ISC CISSP Practice Test - Questions Answers, Page 12
List of questions
Related questions
Question 111
The Structured Query Language (SQL) implements Discretionary Access Controls (DAC) using
Question 112
Which layer of the Open Systems Interconnections (OSI) model implementation adds information concerning the logical connection between the sender and receiver?
Question 113
Which of the following is a network intrusion detection technique?
Question 114
Internet Protocol (IP) source address spoofing is used to defeat
Question 115
Which of the following is an authentication protocol in which a new random number is generated uniquely for each login session?
Question 116
What security management control is MOST often broken by collusion?
Question 117
An Intrusion Detection System (IDS) is generating alarms that a user account has over 100 failed login attempts per minute. A sniffer is placed on the network, and a variety of passwords for that user are noted. Which of the following is
MOST likely occurring?
Question 118
An engineer in a software company has created a virus creation tool. The tool can generate thousands of polymorphic viruses. The engineer is planning to use the tool in a controlled environment to test the company's next generation virus scanning software. Which would BEST describe the behavior of the engineer and why?
Question 119
Which of the following Disaster Recovery (DR) sites is the MOST difficult to test?
Question 120
Which of the following statements is TRUE for point-to-point microwave transmissions?
Question