ISC CISSP Practice Test - Questions Answers, Page 34

List of questions
Question 331

Which of the following methods can be used to achieve confidentiality and integrity for data in transit?
Question 332

Secure Sockets Layer (SSL) encryption protects
Question 333

Which of the following are Systems Engineering Life Cycle (SELC) Technical Processes?
Question 334

Which of the following BEST describes a Protection Profile (PP)?
Question 335

Which of the following BEST describes a rogue Access Point (AP)?
Question 336

The 802.1x standard provides a framework for what?
Question 337

Single Sign-On (SSO) is PRIMARILY designed to address which of the following?
Question 338

Which of the following is the PRIMARY security concern associated with the implementation of smart cards?
Question 339

Which of the following is a function of Security Assertion Markup Language (SAML)?
Question 340

What is an important characteristic of Role Based Access Control (RBAC)?
Question