New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

ISC 2 Credentials CISSP Exam Dumps

Page: 22 / 45
Total 1486 questions

Certified Information Systems Security Professional (CISSP) Questions and Answers

Question 85

What is the second step in the identity and access provisioning lifecycle?

Options:

A.

Provisioning

B.

Review

C.

Approval

D.

Revocation

Question 86

What does a Synchronous (SYN) flood attack do?

Options:

A.

Forces Transmission Control Protocol /Internet Protocol (TCP/IP) connections into a reset state

B.

Establishes many new Transmission Control Protocol / Internet Protocol (TCP/IP) connections

C.

Empties the queue of pending Transmission Control Protocol /Internet Protocol (TCP/IP) requests

D.

Exceeds the limits for new Transmission Control Protocol /Internet Protocol (TCP/IP) connections

Question 87

What are the steps of a risk assessment?

Options:

A.

identification, analysis, evaluation

B.

analysis, evaluation, mitigation

C.

classification, identification, risk management

D.

identification, evaluation, mitigation

Question 88

Which of the following is the MOST effective method to mitigate Cross-Site Scripting (XSS) attacks?

Options:

A.

Use Software as a Service (SaaS)

B.

Whitelist input validation

C.

Require client certificates

D.

Validate data output

Page: 22 / 45
Total 1486 questions