★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW CISSP Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/CISSP-dumps.html


Q121. The overall goal of a penetration test is to determine a system's 

A. ability to withstand an attack. 

B. capacity management. 

C. error recovery capabilities. 

D. reliability under stress. 

Answer:


Q122. HOTSPOT 

Which Web Services Security (WS-Security) specification.maintains a single authenticated identity across multiple dissimilar environments?.Click.on the correct specification in the image.below. 

Answer: 


Q123. Which of the following is an authentication protocol in which a new random number is generated uniquely for each login session? 

A. Challenge Handshake Authentication Protocol (CHAP) 

B. Point-to-Point Protocol (PPP) 

C. Extensible Authentication Protocol (EAP) 

D. Password Authentication Protocol (PAP) 

Answer:


Q124. Which of the following provides the minimum set of privileges required to perform a job function and restricts the user to a domain with the required privileges? 

A. Access based on rules 

B. Access based on user's role 

C. Access determined by the system 

D. Access based on data sensitivity 

Answer:


Q125. For an organization considering two-factor authentication for secure network access, which of the following is MOST secure? 

A. Challenge response and private key 

B. Digital certificates and Single Sign-On (SSO) 

C. Tokens and passphrase 

D. Smart card and biometrics 

Answer:


Q126. What is the.BEST.first step.for determining if the appropriate security controls are in place for protecting data at rest? 

A. Identify regulatory requirements 

B. Conduct a risk assessment 

C. Determine.business drivers 

D. Review the.security baseline configuration 

Answer:


Q127. Which of the following is an appropriate source for test data? 

A. Production.data that is secured and maintained only in the production environment. 

B. Test data that has no similarities to production.data. 

C. Test data that is mirrored and kept up-to-date with production data. 

D. Production.data that has been.sanitized before loading into a test environment. 

Answer:


Q128. Which of the following is the PRIMARY benefit of a formalized information classification program? 

A. It drives audit processes. 

B. It supports risk assessment. 

C. It reduces asset vulnerabilities. 

D. It minimizes system logging requirements. 

Answer:


Q129. Which of the following is the MOST effective attack against cryptographic hardware modules? 

A. Plaintext.

B. Brute force 

C. Power analysis 

D. Man-in-the-middle (MITM) 

Answer:


Q130. When transmitting information over public networks, the decision to encrypt it should be based on 

A. the estimated monetary value of the information. 

B. whether there are transient nodes relaying the transmission. 

C. the level of confidentiality of the information. 

D. the volume of the information. 

Answer: