Free CISSP-ISSMP Exam Braindumps (page: 25)

Page 24 of 55

Which of the following statements best explains how encryption works on the Internet?

  1. Encryption encodes information using specific algorithms with a string of numbers known as a key.
  2. Encryption validates a username and password before sending information to the Web server.
  3. Encryption allows authorized users to access Web sites that offer online shopping.
  4. Encryption helps in transaction processing by e-commerce servers on the Internet.

Answer(s): A



Which of the following statutes is enacted in the U.S., which prohibits creditors from collecting data from applicants, such as national origin, caste, religion etc.?

  1. The Fair Credit Reporting Act (FCRA)
  2. The Privacy Act
  3. The Electronic Communications Privacy Act
  4. The Equal Credit Opportunity Act (ECOA)

Answer(s): D



Which of the following security models deal only with integrity? Each correct answer represents a complete solution. Choose two.

  1. Biba-Wilson
  2. Clark-Wilson
  3. Bell-LaPadula
  4. Biba

Answer(s): B,D



Rick is the project manager for TTM project. He is in the process of procuring services from vendors. He makes a contract with a vendor in which he precisely specifies the services to be procured, and any changes to the procurement specification will increase the costs to the buyer. Which type of contract is this?

  1. Firm Fixed Price
  2. Fixed Price Incentive Fee
  3. Cost Plus Fixed Fee Contract
  4. Fixed Price with Economic Price Adjustment

Answer(s): A






Post your Comments and Discuss ISC CISSP-ISSMP exam with other Community members:

CISSP-ISSMP Discussions & Posts