ISC CISSP Practice Test - Questions Answers, Page 56
List of questions
Question 551

Even though a particular digital watermark is difficult to detect, which of the following represents a way it might still be inadvertently removed?
Question 552

Which of the following is BEST achieved through the use of eXtensible Access Markup Language (XACML)?
Question 553

An organization has discovered that users are visiting unauthorized websites using anonymous proxies.
Which of the following is the BEST way to prevent future occurrences?
Question 554

A post-implementation review has identified that the Voice Over Internet Protocol (VoIP) system was designed to have gratuitous Address Resolution Protocol (ARP) disabled.
Why did the network architect likely design the VoIP system with gratuitous ARP disabled?
Question 555

Within the company, desktop clients receive Internet Protocol (IP) address over Dynamic Host Configuration Protocol (DHCP).
Which of the following represents a valid measure to help protect the network against unauthorized access?
Question 556

Transport Layer Security (TLS) provides which of the following capabilities for a remote access server?
Question 557

A chemical plan wants to upgrade the Industrial Control System (ICS) to transmit data using Ethernet instead of RS422. The project manager wants to simplify administration and maintenance by utilizing the office network infrastructure and staff to implement this upgrade.
Which of the following is the GREATEST impact on security for the network?
Question 558

What does a Synchronous (SYN) flood attack do?
Question 559

A Denial of Service (DoS) attack on a syslog server exploits weakness in which of the following protocols?
Question 560

In a High Availability (HA) environment, what is the PRIMARY goal of working with a virtual router address as the gateway to a network?
Question