CISSP Official Practice Tests by Mike Chapple, David Seidl
426 Appendix ■ Answers 76. C. A Security Information and Event Management (SIEM) tool is designed to provide automated analysis ...
106 Chapter 5 ■ dentity and Access Management (Domain 5)I Kathleen needs to set up an Active Directory trust to allow authentic ...
Chapter 10: Practice Test 2 427 C. Trusted paths that secure network traffic from capture and link encryption are both ways to ...
Chapter 5 ■ dentity and Access Management (Domain 5)I 107 What type of access controls allow the owner of a file to grant other ...
428 Appendix ■ Answers 9 1. C. Since Lauren wants to monitor her production server, she should use passive monitoring by employi ...
108 Chapter 5 ■ dentity and Access Management (Domain 5)I At point B in the diagram, what two important elements does the KDC s ...
Chapter 10: Practice Test 2 429 D. The comparison of a factor to validate an identity is known as authentication. Identificatio ...
Chapter 5 ■ dentity and Access Management (Domain 5)I 109 Jim has worked in human relations, payroll, and customer service role ...
430 Appendix ■ Answers 11 2. B. Kathleen’s needs point to a directory service, and the Lightweight Directory Access Protocol (LD ...
Chapter 11: Practice Test 3 431 B. EAP was originally intended to be used on physically isolated network channels and did not i ...
110 Chapter 5 ■ dentity and Access Management (Domain 5)I Which of the following is not part of a Kerberos authentication syste ...
432 Appendix ■ Answers 4. A. Key risk indicators (KRIs) are often used to monitor risk for organizations that establish an ongoi ...
Chapter 5 ■ dentity and Access Management (Domain 5)I 111 A. RBAC B. DAC C. M AC D. TBAC Which of the following is not a valid ...
Chapter 11: Practice Test 3 433 B. A cognitive password authenticates users based on a series of facts or answers to questions ...
112 Chapter 5 ■ dentity and Access Management (Domain 5)I Susan is working to improve the strength of her organization’s passwo ...
434 Appendix ■ Answers 2 1. A. Susan is performing passive monitoring, which uses a network tap or span port to capture traffic ...
Chapter 5 ■ dentity and Access Management (Domain 5)I 113 Alex is concerned about eavesdropping on the SAML traffic and also wa ...
Chapter 11: Practice Test 3 435 A. Lauren’s team would benefit from a credential management system. Credential management syste ...
114 Chapter 5 ■ dentity and Access Management (Domain 5)I Which of the following tools is not typically used to verify that a p ...
436 Appendix ■ Answers 4 0. D. During a tabletop exercise, team members come together and walk through a scenario without making ...
«
25
26
27
28
29
30
31
32
33
34
»
Free download pdf