Free ISC2 CISSP Exam Braindumps (page: 21)

An authentication system that uses challenge and response was recently implemented on an organization's network, because the organization conducted an annual penetration test showing that testers were able to move laterally using authenticated credentials. Which attack method was MOST likely used to achieve this?

  1. Hash collision
  2. Pass the ticket
  3. Brute force
  4. Cross-Site Scripting (XSS)

Answer(s): B



Which of the following would qualify as an exception to the "right to be forgotten" of the General Data Protection Regulation (GDPR)?

  1. For the establishment, exercise, or defense of legal claims
  2. The personal data has been lawfully processed and collected
  3. For the reasons of private interest
  4. The personal data remains necessary to the purpose for which it was collected

Answer(s): A



Dumpster diving is a technique used in which stage of penetration testing methodology?

  1. Attack
  2. Reporting
  3. Planning
  4. Discovery

Answer(s): D



Which of the following is performed to determine a measure of success of a security awareness training program designed to prevent social engineering attacks?

  1. Employee evaluation of the training program
  2. Internal assessment of the training program's effectiveness
  3. Multiple choice tests to participants
  4. Management control of reviews

Answer(s): B






Post your Comments and Discuss ISC2 CISSP exam prep with other Community members:

CISSP Exam Discussions & Posts