Certified Information Systems Security Professional – CISSP – Question186

When using Generic Routing Encapsulation (GRE) tunneling over Internet Protocol version 4 (IPv4), where is the GRE header inserted?

A.
Into the options field
B. Between the delivery header and payload
C. Between the source and destination addresses
D. Into the destination address

Correct Answer: B

Certified Information Systems Security Professional – CISSP – Question184

What is an advantage of Elliptic Curve Cryptography (ECC)?

A.
Cryptographic approach that does not require a fixed-length key
B. Military-strength security that does not depend upon secrecy of the algorithm
C. Opportunity to use shorter keys for the same level of security
D. Ability to use much longer keys for greater security

Correct Answer: C

Certified Information Systems Security Professional – CISSP – Question181

An organization’s information security strategic plan MUST be reviewed

A.
whenever there are significant changes to a major application.
B. quarterly, when the organization’s strategic plan is updated.
C. whenever there are major changes to the business.
D. every three years, when the organization’s strategic plan is updated.

Correct Answer: C

Certified Information Systems Security Professional – CISSP – Question179

In configuration management, what baseline configuration information MUST be maintained for each computer system?

A.
Operating system and version, patch level, applications running, and versions.
B. List of system changes, test reports, and change approvals
C. Last vulnerability assessment report and initial risk assessment report
D. Date of last update, test report, and accreditation certificate

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question177

An Intrusion Detection System (IDS) has recently been deployed in a Demilitarized Zone (DMZ). The IDS detects a flood of malformed packets. Which of the following BEST describes what has occurred?

A.
Denial of Service (DoS) attack
B. Address Resolution Protocol (ARP) spoof
C. Buffer overflow
D. Ping flood attack

Correct Answer: A