Act now and download your ISC2 CISSP test today! Do not waste time for the worthless ISC2 CISSP tutorials. Download Refresh ISC2 Certified Information Systems Security Professional (CISSP) exam with real questions and answers and begin to learn ISC2 CISSP with a classic professional.
Q211. DRAG DROP
Drag the following Security Engineering terms on the left to the BEST definition on the right.
Answer:
Q212. To prevent inadvertent disclosure of restricted information, which of the following would be the LEAST effective process for eliminating data prior to the media being discarded?
A. Multiple-pass overwriting
B. Degaussing
C. High-level formatting
D. Physical destruction
Answer: C
Q213. Which one of the following effectively obscures network addresses from external exposure when implemented on a firewall or router?
A. Network Address Translation (NAT)
B. Application Proxy
C. Routing Information Protocol (RIP) Version 2
D. Address Masking
Answer: A
Q214. Which of the following is the BEST method to assess the effectiveness of an organization's vulnerability management program?
A. Review automated patch deployment reports
B. Periodic third party vulnerability assessment
C. Automated vulnerability scanning
D. Perform vulnerability scan by security team
Answer: B
Q215. Which of the following is a MAJOR consideration in implementing a Voice over IP (VoIP) network?
A. Use of a unified messaging.
B. Use of separation for the voice network.
C. Use of Network Access Control (NAC) on switches.
D. Use of Request for Comments (RFC) 1918 addressing.
Answer: B
Q216. Which security.approach.will BEST.minimize.Personally Identifiable.Information (PII) loss from a data breach?
A. A strong breach notification process
B. Limited collection of individuals' confidential data
C. End-to-end data encryption for data in transit
D. Continuous monitoring of potential vulnerabilities
Answer: B
Q217. DRAG DROP
In which order, from MOST to LEAST impacted, does user awareness training reduce the occurrence of the events below?.
Answer:
Q218. Which of the following does the Encapsulating Security Payload (ESP) provide?
A. Authorization and integrity
B. Availability and integrity
C. Integrity and confidentiality
D. Authorization and confidentiality
Answer: C
Q219. Which of the following describes the concept of a Single Sign-On (SSO) system?
A. Users are authenticated to one system at a time.
B. Users are.identified to multiple systems with several credentials.
C. Users are authenticated to.multiple systems with one login.
D. Only one user is using the system at a time.
Answer: C
Q220. Multi-threaded applications are more at risk than single-threaded applications to
A. race conditions.
B. virus infection.
C. packet sniffing.
D. database injection.
Answer: A