Certified Information Systems Security Professional – CISSP – Question081

What is the purpose of an Internet Protocol (IP) spoofing attack?

A.
To send excessive amounts of data to a process, making it unpredictable
B. To intercept network traffic without authorization
C. To disguise the destination address from a target’s IP filtering devices
D. To convince a system that it is communicating with a known entity

Correct Answer: D

Certified Information Systems Security Professional – CISSP – Question080

Even though a particular digital watermark is difficult to detect, which of the following represents a way it might still be inadvertently removed?

A.
Truncating parts of the data
B. Applying Access Control Lists (ACL) to the data
C. Appending non-watermarked data to watermarked data
D. Storing the data in a database

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question078

Which of the BEST internationally recognized standard for evaluating security products and systems?

A.
Payment Card Industry Data Security Standards (PCI-DSS)
B. Common Criteria (CC)
C. Health Insurance Portability and Accountability Act (HIPAA)
D. Sarbanes-Oxley (SOX)

Correct Answer: B