当前位置:网站首页>Daily CISSP certification common mistakes (April 15, 2022)
Daily CISSP certification common mistakes (April 15, 2022)
2022-04-23 18:18:00 【Tang Junfei - Mingxue Online】
CISSP Certification is often wrong ( From Mingxue online test platform :https://www.maxstu.com/page/1773704)
【 The answer is analyzed after the question 】
subject 1
Q: Which of the following fire extinguishing systems has the greatest accidental risk , It may damage the equipment in the data center ?
Which one of the following fire suppression systems poses the greatest risk of accidental discharge that damages equipment in a data center?
A、 Wet pipe
Wet pipe
B、 Main pipe
Dry pipe
C、 Water spray
Deluge
D、 Pretreatment system
Preaction
subject 2
Q: During software testing ,Jack Suppose a scene : A hacker wants to access the application he is reviewing .Jack Considering where hackers might start , Then he tests the system for the possible behavior of the attacker , Excuse me, Jack What kind of tests are being carried out ?
During software testing, Jack diagrams how a hacker might approach the application he is reviewing and determines what requirements the hacker might have. He then tests how the system would respond to the attacker's likely behavior. What type of testing is Jack conducting?
A、 Misuse case testing
Misuse case testing
B、 Use case testing
Use case testing
C、Hacker Use case testing
Hacker use case testing
D、 Static code analysis
Static code analysis
subject 3
Q:James Decided to implement a NAC Solution , Use the post admission principle to control the network connection . What kind of problems can't the post access principle solve ?
James has opted to implement a NAC solution that uses a post-admission philosophy for its control of network connectivity. What type of issues can't a strictly post-admission policy handle?
A、 Out of band monitoring
Out-of-band monitoring
B、 Prevent unconnected laptops from being used immediately after connecting to the network
Preventing an unpatched laptop from being exploited immediately after connecting to the network
C、 When the user behavior does not match the authorization matrix , Deny user access
Denying access when user behavior don’t match an authorization matrix
D、 When the user behavior satisfies the authorization based matrix , Allow users to access specific objects
Allowing a user access to a specific object when user behavior is allowed based on an authorization matrix
---------------
There are more free online security certification test questions and wechat learning discussion groups , You can add Mingxue online assistant vx:maxstu_com, Get and join .
---------------
subject 1
answer :A
analysis : Main pipe 、 The pipes used in the water spray and pretreatment system are normally empty , Once signs of fire are detected , The pipe is filled with water . The pipes used for wet pipes are always filled with water , If the pipe is damaged , May damage the equipment .
Dry pipe, deluge, and preaction systems all use pipes that remain empty until the system detects signs of a fire. Wet pipe systems use pipes filled with water that may damage equipment if there is damage to a pipe.
subject 2
answer :A
analysis :Jack Performing misuse case test , This test method focuses on the misuse of software . The purpose of static code testing is to check whether the code itself has defects , Instead of testing the software at runtime .Hacker Use case testing is a false word .
Jack is performing misuse case analysis, a process that tests code based on how it would perform if it was misused instead of used properly. Use case testing tests valid use cases, whereas static code analysis involves reviewing the code itself for flaws rather than testing the live software. Hacker use case testing not an industry term for a type of testing.
subject 3
answer :B
analysis : The post admission principle allows or denies access according to the user activities after connection . Since this does not check the state of the machine before connecting , Therefore, it is impossible to prevent the system from being used immediately after connection . This does not preclude out of band or in band monitoring , But it does mean : Before the system is allowed to enter the network , Strict post admission policies do not handle system checks .
A post-admission philosophy allows or denies access based on user activity after connection. Since this don’t check the status of a machine before it connects, it can't prevent the exploit of the system immediately after connection. This doesn't preclude out-of-band or in-band monitoring, but it does mean that a strictly post-admission policy won't handle system checks before the systems are admitted to the network.
版权声明
本文为[Tang Junfei - Mingxue Online]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204210610263538.html
边栏推荐
- 解决报错max virtual memory areas vm.max_map_count [65530] is too low, increase to at least [262144]
- Rust: the output information of println is displayed during the unit test
- Linux installs MySQL in RPM (super simple)
- According to the result set queried by SQL statement, it is encapsulated as JSON
- Introduction to quantexa CDI syneo platform
- WIN1 remote "this may be due to credssp encryption Oracle correction" solution
- Crawl the product data of Xiaomi Youpin app
- Refcell in rust
- Test post and login function
- Docker installation MySQL
猜你喜欢

Introduction to quantexa CDI syneo platform

positioner

Cygwin64 right click to add menu, and open cygwin64 here

QT tablewidget insert qcombobox drop-down box
![Resolve the error Max virtual memory areas VM max_ map_ count [65530] is too low, increase to at least [262144]](/img/5f/a80951777a0473fcaa685cd6a8e5dd.png)
Resolve the error Max virtual memory areas VM max_ map_ count [65530] is too low, increase to at least [262144]

Robocode tutorial 7 - Radar locking

Robocode tutorial 5 - enemy class

MATLAB从入门到精通(二)

Differences between SSD hard disk SATA interface and m.2 interface (detailed summary)

JD-FreeFuck 京东薅羊毛控制面板 后台命令执行漏洞
随机推荐
Use of regular expressions in QT
Read excel, int digital time to time
14 py games source code share the second bullet
Function recursion and solving interesting problems
Connection mode of QT signal and slot connect() and the return value of emit
Qt读写XML文件(含源码+注释)
Nodejs installation
Svn simple operation command
Rust: how to match a string?
【ACM】509. Fibonacci number (DP Trilogy)
Multi thread crawling Marco Polo network supplier data
Introduction to quantexa CDI syneo platform
QT notes on qmap container freeing memory
Format problems encountered in word typesetting
Dynamically add default fusing rules to feign client based on sentinel + Nacos
硬核解析Promise对象(这七个必会的常用API和七个关键问题你都了解吗?)
Ionic 从创建到打包指令集顺序
SQL database syntax learning notes
Hard core parsing promise object (do you know these seven common APIs and seven key questions?)
Stm32mp157 wm8960 audio driver debugging notes