ISC CISSP Practice Test - Questions Answers, Page 34
List of questions
Question 331

Which of the following methods can be used to achieve confidentiality and integrity for data in transit?
Multiprotocol Label Switching (MPLS)
Internet Protocol Security (IPSec)
Federated identity management
Multi-factor authentication
Suggested answer: B
Question 332

Secure Sockets Layer (SSL) encryption protects
data at rest.
the source IP address.
data transmitted.
data availability.
Suggested answer: C
Question 333

Which of the following are Systems Engineering Life Cycle (SELC) Technical Processes?
Concept, Development, Production, Utilization, Support, Retirement
Stakeholder Requirements Definition, Architectural Design, Implementation, Verification, Operation
Acquisition, Measurement, Configuration Management, Production, Operation, Support
Concept, Requirements, Design, Implementation, Production, Maintenance, Support, Disposal
Suggested answer: B
Question 334

Which of the following BEST describes a Protection Profile (PP)?
A document that expresses an implementation independent set of security requirements for an IT product that meets specific consumer needs.
A document that is used to develop an IT security product from its security requirements definition.
A document that expresses an implementation dependent set of security requirements which contains only the security functional requirements.
A document that represents evaluated products where there is a one-to-one correspondence between a PP and a Security Target (ST).
Suggested answer: A
Question 335

Which of the following BEST describes a rogue Access Point (AP)?
An AP that is not protected by a firewall
An AP not configured to use Wired Equivalent Privacy (WEP) with Triple Data Encryption Algorithm (3DES)
An AP connected to the wired infrastructure but not under the management of authorized network administrators
An AP infected by any kind of Trojan or Malware
Suggested answer: C
Question 336

The 802.1x standard provides a framework for what?
Network authentication for only wireless networks
Network authentication for wired and wireless networks
Wireless encryption using the Advanced Encryption Standard (AES)
Wireless network encryption using Secure Sockets Layer (SSL)
Suggested answer: B
Question 337

Single Sign-On (SSO) is PRIMARILY designed to address which of the following?
Confidentiality and Integrity
Availability and Accountability
Integrity and Availability
Accountability and Assurance
Suggested answer: D
Question 338

Which of the following is the PRIMARY security concern associated with the implementation of smart cards?
The cards have limited memory
Vendor application compatibility
The cards can be misplaced
Mobile code can be embedded in the card
Suggested answer: C
Question 339

Which of the following is a function of Security Assertion Markup Language (SAML)?
File allocation
Redundancy check
Extended validation
Policy enforcement
Suggested answer: D
Question 340

What is an important characteristic of Role Based Access Control (RBAC)?
Supports Mandatory Access Control (MAC)
Simplifies the management of access rights
Relies on rotation of duties
Requires two factor authentication
Suggested answer: B
Question