Our experts have gathered these CISSP Operational Security MCQs through research, and we hope that you will be able to see how much knowledge base you have for the subject of CISSP Operational Security by answering these 30 multiple-choice questions.
Get started now by scrolling down!
A. Dictionary method of password cracking
B. Ping of death
C. Rotation of job/duties
D. RAID
A. DDOS
B. SYN Flood
C. Mandatory vacation
D. Differential backup
A. Wiping
B. Physical destruction
C. RAID 1+0
D. Virus
A. Password guessing
B. Wiping
C. RAID 0
D. Worm
A. Eradication
B. Incremental backup
C. Brute force approach to password cracking
D. Need to know
A. Brute force approach to password cracking
B. Recovery
C. Password cracking
D. Worm
A. Macro virus
B. Fraggle
C. DOS
D. Password guessing
A. Collusion
B. Malware
C. Change management
D. Macro virus
A. Hybrid approach to password cracking
B. Rotation of job/duties
C. Brute force approach to password cracking
D. Striping
A. Ping of death
B. Password cracking
C. RAID
D. Dictionary method of password cracking
A. Malware
B. Full backup
C. Man in the middle attack
D. Separation of duties
A. Recovery
B. Mandatory vacation
C. Containment
D. Man in the middle attack
A. Reporting
B. Smurf
C. DNS reflection
D. Mirroring
A. Ping of death
B. Brute force approach to password cracking
C. Collusion
D. Principle of least privileges
A. RAID 0+1
B. RAID 6
C. Non-disclosure agreement
D. Account lockouts
A. Reporting
B. Differential backup
C. Principle of least privileges
D. Degaussing
A. RAID 1
B. Trojan horse
C. Eradication
D. Man in the middle attack
A. Degaussing
B. Rotation of job/duties
C. Detection
D. Fraggle
A. RAID 5
B. Worm
C. Threat vectors
D. Password cracking
A. Passive-active cluster
B. RAID 5
C. Spoofing
D. Need to know
A. High availability clusters
B. Threat agent
C. Collusion
D. Reporting
A. RAID 0+1
B. DNS reflection
C. Account lockouts
D. Password guessing
A. RAID 5
B. Service level agreements
C. Threat vectors
D. RAID 0
A. Eradication
B. Threat vectors
C. Password guessing
D. Clipping levels
A. Detection
B. RAID 1
C. Non-disclosure agreement
D. RAID 5
A. Active-active
B. Macro virus
C. Data remanence
D. Striping
A. RAID
B. Recovery
C. Mirroring
D. Brute force approach to password cracking
A. Active-active
B. Non-disclosure agreement
C. Worm
D. Malware
A. Spoofing
B. Nested raid
C. Sniffing
D. Zero day attacks
A. Reporting
B. Full backup
C. Service level agreements
D. RAID 4