考题云-WellCMS
  •  首页
  •  外语
  •  计算机
  •  考研
  •  公务员
  •  职业资格
  •  财经
  •  工程
  •  司法
  •  医学
  •  专升本
  •  自考
  •  实用职业技能
  •  登录
  1. 标签
  2. CISSP认证
  • Security countermeasures should be transparent to users and attackers. Which of the following does not describe transparency?

    CISSP认证
    admin2013-12-19
    460
  • Phishing and pharming are similar. Which of the following correctly describes the difference between phishing and pharming?

    CISSP认证
    admin2013-12-19
    600
  • Which of the following correctly describes a federated identity and its role within identity management processes?

    CISSP认证
    admin2013-12-19
    790
  • Emily is listening to network traffic and capturing passwords as they are sent to the authentication server. She plans to use th

    CISSP认证
    admin2013-12-19
    1040
  • Brian has been asked to work on the virtual directory of his company’s new identity management system. Which of the following be

    CISSP认证
    admin2013-12-19
    840
  • What was the direct predecessor to Standard Generalized Markup Language(SGML)?

    CISSP认证
    admin2013-12-19
    640
  • Which of the following does not describe privacy-aware role-based access control?

    CISSP认证
    admin2013-12-19
    320
  • A number of attacks can be performed against smart cards. Side-channel is a class of attacks that doesn’t try to compromise a fl

    CISSP认证
    admin2013-12-19
    560
  • There are several types of password management approaches used by identity management systems. Which of the following reduces he

    CISSP认证
    admin2013-12-19
    960
  • Hannah has been assigned the task of installing Web access management(WAM) software. What is the best description for what WAM i

    CISSP认证
    admin2013-12-19
    800
  • Which of the following does not correctly describe a directory service?

    CISSP认证
    admin2013-12-19
    790
  • The following scenario will be used for questions 29 and 30. John is a network administrator and has been told by one of his net

    CISSP认证
    admin2013-12-19
    980
  • The following scenario will be used for questions 29 and 30. John is a network administrator and has been told by one of his net

    CISSP认证
    admin2013-12-19
    830
  • Bob is a new security administrator at a financial institution. The organization has experienced some suspicious activity on one

    CISSP认证
    admin2013-12-19
    640
  • ______provides for availability and scalability. It groups physically different systems and combines them logically, which helps

    CISSP认证
    admin2013-12-19
    830
  • Which of the following is not considered a countermeasure to port scanning and operating system fingerprinting?

    CISSP认证
    admin2013-12-19
    880
  • There are several different types of important architectures within backup technologies. Which architecture does the graphic tha

    CISSP认证
    admin2013-12-19
    700
  • Mirroring of drives is when data is written to two drives at once for redundancy purposes. What similar type of technology is sh

    CISSP认证
    admin2013-12-19
    690
  • In a redundant array of inexpensive disks (RAID) systems, data and parity information are striped over several different disks.

    CISSP认证
    admin2013-12-19
    760
  • Guidelines should be followed to allow secure remote administration. Which of the following is not one of those guidelines?

    CISSP认证
    admin2013-12-19
    390
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • ...21
  • »
CopyRight © 2025 All Rights Reserved
Processed: 0.009, SQL: 4