ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 34

Question list
Search
Search

Which of the following methods can be used to achieve confidentiality and integrity for data in transit?

A.
Multiprotocol Label Switching (MPLS)
A.
Multiprotocol Label Switching (MPLS)
Answers
B.
Internet Protocol Security (IPSec)
B.
Internet Protocol Security (IPSec)
Answers
C.
Federated identity management
C.
Federated identity management
Answers
D.
Multi-factor authentication
D.
Multi-factor authentication
Answers
Suggested answer: B

Secure Sockets Layer (SSL) encryption protects

A.
data at rest.
A.
data at rest.
Answers
B.
the source IP address.
B.
the source IP address.
Answers
C.
data transmitted.
C.
data transmitted.
Answers
D.
data availability.
D.
data availability.
Answers
Suggested answer: C

Which of the following are Systems Engineering Life Cycle (SELC) Technical Processes?

A.
Concept, Development, Production, Utilization, Support, Retirement
A.
Concept, Development, Production, Utilization, Support, Retirement
Answers
B.
Stakeholder Requirements Definition, Architectural Design, Implementation, Verification, Operation
B.
Stakeholder Requirements Definition, Architectural Design, Implementation, Verification, Operation
Answers
C.
Acquisition, Measurement, Configuration Management, Production, Operation, Support
C.
Acquisition, Measurement, Configuration Management, Production, Operation, Support
Answers
D.
Concept, Requirements, Design, Implementation, Production, Maintenance, Support, Disposal
D.
Concept, Requirements, Design, Implementation, Production, Maintenance, Support, Disposal
Answers
Suggested answer: B

Which of the following BEST describes a Protection Profile (PP)?

A.
A document that expresses an implementation independent set of security requirements for an IT product that meets specific consumer needs.
A.
A document that expresses an implementation independent set of security requirements for an IT product that meets specific consumer needs.
Answers
B.
A document that is used to develop an IT security product from its security requirements definition.
B.
A document that is used to develop an IT security product from its security requirements definition.
Answers
C.
A document that expresses an implementation dependent set of security requirements which contains only the security functional requirements.
C.
A document that expresses an implementation dependent set of security requirements which contains only the security functional requirements.
Answers
D.
A document that represents evaluated products where there is a one-to-one correspondence between a PP and a Security Target (ST).
D.
A document that represents evaluated products where there is a one-to-one correspondence between a PP and a Security Target (ST).
Answers
Suggested answer: A

Which of the following BEST describes a rogue Access Point (AP)?

A.
An AP that is not protected by a firewall
A.
An AP that is not protected by a firewall
Answers
B.
An AP not configured to use Wired Equivalent Privacy (WEP) with Triple Data Encryption Algorithm (3DES)
B.
An AP not configured to use Wired Equivalent Privacy (WEP) with Triple Data Encryption Algorithm (3DES)
Answers
C.
An AP connected to the wired infrastructure but not under the management of authorized network administrators
C.
An AP connected to the wired infrastructure but not under the management of authorized network administrators
Answers
D.
An AP infected by any kind of Trojan or Malware
D.
An AP infected by any kind of Trojan or Malware
Answers
Suggested answer: C

The 802.1x standard provides a framework for what?

A.
Network authentication for only wireless networks
A.
Network authentication for only wireless networks
Answers
B.
Network authentication for wired and wireless networks
B.
Network authentication for wired and wireless networks
Answers
C.
Wireless encryption using the Advanced Encryption Standard (AES)
C.
Wireless encryption using the Advanced Encryption Standard (AES)
Answers
D.
Wireless network encryption using Secure Sockets Layer (SSL)
D.
Wireless network encryption using Secure Sockets Layer (SSL)
Answers
Suggested answer: B

Single Sign-On (SSO) is PRIMARILY designed to address which of the following?

A.
Confidentiality and Integrity
A.
Confidentiality and Integrity
Answers
B.
Availability and Accountability
B.
Availability and Accountability
Answers
C.
Integrity and Availability
C.
Integrity and Availability
Answers
D.
Accountability and Assurance
D.
Accountability and Assurance
Answers
Suggested answer: D

Which of the following is the PRIMARY security concern associated with the implementation of smart cards?

A.
The cards have limited memory
A.
The cards have limited memory
Answers
B.
Vendor application compatibility
B.
Vendor application compatibility
Answers
C.
The cards can be misplaced
C.
The cards can be misplaced
Answers
D.
Mobile code can be embedded in the card
D.
Mobile code can be embedded in the card
Answers
Suggested answer: C

Which of the following is a function of Security Assertion Markup Language (SAML)?

A.
File allocation
A.
File allocation
Answers
B.
Redundancy check
B.
Redundancy check
Answers
C.
Extended validation
C.
Extended validation
Answers
D.
Policy enforcement
D.
Policy enforcement
Answers
Suggested answer: D

What is an important characteristic of Role Based Access Control (RBAC)?

A.
Supports Mandatory Access Control (MAC)
A.
Supports Mandatory Access Control (MAC)
Answers
B.
Simplifies the management of access rights
B.
Simplifies the management of access rights
Answers
C.
Relies on rotation of duties
C.
Relies on rotation of duties
Answers
D.
Requires two factor authentication
D.
Requires two factor authentication
Answers
Suggested answer: B
Total 1.482 questions
Go to page: of 149