ISC CISSP Practice Test - Questions Answers, Page 34
List of questions
Question 331
Which of the following methods can be used to achieve confidentiality and integrity for data in transit?
Question 332
Secure Sockets Layer (SSL) encryption protects
Question 333
Which of the following are Systems Engineering Life Cycle (SELC) Technical Processes?
Question 334
Which of the following BEST describes a Protection Profile (PP)?
Question 335
Which of the following BEST describes a rogue Access Point (AP)?
Question 336
The 802.1x standard provides a framework for what?
Question 337
Single Sign-On (SSO) is PRIMARILY designed to address which of the following?
Question 338
Which of the following is the PRIMARY security concern associated with the implementation of smart cards?
Question 339
Which of the following is a function of Security Assertion Markup Language (SAML)?
Question 340
What is an important characteristic of Role Based Access Control (RBAC)?
Question