ISC CISSP Practice Test - Questions Answers, Page 3
List of questions
Question 21

What is the second phase of Public Key Infrastructure (PKI) key/certificate life-cycle management?
Question 22

Which component of the Security Content Automation Protocol (SCAP) specification contains the data required to estimate the severity of vulnerabilities identified automated vulnerability assessments?
Question 23

Who in the organization is accountable for classification of data information assets?
Question 24

The use of private and public encryption keys is fundamental in the implementation of which of the following?
Question 25

What is the purpose of an Internet Protocol (IP) spoofing attack?
Question 26

At what level of the Open System Interconnection (OSI) model is data at rest on a Storage Area Network (SAN) located?
Question 27

In a Transmission Control Protocol/Internet Protocol (TCP/IP) stack, which layer is responsible for negotiating and establishing a connection with another node?
Question 28

Which of the following is used by the Point-to-Point Protocol (PPP) to determine packet formats?
Question 29

Which of the following operates at the Network Layer of the Open System Interconnection (OSI) model?
Question 30

An external attacker has compromised an organization's network security perimeter and installed a sniffer onto an inside computer. Which of the following is the MOST effective layer of security the organization could have implemented to mitigate the attacker's ability to gain further information?
Question