Exam information

Exam CISSP: Certified Information Systems Security Professional

What characteristics of IDM products is he reviewing?


Hamid is reviewing identity management (IDM) products for his company’senvironment. He has a choice of choosing a product that gathers user identityinformation and holding it in one location or a product that provides pointers tothis type of information that resides in various locations […]

“Something you know, something you have, and something you are” represents the three possible factors of ___________.

"Something you know, something you have, and something you are" represents the three possible factors of ___________.

Which would not be considered a good practice inimplementing identification access control?

Because identification is critical to the issue of accountability, companiesshould follow strict guidelines. Which would not be considered a good practice inimplementing identification access control?

Which of the following is not a form of identification?

Which of the following is not a form of identification?

What is this an example of?

Since 9/11, airport parking garages now keep cars further away from the terminal entrance. What is this an example of?


Which of thefollowing makes the most sense when constructing a DN?

Each distinguished name (DN) in an LDAP directory represents a collection ofattributes about a specific object, and is stored in the directory as an entry. DNsare composed of mon Name (CN) components which describe the object, and Domainponents (DC) which describe the domain in which the […]

which of the following?

Administrative controls include all but which of the following?

Which of the following is not a physical access control?

Which of the following is not a physical access control?

Which exploit builds its attack around “half-open” connections?

Which exploit builds its attack around "half-open" connections?

how would theobjects in the database be uniquely identified and addressed?

If Jan chooses a product based upon this type of technology, how would theobjects in the database be uniquely identified and addressed?



Page 1 of 24412345...102030...Last »