Certified Information Systems Security Professional – CISSP – Question114

Which of the following BEST describes an access control method utilizing cryptographic keys derived from a smart card private key that is embedded within mobile devices?

A.
Derived credential
B. Temporary security credential
C. Mobile device credentialing service
D. Digest authentication

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question113

A manufacturing organization wants to establish a Federated Identity Management (FIM) system with its 20 different supplier companies. Which of the following is the BEST solution for the manufacturing organization?

A.
Trusted third-party certification
B. Lightweight Directory Access Protocol (LDAP)
C. Security Assertion Markup language (SAML)
D. Cross-certification

Certified Information Systems Security Professional – CISSP – Question112

During examination of Internet history records, the following string occurs within a Unique Resource Locator (URL):
http://www.companysite.com/products/products.asp?productid=123 or 1=1 What type of attack does this indicate?

A.
Directory traversal
B. Structured Query Language (SQL) injection
C. Cross-Site Scripting (XSS)
D. Shellcode injection

Correct Answer: C

Certified Information Systems Security Professional – CISSP – Question110

Which of the following would an attacker BEST be able to accomplish through the use of Remote Access Tools (RAT)?

A.
Reduce the probability of identification
B. Detect further compromise of the target
C. Destabilize the operation of the host
D. Maintain and expand control

Correct Answer: D

Certified Information Systems Security Professional – CISSP – Question108

A security practitioner is tasked with securing the organization’s Wireless Access Points (WAP). Which of these is the MOST effective way of restricting this environment to authorized users?

A.
Enable Wi-Fi Protected Access 2 (WPA2) encryption on the wireless access point
B. Disable the broadcast of the Service Set Identifier (SSID) name
C. Change the name of the Service Set Identifier (SSID) to a random value not associated with the organization
D. Create Access Control Lists (ACL) based on Media Access Control (MAC) addresses

Correct Answer: D

Certified Information Systems Security Professional – CISSP – Question107

What can happen when an Intrusion Detection System (IDS) is installed inside a firewall-protected internal network?

A.
The IDS can detect failed administrator logon attempts from servers.
B. The IDS can increase the number of packets to analyze.
C. The firewall can increase the number of packets to analyze.
D. The firewall can detect failed administrator login attempts from servers

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question105

“Stateful” differs from “Static” packet filtering firewalls by being aware of which of the following?

A.
Difference between a new and an established connection
B. Originating network location
C. Difference between a malicious and a benign packet payload
D. Originating application session

Correct Answer: A