IT CertificationsAnswer Key

Wiley Cissp Test Bank

8 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Lower ___________ provides better software design because objects are more independent.

ANSWER

coupling

QUESTION 2

Define proactive and reactive threat modeling?

ANSWER

A proactive approach to threat modeling takes place during early stages of systems development, specifically during initial design and specifications establishment. This type of threat modeling is also known as a defensive approach. This method is based on predicting threats and designing in specific defenses during the coding and crafting process rather than relying on post-deployment updates and patches. A reactive approach to threat modeling takes place after a product has been created and deployed. This deployment could be in a test or laboratory environment or to the general marketplace. This type of threat modeling is also known as the adversarial approach. This technique of threat modeling is the core concept behind ethical hacking, penetration testing, source code review, and fuzz testing.

QUESTION 3

What is the communication to or input of an object?

ANSWER

Message

QUESTION 4

What are often added to passwords under Linux to make their resultant hash even more secure?

ANSWER

Salts

QUESTION 5

Which type of computer crime would likely be timed to occur simultaneously with a physical attack to reduce the ability to effectively respond to the physical attack?

ANSWER

Terrorist attack

QUESTION 6

What are some common reasons a certificate might need to be revoked?

ANSWER

The certificate was compromised, the certificate was erroneously issued, the certificate details changed, the private key was exposed, or there was a change of security association.

QUESTION 7

What type of system is a common target of attackers who want to disseminate email spam?

ANSWER

Open relay SMTP servers

QUESTION 8

In relation to storage media, what is sanitization?

ANSWER

Sanitization is a combination of processes that removes data from a system or from media. It ensures that data cannot be recovered by any means.

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials