ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 56

Add to Whishlist

List of questions

Question 551

Report Export Collapse

Even though a particular digital watermark is difficult to detect, which of the following represents a way it might still be inadvertently removed?

Become a Premium Member for full access
  Unlock Premium Member

Question 552

Report Export Collapse

Which of the following is BEST achieved through the use of eXtensible Access Markup Language (XACML)?

Become a Premium Member for full access
  Unlock Premium Member

Question 553

Report Export Collapse

An organization has discovered that users are visiting unauthorized websites using anonymous proxies.

Which of the following is the BEST way to prevent future occurrences?

Become a Premium Member for full access
  Unlock Premium Member

Question 554

Report Export Collapse

A post-implementation review has identified that the Voice Over Internet Protocol (VoIP) system was designed to have gratuitous Address Resolution Protocol (ARP) disabled.

Why did the network architect likely design the VoIP system with gratuitous ARP disabled?

Become a Premium Member for full access
  Unlock Premium Member

Question 555

Report Export Collapse

Within the company, desktop clients receive Internet Protocol (IP) address over Dynamic Host Configuration Protocol (DHCP).

Which of the following represents a valid measure to help protect the network against unauthorized access?

Become a Premium Member for full access
  Unlock Premium Member

Question 556

Report Export Collapse

Transport Layer Security (TLS) provides which of the following capabilities for a remote access server?

Become a Premium Member for full access
  Unlock Premium Member

Question 557

Report Export Collapse

A chemical plan wants to upgrade the Industrial Control System (ICS) to transmit data using Ethernet instead of RS422. The project manager wants to simplify administration and maintenance by utilizing the office network infrastructure and staff to implement this upgrade.

Which of the following is the GREATEST impact on security for the network?

Become a Premium Member for full access
  Unlock Premium Member

Question 558

Report Export Collapse

What does a Synchronous (SYN) flood attack do?

Become a Premium Member for full access
  Unlock Premium Member

Question 559

Report Export Collapse

A Denial of Service (DoS) attack on a syslog server exploits weakness in which of the following protocols?

Become a Premium Member for full access
  Unlock Premium Member

Question 560

Report Export Collapse

In a High Availability (HA) environment, what is the PRIMARY goal of working with a virtual router address as the gateway to a network?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.482 questions
Go to page: of 149
Search