ISC CISSP Practice Test - Questions Answers, Page 45
List of questions
Question 441
Which of the following is BEST suited for exchanging authentication and authorization messages in a multi-party decentralized environment?
Question 442
Which of the following is MOST important when deploying digital certificates?
Question 443
A user sends an e-mail request asking for read-only access to files that are not considered sensitive. A Discretionary Access Control (DAC) methodology is in place. Which is the MOST suitable approach that the administrator should take?
Question 444
How should an organization determine the priority of its remediation efforts after a vulnerability assessment has been conducted?
Question 445
Which of the following is the MOST important consideration when developing a Disaster Recovery Plan (DRP)?
Question 446
A proxy firewall operates at what layer of the Open System Interconnection (OSI) model?
Question 447
Which of the following restricts the ability of an individual to carry out all the steps of a particular process?
Question 448
Although code using a specific program language may not be susceptible to a buffer overflow attack,
Question 449
What is the BEST way to encrypt web application communications?
Question 450
Which of the following are effective countermeasures against passive network-layer attacks?
Question