Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ISC CISSP - Certified Information Systems Security Professional (CISSP)

Page: 12 / 12
Total 1486 questions

Copyright provides protection for which of the following?

A.

Ideas expressed in literary works

B.

A particular expression of an idea

C.

New and non-obvious inventions

D.

Discoveries of natural phenomena

The type of authorized interactions a subject can have with an object is

A.

control.

B.

permission.

C.

procedure.

D.

protocol.

An external attacker has compromised an organization's network security perimeter and installed a sniffer onto an inside computer. Which of the following is the MOST effective layer of security the organization could have implemented to mitigate the attacker's ability to gain further information?

A.

Implement packet filtering on the network firewalls

B.

Require strong authentication for administrators

C.

Install Host Based Intrusion Detection Systems (HIDS)

D.

Implement logical network segmentation at the switches

Which of the following is a network intrusion detection technique?

A.

Statistical anomaly

B.

Perimeter intrusion

C.

Port scanning

D.

Network spoofing

Which of the following is an essential element of a privileged identity lifecycle management?

A.

Regularly perform account re-validation and approval

B.

Account provisioning based on multi-factor authentication

C.

Frequently review performed activities and request justification

D.

Account information to be provided by supervisor or line manager

What is the MOST effective countermeasure to a malicious code attack against a mobile system?

A.

Sandbox

B.

Change control

C.

Memory management

D.

Public-Key Infrastructure (PKI)

Which of the following is ensured when hashing files during chain of custody handling?

A.

Availability

B.

Accountability

C.

Integrity

D.

Non-repudiation

Alternate encoding such as hexadecimal representations is MOST often observed in which of the following forms of attack?

A.

Smurf

B.

Rootkit exploit

C.

Denial of Service (DoS)

D.

Cross site scripting (XSS)

Which of the following does the Encapsulating Security Payload (ESP) provide?

A.

Authorization and integrity

B.

Availability and integrity

C.

Integrity and confidentiality

D.

Authorization and confidentiality

What security management control is MOST often broken by collusion?

A.

Job rotation

B.

Separation of duties

C.

Least privilege model

D.

Increased monitoring