Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISSP Exam Dumps - Certified Information Systems Security Professional (CISSP)

Go to page:
Question # 4

What is the MOST effective countermeasure to a malicious code attack against a mobile system?

A.

Sandbox

B.

Change control

C.

Memory management

D.

Public-Key Infrastructure (PKI)

Full Access
Question # 5

A vulnerability test on an Information System (IS) is conducted to

A.

exploit security weaknesses in the IS.

B.

measure system performance on systems with weak security controls.

C.

evaluate the effectiveness of security controls.

D.

prepare for Disaster Recovery (DR) planning.

Full Access
Question # 6

Which of the following does Temporal Key Integrity Protocol (TKIP) support?

A.

Multicast and broadcast messages

B.

Coordination of IEEE 802.11 protocols

C.

Wired Equivalent Privacy (WEP) systems

D.

Synchronization of multiple devices

Full Access
Question # 7

Which one of the following is the MOST important in designing a biometric access system if it is essential that no one other than authorized individuals are admitted?

A.

False Acceptance Rate (FAR)

B.

False Rejection Rate (FRR)

C.

Crossover Error Rate (CER)

D.

Rejection Error Rate

Full Access
Question # 8

What technique BEST describes antivirus software that detects viruses by watching anomalous behavior?

A.

Signature

B.

Inference

C.

Induction

D.

Heuristic

Full Access
Go to page: