100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CISSP – PRACTICE EXAM QUESTIONS WITH CORRECT VERIFIED SOLUTIONS 100% GUARANTEED PASS (LATEST UPDATE) $14.99   Add to cart

Exam (elaborations)

CISSP – PRACTICE EXAM QUESTIONS WITH CORRECT VERIFIED SOLUTIONS 100% GUARANTEED PASS (LATEST UPDATE)

 3 views  0 purchase
  • Course
  • CISSP - Certified Information Systems Security Professional
  • Institution
  • CISSP - Certified Information Systems Security Professional

CISSP – PRACTICE EXAM QUESTIONS WITH CORRECT VERIFIED SOLUTIONS 100% GUARANTEED PASS (LATEST UPDATE)CISSP – PRACTICE EXAM QUESTIONS WITH CORRECT VERIFIED SOLUTIONS 100% GUARANTEED PASS (LATEST UPDATE)CISSP – PRACTICE EXAM QUESTIONS WITH CORRECT VERIFIED SOLUTIONS 100% GUARANTEED PASS (LATEST ...

[Show more]

Preview 4 out of 57  pages

  • September 28, 2024
  • 57
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CISSP - Certified Information Systems Security Professional
  • CISSP - Certified Information Systems Security Professional
avatar-seller
ExamitorMagnus
CISSP




CISSP – PRACTICE EXAM QUESTIONS WITH
CORRECT VERIFIED SOLUTIONS 100%
GUARANTEED PASS (LATEST UPDATE)

Trade secrets - ANS ✓Deemed proprietary to a company and often include
information that provides a competitive edge, the information is protected as long
the owner takes protective actions


X.400 - ANS ✓Active Directory standard


Prevention - ANS ✓Controls deployed to avert unauthorized and/or undesired
actions.


Redundant Array Of Independent Drives (RAID) - ANS ✓A group of hard drives
working as one storage unit for the purpose of speed and fault tolerance


Proprietary - ANS ✓Define the way in which the organization operates.


Gateway - ANS ✓Used to connect two networks using dissimilar protocols at
different layers of the OSI model


Classification - ANS ✓The assignment of a level of sensitivity to data (or
information) that results in the specification of controls for each level of
classification.


Data Integrity - ANS ✓The property that data meet with a priority expectation of
quality and that the data can be relied upon.
1
CISSP - Practice

,CISSP



Alarm Filtering - ANS ✓The process of categorizing attack alerts produced from an
IDS in order to distinguish false positives from actual attacks


Coaxial Cable - ANS ✓A cable consisting of a core, inner conductor that is
surrounding by an insulator, an outer cylindrical conductor


Concentrator - ANS ✓Layer 1 network device that is used to connect network
segments together, but provides no traffic control (a hub).


Digital Signature - ANS ✓An asymmetric cryptography mechanism that provides
authentication.


Eavesdropping - ANS ✓A passive network attack involving monitoring of traffic.


E-Mail Spoofing - ANS ✓Forgery of the sender's email address in an email header.


Emanations - ANS ✓Potentially compromising leakage of electrical or acoustical
signals.


Fiber Optics - ANS ✓Bundles of long strands of pure glass that efficiently transmit
light pulses over long distances. Interception without detection is difficult.


Fraggle - ANS ✓A Denial of Service attack initiated by sending spoofed UDP echo
request to IP broadcast addresses.


Hijacking - ANS ✓Interception of a communication session by an attacker.




2
CISSP - Practice

,CISSP

Hub - ANS ✓Layer 1 network device that is used to connect network segments
together, but provides no traffic control (a concentrator).


Injection - ANS ✓An attack technique that exploits systems that do not perform
input validation by embedding partial SQL queries inside input.


Interception - ANS ✓Unauthorized access of information (e.g. Tapping, sniffing,
unsecured wireless communication, emanations)


IP Address Spoofing - ANS ✓Forging of an IP address.


IP Fragmentation - ANS ✓An attack that breaks up malicious code into fragments,
in an attempt to elude detection.


Kerberos - ANS ✓A trusted third party authentication protocol


Incident response - ANS ✓Team should consist of: management, IT, legal, human
resources, public relations, security etc.


Modification - ANS ✓A type of attack involving attempted insertion, deletion or
altering of data.


Multiplexers - ANS ✓A device that sequentially switches multiple analog inputs to
the output.


Open Mail Relay Servers - ANS ✓A mail server that improperly allows inbound
SMTP connections for domains it does not serve.




3
CISSP - Practice

, CISSP

Enticement - ANS ✓The legal act of luring an intruder, with intend to monitor their
behavior


Packet Filtering - ANS ✓A basic level of network access control that is based upon
information contained in the IP packet header.


Patch Panels - ANS ✓Provides a physical cross connect point for devices.


Private Branch Exchange (PBX) - ANS ✓A telephone exchange for a specific office
or business.


Phishing - ANS ✓A social engineering attack that uses spoofed email or websites to
persuade people to divulge information.


Physical Tampering - ANS ✓Unauthorized access of network devices.


Proxies - ANS ✓Mediates communication between un-trusted hosts on behalf of the
hosts that it protects.


Repeaters - ANS ✓Layer 1 network device that is used to connect network
segments together, but provides no traffic control (a concentrator).


Radio Frequency Interference (RFI) - ANS ✓A disturbance that degrades
performance of electronic devices and electronic communications.


Rogue Access Points - ANS ✓Unauthorized wireless network access device.


Routers - ANS ✓A layer 3 device that used to connect two or more network
segments and regulate traffic.

4
CISSP - Practice

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller ExamitorMagnus. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $14.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

82871 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$14.99
  • (0)
  Add to cart