CISSP Official Practice Tests by Mike Chapple, David Seidl
358 Appendix ■ Answers 9 9. D. MAC addresses and their organizationally unique identifiers are used at the Data Link layer to id ...
34 Chapter 2 ■ Asset Security (Domain 2) Which of the following is the least effective method of removing data from media? A. D ...
Chapter 5: Identity and Access Management (Domain 5) 359 man-in-the-middle attack would not be visible in the authentication log ...
Chapter 2 ■ Asset Security (Domain 2) 35 What encryption technology would be appropriate for HIPAA documents in transit? A. Bi ...
360 Appendix ■ Answers 16. D. Need to know is applied when subjects like Alex have access to only the data they need to accompli ...
36 Chapter 2 ■ Asset Security (Domain 2) Chris is responsible for his organization’s security standards and has guided the sele ...
Chapter 5: Identity and Access Management (Domain 5) 361 A. Resource-based access controls match permissions to resources like ...
Chapter 2 ■ Asset Security (Domain 2) 37 Joe works at a major pharmaceutical research and development company and has been task ...
362 Appendix ■ Answers 3 7. D. Dogs, guards, and fences are all examples of physical controls. While dogs and guards might detec ...
38 Chapter 2 ■ Asset Security (Domain 2) Ben is following the National Institute of Standards and Technology (NIST) Special Pub ...
Chapter 5: Identity and Access Management (Domain 5) 363 organization is online. Using encrypted and signed communication does n ...
Chapter 2 ■ Asset Security (Domain 2) 39 C. Purge, document, validate D. Purge, validate, document What methods are often used ...
364 Appendix ■ Answers 5 2. B. Registration is the process of adding a user to an identity management system. This includes crea ...
40 Chapter 2 ■ Asset Security (Domain 2) If Chris is one of the data owners for the organization, what steps in this process is ...
Chapter 5: Identity and Access Management (Domain 5) 365 D. Kerberos is an authentication protocol that uses tickets and provid ...
Chapter 2 ■ Asset Security (Domain 2) 41 Major Hunter, a member of the armed forces, has been entrusted with information that, ...
366 Appendix ■ Answers 70. C. An access control matrix is a table that lists objects, subjects, and their privileges. Access con ...
42 Chapter 2 ■ Asset Security (Domain 2) 6 7. What issue is the validation portion of the NIST SP 800-88 sample certificate of s ...
Chapter 5: Identity and Access Management (Domain 5) 367 C. In a mandatory access control system, classifications do not have t ...
Chapter 2 ■ Asset Security (Domain 2) 43 C. It is more expensive than new media and may still fail. D. Clearing is required firs ...
«
18
19
20
21
22
23
24
25
26
27
»
Free download pdf