Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISSP Exam Dumps - Certified Information Systems Security Professional (CISSP)

Go to page:
Question # 49

Which of the following is the BEST network defense against unknown types of attacks or stealth attacks in progress?

A.

Intrusion Prevention Systems (IPS)

B.

Intrusion Detection Systems (IDS)

C.

Stateful firewalls

D.

Network Behavior Analysis (NBA) tools

Full Access
Question # 50

Which of the following operates at the Network Layer of the Open System Interconnection (OSI) model?

A.

Packet filtering

B.

Port services filtering

C.

Content filtering

D.

Application access control

Full Access
Question # 51

Which of the following is used by the Point-to-Point Protocol (PPP) to determine packet formats?

A.

Layer 2 Tunneling Protocol (L2TP)

B.

Link Control Protocol (LCP)

C.

Challenge Handshake Authentication Protocol (CHAP)

D.

Packet Transfer Protocol (PTP)

Full Access
Question # 52

The BEST example of the concept of "something that a user has" when providing an authorized user access to a computing system is

A.

the user's hand geometry.

B.

a credential stored in a token.

C.

a passphrase.

D.

the user's face.

Full Access
Question # 53

The 802.1x standard provides a framework for what?

A.

Network authentication for only wireless networks

B.

Network authentication for wired and wireless networks

C.

Wireless encryption using the Advanced Encryption Standard (AES)

D.

Wireless network encryption using Secure Sockets Layer (SSL)

Full Access
Question # 54

Which of the following disaster recovery test plans will be MOST effective while providing minimal risk?

A.

Read-through

B.

Parallel

C.

Full interruption

D.

Simulation

Full Access
Question # 55

The restoration priorities of a Disaster Recovery Plan (DRP) are based on which of the following documents?

A.

Service Level Agreement (SLA)

B.

Business Continuity Plan (BCP)

C.

Business Impact Analysis (BIA)

D.

Crisis management plan

Full Access
Question # 56

A global organization wants to implement hardware tokens as part of a multifactor authentication solution for remote access. The PRIMARY advantage of this implementation is

A.

the scalability of token enrollment.

B.

increased accountability of end users.

C.

it protects against unauthorized access.

D.

it simplifies user access administration.

Full Access
Go to page: