Free CISSP Exam Braindumps

Pass your Certified Information Systems Security Professional (CISSP) exam with these free Questions and Answers

Page 5 of 298
QUESTION 16

- (Exam Topic 9)
Which one of the following effectively obscures network addresses from external exposure when implemented on a firewall or router?

  1. A. Network Address Translation (NAT)
  2. B. Application Proxy
  3. C. Routing Information Protocol (RIP) Version 2
  4. D. Address Masking

Correct Answer: A

QUESTION 17

- (Exam Topic 15)
A digitally-signed e-mail was delivered over a wireless network protected with Wired Equivalent Privacy (WEP) protocol. Which of the following principles is at risk?

  1. A. Availability
  2. B. Non-Repudiation
  3. C. Confidentiality
  4. D. Integrity

Correct Answer: B

QUESTION 18

- (Exam Topic 9)
When building a data center, site location and construction factors that increase the level of vulnerability to physical threats include

  1. A. hardened building construction with consideration of seismic factors.
  2. B. adequate distance from and lack of access to adjacent buildings.
  3. C. curved roads approaching the data center.
  4. D. proximity to high crime areas of the city.

Correct Answer: D

QUESTION 19

- (Exam Topic 15)
Why are packet filtering routers used in low-risk environments?

  1. A. They are high-resolution source discrimination and identification tools.
  2. B. They are fast and flexible, and protect against Internet Protocol (IP) spoofing.
  3. C. They are fast, flexible, and transparent.
  4. D. They enforce strong user authentication and audit tog generation.

Correct Answer: B

QUESTION 20

- (Exam Topic 15)
Which of the following BEST describes why software assurance is critical in helping prevent an increase in business and mission risk for an organization?

  1. A. Software that does not perform as intended may be exploitable which makes it vulnerable to attack.
  2. B. Request for proposals (RFP) avoid purchasing software that does not meet business needs.
  3. C. Contracting processes eliminate liability for security vulnerabilities for the purchaser.
  4. D. Decommissioning of old software reduces long-term costs related to technical debt.

Correct Answer: B

Page 5 of 298

Post your Comments and Discuss ISC2 CISSP exam with other Community members: