ISC CISSP Practice Test - Questions Answers, Page 10
List of questions
Question 91

The birthday attack is MOST effective against which one of the following cipher technologies?
Question 92

An advantage of link encryption in a communications network is that it
Question 93

Which one of the following is the MOST important in designing a biometric access system if it is essential that no one other than authorized individuals are admitted?
Question 94

What is the term commonly used to refer to a technique of authenticating one machine to another by forging packets from a trusted source?
Question 95

The PRIMARY purpose of a security awareness program is to
Question 96

As one component of a physical security system, an Electronic Access Control (EAC) token is BEST known for its ability to
Question 97

Which one of the following is a fundamental objective in handling an incident?
Question 98

In the area of disaster planning and recovery, what strategy entails the presentation of information about the plan?
Question 99

The process of mutual authentication involves a computer system authenticating a user and authenticating the
Question 100

What maintenance activity is responsible for defining, implementing, and testing updates to application systems?
Question