New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

ISC CISSP Based on Real Exam Environment

Page: 42 / 45
Question 168

Retaining system logs for six months or longer can be valuable for what activities?

Options:

A.

Disaster recovery and business continuity

B.

Forensics and incident response

C.

Identity and authorization management

D.

Physical and logical access control

Question 169

Knowing the language in which an encrypted message was originally produced might help a cryptanalyst to perform a

Options:

A.

clear-text attack.

B.

known cipher attack.

C.

frequency analysis.

D.

stochastic assessment.

Question 170

Regarding asset security and appropriate retention, which of the following INITIAL top three areas are important to focus on?

Options:

A.

Security control baselines, access controls, employee awareness and training

B.

Human resources, asset management, production management

C.

Supply chain lead-time, inventory control, and encryption

D.

Polygraphs, crime statistics, forensics

Question 171

What type of wireless network attack BEST describes an Electromagnetic Pulse (EMP) attack?

Options:

A.

Radio Frequency (RF) attack

B.

Denial of Service (DoS) attack

C.

Data modification attack

D.

Application-layer attack

Page: 42 / 45
Exam Code: CISSP
Exam Name: Certified Information Systems Security Professional (CISSP)
Last Update: Dec 27, 2024
Questions: 1486
CISSP pdf

CISSP PDF

$119.7  $399
CISSP Engine

CISSP Testing Engine

$134.7  $449
CISSP PDF + Engine

CISSP PDF + Testing Engine

$179.7  $599