Go Back on CISSP Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

CISSP Practice Test


Page 16 out of 298 Pages

Topic 9: Exam Set A

Which of the following is the BEST mitigation from phishing attacks?


A.

Network activity monitoring


B.

Security awareness training


C.

Corporate policy and procedures


D.

Strong file and directory permissions





B.
  

Security awareness training



When transmitting information over public networks, the decision to encrypt it should be based on


A.

the estimated monetary value of the information.


B.

whether there are transient nodes relaying the transmission.


C.

the level of confidentiality of the information.


D.

the volume of the information.





C.
  

the level of confidentiality of the information.



Which one of the following transmission media is MOST effective in preventing data interception?


A.

Microwave


B.

Twisted-pair


C.

Fiber optic


D.

Coaxial cable





C.
  

Fiber optic



Which of the following defines the key exchange for Internet Protocol Security (IPSec)?


A.

Secure Sockets Layer (SSL) key exchange


B.

Internet Key Exchange (IKE)


C.

Security Key Exchange (SKE)


D.

Internet Control Message Protocol (ICMP)





B.
  

Internet Key Exchange (IKE)



What is the BEST approach to addressing security issues in legacy web applications?


A.

Debug the security issues


B.

Migrate to newer, supported applications where possible


C.

Conduct a security assessment


D.

Protect the legacy application with a web application firewall





D.
  

Protect the legacy application with a web application firewall




Page 16 out of 298 Pages
Previous