CISSP Official Practice Tests by Mike Chapple, David Seidl
116 Chapter 5 ■ dentity and Access Management (Domain 5)I What type of access control is typically used by firewalls? A. Discre ...
Chapter 5 ■ dentity and Access Management (Domain 5)I 117 In a Kerberos environment, when a user needs to access a network reso ...
118 Chapter 5 ■ dentity and Access Management (Domain 5)I When the e-commerce application creates an account for a Google user, ...
Chapter 5 ■ dentity and Access Management (Domain 5)I 119 Brian’s large organization has used RADIUS for AAA services for its n ...
120 Chapter 5 ■ dentity and Access Management (Domain 5)I The financial services company that Susan works for provides a web po ...
Chapter 5 ■ dentity and Access Management (Domain 5)I 121 Match each of the numbered authentication techniques with the appropr ...
122 Chapter 5 ■ dentity and Access Management (Domain 5)I Ben’s organization is adopting biometric authentication for its high-s ...
Chapter 5 ■ dentity and Access Management (Domain 5)I 123 Which of the following Type 3 authenticators is appropriate to use by ...
124 Chapter 5 ■ dentity and Access Management (Domain 5)I What open protocol was designed to replace RADIUS—including support f ...
Chapter 5 ■ dentity and Access Management (Domain 5)I 125 What authentication protocol does Windows use by default for Active D ...
...
Security Assessment and Testing (Domain 6) Chapter 6 ...
128 Chapter 6 ■ Security Assessment and Testing (Domain 6) During a port scan, Susan discovers a system running services on TCP ...
Chapter 6 ■ Security Assessment and Testing (Domain 6) 129 Susan needs to scan a system for vulnerabilities, and she wants to u ...
130 Chapter 6 ■ Security Assessment and Testing (Domain 6) In a response to a Request for Proposal, Susan receives an SSAE 18 S ...
Chapter 6 ■ Security Assessment and Testing (Domain 6) 131 Ben uses a fuzzing tool that tests an application by developing data ...
132 Chapter 6 ■ Security Assessment and Testing (Domain 6) For questions 19–21, please refer to the following scenario: The comp ...
Chapter 6 ■ Security Assessment and Testing (Domain 6) 133 What technology should an organization use for each of the devices s ...
134 Chapter 6 ■ Security Assessment and Testing (Domain 6) Testing that is focused on functions that a system should not allow ...
Chapter 6 ■ Security Assessment and Testing (Domain 6) 135 What passive monitoring technique records all user interaction with ...
«
3
4
5
6
7
8
9
10
11
12
»
Free download pdf