O'Reilly logo

CISSP Training Kit by David R. Miller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter review

Test your knowledge of the information in this chapter by answering these questions. The answers to these questions, and the explanations of why each answer choice is correct or incorrect, are located in the Answers section at the end of this chapter.

  1. Which of the following is not commonly used to eliminate single points of failure?

    1. RAID 0

    2. RAID 1

    3. A second connection to the Internet by using a different ISP

    4. Load balanced cluster server array

  2. In black box penetration testing, what information is provided to the red team about the target environment?

    1. The targets and testing time frame

    2. Everything

    3. Nothing

    4. The IP subnet architecture of the enterprise

  3. What term describes the statistical appraisal of the functional lifetime of a system or device? ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required