ISC CISSP Practice Test - Questions Answers, Page 30
List of questions
Question 291
What component of a web application that stores the session state in a cookie can be bypassed by an attacker?
Question 292
Which of the following is a MAJOR consideration in implementing a Voice over IP (VoIP) network?
Question 293
Host-Based Intrusion Protection (HIPS) systems are often deployed in monitoring or learning mode during their initial implementation. What is the objective of starting in this mode?
Question 294
Which of the following describes the concept of a Single Sign -On (SSO) system?
Question 295
What physical characteristic does a retinal scan biometric device measure?
Question 296
What does secure authentication with logging provide?
Question 297
Which of the following provides the minimum set of privileges required to perform a job function and restricts the user to a domain with the required privileges?
Question 298
Discretionary Access Control (DAC) restricts access according to
Question 299
Retaining system logs for six months or longer can be valuable for what activities?
Question 300
Which of the following statements is TRUE regarding value boundary analysis as a functional software testing technique?
Question