ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 34

List of questions

Question 331

Report Export Collapse

Which of the following methods can be used to achieve confidentiality and integrity for data in transit?

Multiprotocol Label Switching (MPLS)
Multiprotocol Label Switching (MPLS)
Internet Protocol Security (IPSec)
Internet Protocol Security (IPSec)
Federated identity management
Federated identity management
Multi-factor authentication
Multi-factor authentication
Suggested answer: B
asked 18/09/2024
Miguel Seron Blasco
33 questions

Question 332

Report Export Collapse

Secure Sockets Layer (SSL) encryption protects

data at rest.
data at rest.
the source IP address.
the source IP address.
data transmitted.
data transmitted.
data availability.
data availability.
Suggested answer: C
asked 18/09/2024
Adrian Mark
36 questions

Question 333

Report Export Collapse

Which of the following are Systems Engineering Life Cycle (SELC) Technical Processes?

Concept, Development, Production, Utilization, Support, Retirement
Concept, Development, Production, Utilization, Support, Retirement
Stakeholder Requirements Definition, Architectural Design, Implementation, Verification, Operation
Stakeholder Requirements Definition, Architectural Design, Implementation, Verification, Operation
Acquisition, Measurement, Configuration Management, Production, Operation, Support
Acquisition, Measurement, Configuration Management, Production, Operation, Support
Concept, Requirements, Design, Implementation, Production, Maintenance, Support, Disposal
Concept, Requirements, Design, Implementation, Production, Maintenance, Support, Disposal
Suggested answer: B
asked 18/09/2024
Rajesh K
33 questions

Question 334

Report Export Collapse

Which of the following BEST describes a Protection Profile (PP)?

A document that expresses an implementation independent set of security requirements for an IT product that meets specific consumer needs.
A document that expresses an implementation independent set of security requirements for an IT product that meets specific consumer needs.
A document that is used to develop an IT security product from its security requirements definition.
A document that is used to develop an IT security product from its security requirements definition.
A document that expresses an implementation dependent set of security requirements which contains only the security functional requirements.
A document that expresses an implementation dependent set of security requirements which contains only the security functional requirements.
A document that represents evaluated products where there is a one-to-one correspondence between a PP and a Security Target (ST).
A document that represents evaluated products where there is a one-to-one correspondence between a PP and a Security Target (ST).
Suggested answer: A
asked 18/09/2024
Edgar Garcia Tobias
41 questions

Question 335

Report Export Collapse

Which of the following BEST describes a rogue Access Point (AP)?

An AP that is not protected by a firewall
An AP that is not protected by a firewall
An AP not configured to use Wired Equivalent Privacy (WEP) with Triple Data Encryption Algorithm (3DES)
An AP not configured to use Wired Equivalent Privacy (WEP) with Triple Data Encryption Algorithm (3DES)
An AP connected to the wired infrastructure but not under the management of authorized network administrators
An AP connected to the wired infrastructure but not under the management of authorized network administrators
An AP infected by any kind of Trojan or Malware
An AP infected by any kind of Trojan or Malware
Suggested answer: C
asked 18/09/2024
Anthony Wilson
43 questions

Question 336

Report Export Collapse

The 802.1x standard provides a framework for what?

Network authentication for only wireless networks
Network authentication for only wireless networks
Network authentication for wired and wireless networks
Network authentication for wired and wireless networks
Wireless encryption using the Advanced Encryption Standard (AES)
Wireless encryption using the Advanced Encryption Standard (AES)
Wireless network encryption using Secure Sockets Layer (SSL)
Wireless network encryption using Secure Sockets Layer (SSL)
Suggested answer: B
asked 18/09/2024
C/1094 WOLOGUEDE COTONOU – BENIN STEVE
41 questions

Question 337

Report Export Collapse

Single Sign-On (SSO) is PRIMARILY designed to address which of the following?

Confidentiality and Integrity
Confidentiality and Integrity
Availability and Accountability
Availability and Accountability
Integrity and Availability
Integrity and Availability
Accountability and Assurance
Accountability and Assurance
Suggested answer: D
asked 18/09/2024
Máté Montvai
42 questions

Question 338

Report Export Collapse

Which of the following is the PRIMARY security concern associated with the implementation of smart cards?

The cards have limited memory
The cards have limited memory
Vendor application compatibility
Vendor application compatibility
The cards can be misplaced
The cards can be misplaced
Mobile code can be embedded in the card
Mobile code can be embedded in the card
Suggested answer: C
asked 18/09/2024
Mike van den Berg
40 questions

Question 339

Report Export Collapse

Which of the following is a function of Security Assertion Markup Language (SAML)?

File allocation
File allocation
Redundancy check
Redundancy check
Extended validation
Extended validation
Policy enforcement
Policy enforcement
Suggested answer: D
asked 18/09/2024
Eric Zarghami
55 questions

Question 340

Report Export Collapse

What is an important characteristic of Role Based Access Control (RBAC)?

Supports Mandatory Access Control (MAC)
Supports Mandatory Access Control (MAC)
Simplifies the management of access rights
Simplifies the management of access rights
Relies on rotation of duties
Relies on rotation of duties
Requires two factor authentication
Requires two factor authentication
Suggested answer: B
asked 18/09/2024
Duncan Brundseaux
44 questions
Total 1.482 questions
Go to page: of 149