticket (ST) stay Kerberos What is the role of authentication ?
What does a service ticket (ST) provide in Kerberos authentication?
A、 It acts as the authentication host
It serves as the authentication host.
B、 It can prove that the subject's access to the object is legal
It provides proof that the subject is authorized to access an object.
C、 It can prove that the subject has passed KDC Authentication , The subject can request a ticket to access a specific object
It provides proof that a subject has authenticated through a KDC and can request tickets to access other objects.
D、 It provides ticket granting Services
It provides ticket granting services.
---------------
There are more free online security certification test questions and wechat learning discussion groups , You can add Mingxue online assistant vx:maxstu_com, Get and join .
---------------
subject 1
answer :B
analysis : Many organizations delay the patch for a period of time , To ensure that any previously unrecognized defects are found before the patch is installed throughout the organization . Melissa She needs to balance business impact and security in her role , And according to the organization's risk tolerance and safety needs , Choose to support or promote more aggressive installation practices .
Many organizations delay patches for a period of time to ensure that any previously unidentified flaws are found before the patches are installed throughout their organization. Melissa needs to balance business impact against security in her role and may choose to support this or to push for more aggressive installation practices depending on the organization’s risk tolerance and security needs.
subject 2
answer :B
analysis :Fred Your company needs to protect integrity , This can be achieved by digitally signing messages . Any changes will invalidate the signature . Encryption is not required , Because the company doesn't want to protect confidentiality .TLS Can provide transmission protection , But it will not protect the integrity of the message ; Of course , If it cannot be verified that the hash value has not changed , Hash values also do not guarantee integrity .
Fred's company needs to protect integrity, which can be accomplished by digitally signing messages. Any change will cause the signature to be invalid. Encrypting isn't necessary because the company does not want to protect confidentiality. TLS can provide in-transit protection but won't protect integrity of the messages, and of course a hash used without a way to verify that the hash wasn't changed won't ensure integrity either.
subject 3
answer :B
analysis :Kerberos The service ticket in authentication proves that the subject is authorized to access the object . The ticket granting service is provided by TGS Provided .TGT The grant ticket provides proof that the subject has been authenticated , And authorize requests for access to other objects . Authentication host is a fabricated term .
The service ticket in Kerberos authentication provides proof that a subject is authorized to access an object. Ticket granting services are provided by the TGS. Proof that a subject has authenticated and can request tickets to other objects uses ticket-granting tickets, and authentication host is a made-up term.
版权声明
本文为[Tang Junfei - Mingxue Online]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204210610263651.html
边栏推荐
- Correct opening method of option
- JD-FreeFuck 京東薅羊毛控制面板 後臺命令執行漏洞
- Docker 安裝 Redis
- Robocode tutorial 8 - advanced robot
- C medium? This form of
- xlsxwriter. exceptions. Filecreateerror: [errno 13] permission denied
- Crawling mobile game website game details and comments (MQ + multithreading)
- Rewrite four functions such as StrCmp in C language
- Box pointer of rust
- re正則錶達式
猜你喜欢

WIN1 remote "this may be due to credssp encryption Oracle correction" solution

WiFi ap6212 driver transplantation and debugging analysis technical notes

Calculation of fishing net road density

Jeecg boot microservice architecture

How to install jsonpath package

Robocode tutorial 3 - Robo machine analysis

C medium? This form of

JD-FreeFuck 京东薅羊毛控制面板 后台命令执行漏洞

Batch export ArcGIS attribute table

powerdesigner各种字体设置;preview字体设置;sql字体设置
随机推荐
Re regular expression
MATLAB从入门到精通(二)
mysql自动启动设置用Systemctl start mysqld启动
Resolves the interface method that allows annotation requests to be written in postman
Mode of interprocess communication
Mysqldump backup database
The difference between deep copy and shallow copy
Identification verification code
Realization of consumer gray scale
14个py小游戏源代码分享第二弹
7-21 wrong questions involve knowledge points.
Analysez l'objet promise avec le noyau dur (Connaissez - vous les sept API communes obligatoires et les sept questions clés?)
Introduction to quantexa CDI syneo platform
What are the relationships and differences between threads and processes
【ACM】70. climb stairs
Robocode Tutorial 4 - robocode's game physics
Stanford machine learning course summary
Generate verification code
Cutting permission of logrotate file
Map basemap Library