Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISSP Exam Dumps - Certified Information Systems Security Professional (CISSP)

Go to page:
Question # 169

Which of the following would MINIMIZE the ability of an attacker to exploit a buffer overflow?

A.

Memory review

B.

Code review

C.

Message division

D.

Buffer division

Full Access
Question # 170

Extensible Authentication Protocol-Message Digest 5 (EAP-MD5) only provides which of the following?

A.

Mutual authentication

B.

Server authentication

C.

User authentication

D.

Streaming ciphertext data

Full Access
Question # 171

What is the MOST significant benefit of an application upgrade that replaces randomly generated session keys with certificate based encryption for communications with backend servers?

A.

Non-repudiation

B.

Efficiency

C.

Confidentially

D.

Privacy

Full Access
Question # 172

Which security modes is MOST commonly used in a commercial environment because it protects the integrity

of financial and accounting data?

A.

Biba

B.

Graham-Denning

C.

Clark-Wilson

D.

Beil-LaPadula

Full Access
Question # 173

It is MOST important to perform which of the following to minimize potential impact when implementing a new vulnerability scanning tool in a production environment?

A.

Negotiate schedule with the Information Technology (IT) operation’s team

B.

Log vulnerability summary reports to a secured server

C.

Enable scanning during off-peak hours

D.

Establish access for Information Technology (IT) management

Full Access
Question # 174

What is the second step in the identity and access provisioning lifecycle?

A.

Provisioning

B.

Review

C.

Approval

D.

Revocation

Full Access
Question # 175

A security practitioner is tasked with securing the organization’s Wireless Access Points (WAP). Which of these is the MOST effective way of restricting this environment to authorized users?

A.

Enable Wi-Fi Protected Access 2 (WPA2) encryption on the wireless access point

B.

Disable the broadcast of the Service Set Identifier (SSID) name

C.

Change the name of the Service Set Identifier (SSID) to a random value not associated with the organization

D.

Create Access Control Lists (ACL) based on Media Access Control (MAC) addresses

Full Access
Question # 176

Which of the following is MOST important when assigning ownership of an asset to a department?

A.

The department should report to the business owner

B.

Ownership of the asset should be periodically reviewed

C.

Individual accountability should be ensured

D.

All members should be trained on their responsibilities

Full Access
Go to page: