Question 151

- (Exam Topic 9)
What technique BEST describes antivirus software that detects viruses by watching anomalous behavior?

Correct Answer:D

Question 152

- (Exam Topic 12)
A proxy firewall operates at what layer of the Open System Interconnection (OSI) model?

Correct Answer:D

Question 153

- (Exam Topic 6)
A Virtual Machine (VM) environment has five guest Operating Systems (OS) and provides strong isolation. What MUST an administrator review to audit a user’s access to data files?

Correct Answer:A

Question 154

- (Exam Topic 9)
Which of the following is a network intrusion detection technique?

Correct Answer:A

Question 155

- (Exam Topic 13)
Access to which of the following is required to validate web session management?

Correct Answer:C

Question 156

- (Exam Topic 9)
The overall goal of a penetration test is to determine a system's

Correct Answer:A

START CISSP EXAM