Cissp Demo
Cissp Demo
Professional (CISSP)
ISC2 CISSP
Version Demo
https://dumpsarena.com
[email protected]
Topic Break Down
Total 1382
HOT SPOT
In the network design below, where is the MOST secure Local Area Network (LAN) segment to deploy a Wireless Access
Point (WAP) that provides contractors access to the Internet and authorized enterprise services?
Answer:
Explanation:
Explanation:
HOT SPOT
Which Web Services Security (WS-Security) specification negotiates how security tokens will be issued, renewed and
validated? Click on the correct specification in the image below.
Explanation:
The protocol used for issuing security tokens is based on WS-Trust. WS-Trust is a Web service specification that builds on
WS-Security. It describes a protocol used for issuance, exchange, and validation of security tokens. WS-Trust provides a
solution for interoperability by defining a protocol for issuing and exchanging security tokens, based on token format,
namespace, or trust boundaries. Reference: https://msdn.microsoft.com/en-us/library/ff650503.aspx
ANSWER:
Explanation:
The protocol used for issuing security tokens is based on WS-Trust. WS-Trust is a Web service specification that builds on
WS-Security. It describes a protocol used for issuance, exchange, and validation of security tokens. WS-Trust provides a
solution for interoperability by defining a protocol for issuing and exchanging security tokens, based on token format,
namespace, or trust boundaries. Reference: https://msdn.microsoft.com/en-us/library/ff650503.aspx
HOT SPOT
Which Web Services Security (WS-Security) specification handles the management of security tokens and the underlying
policies for granting access? Click on the correct specification in the image below.
ANSWER:
Explanation:
Reference: Java Web Services: Up and Running” By Martin Kalin page 228
QUESTION NO: 4
Which of the following actions should be undertaken prior to deciding on a physical baseline Protection Profile (PP)?
C. Categorize assets.
ANSWER: A
QUESTION NO: 5
Which of the following management process allows ONLY those services required for users to accomplish their tasks,
change default user passwords, and set servers to retrieve antivirus updates?
A. Configuration
B. Identity
C. Compliance
D. Patch
ANSWER: A
QUESTION NO: 6
When dealing with compliance with the Payment Card Industry-Data Security Standard (PCI-DSS), an organization that
shares card holder information with a service provider MUST do which of the following?
C. Validate that the service providers security policies are in alignment with those of the organization
D. Ensure that the service provider updates and tests its Disaster Recovery Plan (DRP) on a yearly basis
ANSWER: B
QUESTION NO: 7
In a High Availability (HA) environment, what is the PRIMARY goal of working with a virtual router address as the gateway to
a network?
A. The second of two routers can periodically check in to make sure that the first router is operational.
B. The second of two routers can better absorb a Denial of Service (DoS) attack knowing the first router is
present.
C. The first of two routers fails and is reinstalled, while the second handles the traffic flawlessly.
ANSWER: C
Explanation:
Place the information security assessment steps on the left next to the numbered boxes on the right in the correct order.
ANSWER:
ANSWER: B
QUESTION NO: 10
At which layer of the Open Systems Interconnect (OSI) model are the source and destination address for a datagram
handled?
A. Transport Layer
B. Data-Link Layer
C. Network Layer
D. Application Layer
ANSWER: C
Explanation:
QUESTION NO: 11
After a thorough analysis, it was discovered that a perpetrator compromised a network by gaining access to the network
through a Secure Socket Layer (SSL) Virtual Private Network (VPN) gateway. The perpetrator guessed a username and
brute forced the password to gain access. Which of the following BEST mitigates this issue?
Explanation:
HOT SPOT
Which Web Services Security (WS-Security) specification maintains a single authenticated identity across multiple dissimilar
environments? Click on the correct specification in the image below.
ANSWER:
Explanation:
Reference: Java Web Services: Up and Running” By Martin Kalin page 228
Drag the following Security Engineering terms on the left to the BEST definition on the right.
ANSWER:
Explanation:
Protection Needs Assessment - The method used to identify the confidentiality, integrity, and availability requirements for
organizational and system assets and to characterize the adverse impact or consequences should be asset be lost,
modified, degraded, disrupted, compromised, or become unavailable.
Threat assessment - The method used to identify and characterize the dangers anticipated throughout the life cycle of the
system.
Security Risk Treatment - The method used to identify feasible security risk mitigation options and plans.
QUESTION NO: 14
The adoption of an enterprise-wide Business Continuity (BC) program requires which of the following?
ANSWER: B
QUESTION NO: 15
B. Public-key cryptography
D. Private-key cryptography
ANSWER: B
Explanation:
GjsSJmaHZ_O9Iw&hl=en&sa=X&ved=2ahUKEwjDobCajqrpAhWMHRQKHW2FC4gQ6AEwAHoECBQQAQ#v=onepage&q=
type%20of%20authentication%20and%20encryption%20for%20a%
20Secure%20Shell%20(SSH)%20implementation%20when%20network%20traffic%20traverses%20between%20a%20host
%20and%20an%20infrastructure%20device&f=false