Free CISSP-ISSMP Exam Braindumps (page: 4)

Page 3 of 55

Which of the following protocols is used with a tunneling protocol to provide security?

  1. FTP
  2. IPX/SPX
  3. IPSec
  4. EAP

Answer(s): C



Which of the following subphases are defined in the maintenance phase of the life cycle models?

  1. Change control
  2. Configuration control
  3. Request control
  4. Release control

Answer(s): A,C,D



Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?

  1. Non-repudiation
  2. Confidentiality
  3. Authentication
  4. Integrity

Answer(s): A



Which of the following characteristics are described by the DIAP Information Readiness Assessment function? Each correct answer represents a complete solution. Choose all that apply.

  1. It performs vulnerability/threat analysis assessment.
  2. It identifies and generates IA requirements.
  3. It provides data needed to accurately assess IA readiness.
  4. It provides for entry and storage of individual system data.

Answer(s): A,B,C






Post your Comments and Discuss ISC CISSP-ISSMP exam with other Community members:

CISSP-ISSMP Discussions & Posts