ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 130

List of questions

Question 1291

Report Export Collapse

Which of the following statements BEST distinguishes a stateful packet inspection firewall from a stateless packet filter firewall?

Become a Premium Member for full access
  Unlock Premium Member

Question 1292

Report Export Collapse

A client server infrastructure that provides user-to-server authentication describes which one of the following?

Become a Premium Member for full access
  Unlock Premium Member

Question 1293

Report Export Collapse

An organization has developed a way for customers to share information from their wearable devices with each other. Unfortunately, the users were not informed as to what information collected would be shared. What technical controls should be put in place to remedy the privacy issue while still trying to accomplish the organization's business goals?

Become a Premium Member for full access
  Unlock Premium Member

Question 1294

Report Export Collapse

In which process MUST security be considered during the acquisition of new software?

Become a Premium Member for full access
  Unlock Premium Member

Question 1295

Report Export Collapse

An organization contracts with a consultant to perform a System Organization Control (SOC) 2 audit on their internal security controls. An auditor documents a finding related to an Application Programming Interface (API) performing an action that is not aligned with the scope or objective of the system. Which trust service principle would be MOST applicable in this situation?

Become a Premium Member for full access
  Unlock Premium Member

Question 1296

Report Export Collapse

A company needs to provide shared access of sensitive data on a cloud storage to external business partners. Which of the following identity models is the BEST to blind identity providers (IdP) and relying parties (RP) so that subscriber lists of other parties are not disclosed?

Become a Premium Member for full access
  Unlock Premium Member

Question 1297

Report Export Collapse

Which algorithm gets its security from the difficulty of calculating discrete logarithms in a finite field and is used to distribute keys, but cannot be used to encrypt or decrypt messages?

Become a Premium Member for full access
  Unlock Premium Member

Question 1298

Report Export Collapse

Which Wide Area Network (WAN) technology requires the first router in the path to determine the full path the packet will travel, removing the need for other routers in the path to make independent determinations?

Become a Premium Member for full access
  Unlock Premium Member

Question 1299

Report Export Collapse

An organization recently suffered from a web-application attack that resulted in stolen user session cookie information. The attacker was able to obtain the information when a user's browser executed a script upon visiting a compromised website. What type of attack MOST likely occurred?

Become a Premium Member for full access
  Unlock Premium Member

Question 1300

Report Export Collapse

An organization recently upgraded to a Voice over Internet Protocol (VoIP) phone system.

Management is concerned with unauthorized phone usage. security consultant is responsible for putting together a plan to secure these phones. Administrators have assigned unique personal identification number codes for each person in the organization. What is the BEST solution?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.482 questions
Go to page: of 149
Search