CISSP Dumps

CISSP Free Practice Test

ISC2 CISSP: Certified Information Systems Security Professional (CISSP)

QUESTION 151

- (Exam Topic 15)
When configuring Extensible Authentication Protocol (EAP) in a Voice over Internet Protocol (VoIP) network, which of the following authentication types is the MOST secure?

Correct Answer: C

QUESTION 152

- (Exam Topic 15)
A network security engineer needs to ensure that a security solution analyzes traffic for protocol manipulation and various sorts of common attacks. In addition, all Uniform Resource Locator (URL) traffic must be inspected and users prevented from browsing inappropriate websites. Which of the following solutions should be implemented to enable administrators the capability to analyze traffic, blacklist external sites, and log user traffic for later analysis?

Correct Answer: B

QUESTION 153

- (Exam Topic 15)
In an IDEAL encryption system, who has sole access to the decryption key?

Correct Answer: B

QUESTION 154

- (Exam Topic 12)
An Intrusion Detection System (IDS) has recently been deployed in a Demilitarized Zone (DMZ). The IDS detects a flood of malformed packets. Which of the following BEST describes what has occurred?

Correct Answer: A

QUESTION 155

- (Exam Topic 10)
Refer to the information below to answer the question.
In a Multilevel Security (MLS) system, the following sensitivity labels are used in increasing levels of
sensitivity: restricted, confidential, secret, top secret. Table A lists the clearance levels for four users, while Table B lists the security classes of four different files.
CISSP dumps exhibit
Which of the following is true according to the star property (*property)?

Correct Answer: C