Which of the following is most affected by denial-of-service (DOS) attacks?

Which of the following is most affected by denial-of-service (DOS) attacks?A .  ConfidentialityB .  IntegrityC .  AccountabilityD .  AvailabilityView AnswerAnswer: D Explanation: Denial of service attacks obviously affect availability of targeted systems. Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer...

October 23, 2018 No Comments READ MORE +

Which of the following statements pertaining to using Kerberos without any extension is false?

Which of the following statements pertaining to using Kerberos without any extension is false?A .  A client can be impersonated by password-guessing.B .  Kerberos is mostly a third-party authentication protocol.C .  Kerberos uses public key cryptography.D .  Kerberos provides robust authentication.View AnswerAnswer: C Explanation: Kerberos is a trusted, credential-based, third-party...

October 22, 2018 No Comments READ MORE +

The three classic ways of authenticating yourself to the computer security software are: something you know, something you have, and something:

The three classic ways of authenticating yourself to the computer security software are: something you know, something you have, and something:A .  you need.B .  you read.C .  you are.D .  you do.View AnswerAnswer: C Explanation: Source: TIPTON, Hal, (ISC)2, Introduction to the CISSP Exam presentation.

October 22, 2018 No Comments READ MORE +

External consistency ensures that the data stored in the database is:

External consistency ensures that the data stored in the database is:A .  in-consistent with the real world.B .  remains consistant when sent from one system to another.C .  consistent with the logical world.D .  consistent with the real world.View AnswerAnswer: D Explanation: External consistency ensures that the data stored in...

October 21, 2018 No Comments READ MORE +

Which of the following classes is defined in the TCSEC (Orange Book) as discretionary protection?

Which of the following classes is defined in the TCSEC (Orange Book) as discretionary protection?A .  CB .  BC .  AD .  DView AnswerAnswer: A Explanation: Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, page 197. Also: THE source...

October 21, 2018 No Comments READ MORE +

Which of the following questions is less likely to help in assessing identification and authentication controls?

Which of the following questions is less likely to help in assessing identification and authentication controls?A .  Is a current list maintained and approved of authorized users and their access?B .  Are passwords changed at least every ninety days or earlier if needed?C .  Are inactive user identifications disabled after...

October 20, 2018 No Comments READ MORE +

Whose role is it to assign classification level to information?

Whose role is it to assign classification level to information?A .  Security AdministratorB .  UserC .  OwnerD .  AuditorView AnswerAnswer: C Explanation: The Data/Information Owner is ultimately responsible for the protection of the data. It is the Data/Information Owner that decides upon the classifications of that data they are responsible for....

October 20, 2018 No Comments READ MORE +

Which of the following are NOT a countermeasure to traffic analysis?

Which of the following are NOT a countermeasure to traffic analysis?A .  Padding messages.B .  Eavesdropping.C .  Sending noise.D .  Faraday CageView AnswerAnswer: B Explanation: Eavesdropping is not a countermeasure, it is a type of attack where you are collecting traffic and attempting to see what is being send between...

October 19, 2018 No Comments READ MORE +

Related to information security, the prevention of the intentional or unintentional unauthorized disclosure of contents is which of the following?

Related to information security, the prevention of the intentional or unintentional unauthorized disclosure of contents is which of the following?A .  ConfidentialityB .  IntegrityC .  AvailabilityD .  capabilityView AnswerAnswer: A Explanation: Confidentiality is the prevention of the intentional or unintentional unauthorized disclosure of contents. Source: KRUTZ, Ronald L. & VINES,...

October 18, 2018 No Comments READ MORE +

Which of the following is less likely to be included in the change control sub-phase of the maintenance phase of a software product?

Which of the following is less likely to be included in the change control sub-phase of the maintenance phase of a software product?A .  Estimating the cost of the changes requestedB .  Recreating and analyzing the problemC .  Determining the interface that is presented to the userD .  Establishing the...

October 18, 2018 No Comments READ MORE +