CISSP Official Practice Tests by Mike Chapple, David Seidl
Chapter 11: Practice Test 3 437 C. Wireshark is a network monitoring tool that can capture and replay communications sent over ...
Chapter 5 ■ dentity and Access Management (Domain 5)I 115 Jim configures his LDAP client to connect to an LDAP directory server ...
438 Appendix ■ Answers 5 9. D. Remote journaling transfers transaction logs to a remote site on a more frequent basis than elect ...
116 Chapter 5 ■ dentity and Access Management (Domain 5)I What type of access control is typically used by firewalls? A. Discre ...
Chapter 11: Practice Test 3 439 review to peers. Pair programming requires two developers, only one of whom writes code while bo ...
Chapter 5 ■ dentity and Access Management (Domain 5)I 117 In a Kerberos environment, when a user needs to access a network reso ...
440 Appendix ■ Answers 76. A. 2 01.19.7.45 is a public IP address. RFC 1918 addresses are in the ranges 10.0.0.0 to 0.255.255.25 ...
118 Chapter 5 ■ dentity and Access Management (Domain 5)I When the e-commerce application creates an account for a Google user, ...
Chapter 11: Practice Test 3 441 8 7. C. The root cause analysis examines the incident to determine what allowed it to happen and ...
Chapter 5 ■ dentity and Access Management (Domain 5)I 119 Brian’s large organization has used RADIUS for AAA services for its n ...
442 Appendix ■ Answers 9 9. A. Skip should use SCP—Secure Copy is a secure file transfer method. SSH is a secure command-line an ...
120 Chapter 5 ■ dentity and Access Management (Domain 5)I The financial services company that Susan works for provides a web po ...
Chapter 11: Practice Test 3 443 C. Record retention policies describe how long the organization should retain data and may als ...
Chapter 5 ■ dentity and Access Management (Domain 5)I 121 Match each of the numbered authentication techniques with the appropr ...
444 Appendix ■ Answers 11 9. C. A unique salt should be created for each user using a secure generation method and stored in tha ...
122 Chapter 5 ■ dentity and Access Management (Domain 5)I Ben’s organization is adopting biometric authentication for its high-s ...
Chapter 12: Practice Test 4 445 Chapter 12: Practice Test 4 C. Detective access controls operate after the fact and are intende ...
Chapter 5 ■ dentity and Access Management (Domain 5)I 123 Which of the following Type 3 authenticators is appropriate to use by ...
446 Appendix ■ Answers 10. A. The onward transfer principle requires that organizations only exchange personal information with ...
124 Chapter 5 ■ dentity and Access Management (Domain 5)I What open protocol was designed to replace RADIUS—including support f ...
«
26
27
28
29
30
31
32
33
34
35
»
Free download pdf