100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Official (ISC)² CISSP (All Domains) Questions with 100% Actual correct answers | verified | latest update | Graded A+ | Already Passed | Complete Solution $7.99   Add to cart

Exam (elaborations)

Official (ISC)² CISSP (All Domains) Questions with 100% Actual correct answers | verified | latest update | Graded A+ | Already Passed | Complete Solution

 5 views  0 purchase
  • Course
  • Institution

Official (ISC)² CISSP (All Domains) Questions with 100% Actual correct answers | verified | latest update | Graded A+ | Already Passed | Complete Solution

Preview 3 out of 25  pages

  • June 19, 2024
  • 25
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
Official (ISC)² CISSP (All Domains)
"Generally Accepted Principles and Practices for Securing Information Technology Systems"
(NIST SP 800-14) - correct answer-Provides a foundation upon which organizations can
establish and review information technology security programs.

2011 CWE/SANS Top 25 Most Dangerous Software Errors - correct answer-A list of the most
widespread and critical errors that can lead to serious vulnerabilities in software.

802.11a supports up to how many Mbps? - correct answer-54

802.11a uses which frequency? - correct answer-5.0

802.11b supports up to how many Mbps? - correct answer-11

802.11b uses which frequency? - correct answer-2.4

802.11g supports up to how many Mbps? - correct answer-54

802.11g uses which frequency? - correct answer-2.4

802.11n supports up to how many Mbps? - correct answer-144

802.11n uses which frequency? - correct answer-2.4 and 5.0

A basic network mapping technique that helps narrow the scope of an attack - correct
answer-Ping scanning

A client/server-based directory query protocol loosely based upon X.500, commonly used for
managing user information - correct answer-Lightweight Directory Access Protocol (LDAP)

A diagnostic tool that displays the path a packet traverses between a source and destination
host - correct answer-Traceroute

A firewall without a ruleset is considered what? - correct answer-router

A lightweight encapsulation protocol and lacks the reliable data transport of the TCP layer -
correct answer-Fibre Channel over Ethernet (FCoE)

A method commonly used to modulate information into manageable bits that are sent over
the air wirelessly - correct answer-Spread spectrum

A program which can extract data from output on a display intended for a human - correct
answer-Screen Scraper

,A stateful protocol that requires two communication channels - correct answer-File Transfer
Protocol (FTP)

A technology that allows you to make voice calls using a broadband Internet connection
instead of a regular (or analog) phone line - correct answer-Voice over Internet Protocol
(VoIP)

A type of wireless network that connects several wireless LANs - correct answer-Wireless
metropolitan area networks

A wireless network made up of radio nodes organized in a mesh topology - correct
answer-Wireless mesh network

A wireless technology that spreads a transmission over a much larger frequency band, and
with corresponding smaller amplitude - correct answer-Direct-Sequence Spread Spectrum
(DSSS)

Abstraction - correct answer-Involves the removal of characteristics from an entity in order to
easily represent its essential properties.

Access badges - correct answer-Used to enter secured areas of a facility and are used in
conjunction with a badge reader to read information stored on the badge

Access Control Matrix - correct answer-A two-dimensional table that allows for individual
subjects and objects to be related to each other.

Access Control Systems - correct answer-Physical or electronic systems designed to control
who, or what, has access to a network

Account management systems - correct answer-Systems that attempt to streamline the
administration of user identity across multiple systems

Acoustic Sensors - correct answer-Device that uses passive listening devices

ActiveX Data Objects (ADO) - correct answer-A Microsoft high-level interface for all kinds of
data.

Address Space Layout Randomization (ASLR) - correct answer-Involves randomly arranging
the positions of key data areas of a program, including the base of the executable and the
positions of the stack, heap, and libraries in a process's memory address space.

Administrative Controls - correct answer-Procedures implemented to define the roles,
responsibilities, policies, and administrative functions needed to manage the control
environment.

Administrator accounts - correct answer-Accounts that are assigned only to named
individuals that require administrative access to the system to perform maintenance
activities, and should be different and separate from a user's normal account.

, Aggregation - correct answer-Combining non-sensitive data from separate sources to create
sensitive information.

Algorithm - correct answer-A mathematical function that is used in the encryption and
decryption processes.

Allow users remote access to a network via analog phone lines - correct answer-Modems

An authentication protocol used mainly in networked environments, such as ISPs, or for
similar services requiring single sign-on for layer 3 network access, for scalable
authentication combined with an acceptable degree of security. - correct answer-Remote
Authentication Dial-in User Service (RADIUS)

An encrypted tunnel between two hosts that allows them to securely communicate over an
untrusted network - correct answer-Virtual Private Network (VPN)

An open SCADA protocol that allows communication between multiple vendor systems. -
correct answer-DNP3 - Distributed Network Protocol

Annualized Rate of Occurrence (ARO) - correct answer-An estimate of how often a threat
will be successful in exploiting a vulnerability over the period of a year.

Application Layer - correct answer-Layer 7

Architecture Security Reviews - correct answer-A manual review of the product architecture
to ensure that it fulfills the necessary security requirements.

Arms Export Control Act of 1976 - correct answer-Authorizes the President to designate
those items that shall be considered as defense articles and defense services and control
their import and the export.

Asymmetric Algorithms - correct answer-One-way functions, that is, a process that is much
simpler to go in one direction (forward) than to go in the other direction (backward or reverse
engineering).

Audit Records - correct answer-Contain security event information such as successful and
failed authentication attempts, file accesses, security policy changes, account changes, and
use of privileges.

Authentication - correct answer-The process of verifying the identity of the user

Authorization - correct answer-The process of defining the specific resources a user needs
and determining the type of access to those resources the user may have

Automated Vulnerability Scanners - correct answer-Tests an application for the use of
system components or configurations that are known to be insecure.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Hkane. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

62890 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
  Add to cart