CISSP Sample Test

Exit

Question 1 of 1

  Time Left


0 [{"id":4310,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-17 09:51:40","updated_at":"2016-03-12 19:58:58","questionName":"To support legacy applications that rely on risky protocols (e.g., plain text passwords), which one of the following can be implemented to mitigate the risks on a corporate network?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":12,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":3902,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-16 18:17:46","updated_at":"2016-03-12 19:58:58","questionName":"Which of the following backup processing alternatives describes a computing facility with telecommunications equipment, some systems but minimal data?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":4,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":3898,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-16 18:12:15","updated_at":"2016-03-12 19:58:58","questionName":"Which one of the following is the MOST effective method for reducing security vulnerabilities associated with building entrances?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":0,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":3909,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-17 01:00:22","updated_at":"2016-03-12 19:58:58","questionName":"What physical characteristics does a retinal scan biometric device manage?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":10,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":3907,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-17 00:57:15","updated_at":"2016-03-12 19:58:58","questionName":"What is the purpose of the Encapsulating Security Payload (ESP) in the Internet Protocol (IP) Security Architecture for Internet Protocol Security (IPSec)?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":8,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":3903,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-16 18:18:47","updated_at":"2016-03-12 19:58:58","questionName":"Important documents that have been soaked in water during fire suppression efforts should be restored by","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":5,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":4309,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-17 09:49:22","updated_at":"2016-03-12 19:58:58","questionName":"Which of the following defines the intent of a system security policy?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":11,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":4312,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-17 09:56:14","updated_at":"2016-03-12 19:58:58","questionName":"ABZ Organization is constructing a new secure facility and has elected to install a two-tier access control system, which will consist of proximity badges and biometric devices. The system security professional is tasked with acquiring the access control systems. The only requirement are to keep cost as low as possible and minimize down time. While evaluating the effectiveness of several new devices, the security professional should expect that a biometric device becomes more sensitive when","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":14,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":3901,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-16 18:16:40","updated_at":"2016-03-12 19:58:58","questionName":"Which of the following is the MAIN advantage of having an application gateway?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":3,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":3906,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-17 00:55:15","updated_at":"2016-03-12 19:58:58","questionName":"Which of the following is an industry specific standard that PRIMARILY deals with privacy matters?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":7,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":3899,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-16 18:13:50","updated_at":"2016-03-12 19:58:58","questionName":"Why is projection lighting mounted at the same height as the barbed wire topping of a fence?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":1,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":4311,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-17 09:52:38","updated_at":"2016-03-12 19:58:58","questionName":"What is the recommended frequency that a system recovery plan be tested in a stable data processing environment?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":13,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":3900,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-16 18:15:19","updated_at":"2016-03-12 19:58:58","questionName":"International Organization for Standardization (ISO) standard 27002 provides guidance for vendor compliance by outlining","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":2,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":3905,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-17 00:53:56","updated_at":"2016-03-12 19:58:58","questionName":"In a discretionary mode, who has delegation authority to grant access to information?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":6,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":3908,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-17 00:58:41","updated_at":"2016-03-12 19:58:58","questionName":"The best practice to prevent logging clutter in application security is to","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":9,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null}]
4310
0
120
block

To support legacy applications that rely on risky protocols (e.g., plain text passwords), which one of the following can be implemented to mitigate the risks on a corporate network?

Select the Correct Answers  

(0/0)












3902
0
120
none
3898
0
120
none
3909
0
120
none
3907
0
120
none
3903
0
120
none
4309
0
120
none
4312
0
120
none
3901
0
120
none
3906
0
120
none
3899
0
120
none
4311
0
120
none
3900
0
120
none
3905
0
120
none
3908
0
120
none