ISC CISSP - Certified Information Systems Security Professional (CISSP)
Which of the following BEST describes an access control method utilizing cryptographic keys derived from a smart card private key that is embedded within mobile devices?
Refer to the information below to answer the question.
A security practitioner detects client-based attacks on the organization’s network. A plan will be necessary to address these concerns.
In addition to web browsers, what PRIMARY areas need to be addressed concerning mobile code used for malicious purposes?
Which of the following are required components for implementing software configuration management systems?
The use of proximity card to gain access to a building is an example of what type of security control?
An organization decides to implement a partial Public Key Infrastructure (PKI) with only the servers having digital certificates. What is the security benefit of this implementation?
Which of the following defines the key exchange for Internet Protocol Security (IPSec)?
By allowing storage communications to run on top of Transmission Control Protocol/Internet Protocol (TCP/IP) with a Storage Area Network (SAN), the
Which one of the following is the MOST important in designing a biometric access system if it is essential that no one other than authorized individuals are admitted?
Which of the following is a physical security control that protects Automated Teller Machines (ATM) from skimming?
Which layer of the Open Systems Interconnections (OSI) model implementation adds information concerning the logical connection between the sender and receiver?
A security professional has just completed their organization's Business Impact Analysis (BIA). Following Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) best practices, what would be the professional's NEXT step?
What technique BEST describes antivirus software that detects viruses by watching anomalous behavior?
What principle requires that changes to the plaintext affect many parts of the ciphertext?
How can a forensic specialist exclude from examination a large percentage of operating system files residing on a copy of the target system?
Which of the following is the best practice for testing a Business Continuity Plan (BCP)?