Skip survey header

CISSP Practice Quiz: Domain 7: Security Operations Quiz 1

CISSP Practice Quiz: Domain 7: Security Operations Quiz 1

1. Betsy is a security operations analyst at a major company and wishes to conduct a network vulnerability scan to identify security deficiencies in their environment. Which one of the following tools would best help her achieve this objective?
2. Mary is analyzing system logs after a security incident and notices many cases where remote systems initiated three-way TCP handshakes that were never completed. What type of attack likely occurred?
3. What level of RAID protection is also known as disk mirroring?
4. What type of intrusion detection system is best at detecting previously known attacks?
5. Tom is assessing the aftermath of a denial of service attack and discovers that his system received a large number of ICMP Echo Reply packets. What type of attack likely occurred?
6. What kind of attack is shown in the illustration below?

7. What is the first step of the incident response process?
8. Alan is developing the access control system for a new accounting system and implements a control that mandates that no individual may have both the permission to create a new vendor and issue a check. What security principle is most directly related to his actions?
9. Acme Widgets recently hired Ben to troubleshoot network stability issues. After running some tests, Ben determines that packets are consistently taking too long to travel from source to destination. What situation is Acme Widgets experiencing?
10. Harold set aside a portion of his organization’s IP address space that is not used by any legitimate system and instead used to identify malicious activity. What type of control has Harold built?