New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

Last Attempt CISSP Questions

Page: 22 / 45
Question 88

While impersonating an Information Security Officer (ISO), an attacker obtains information from company employees about their User IDs and passwords. Which method of information gathering has the attacker used?

Options:

A.

Trusted path

B.

Malicious logic

C.

Social engineering

D.

Passive misuse

Question 89

What would be the PRIMARY concern when designing and coordinating a security assessment for an Automatic Teller Machine (ATM) system?

Options:

A.

Physical access to the electronic hardware

B.

Regularly scheduled maintenance process

C.

Availability of the network connection

D.

Processing delays

Question 90

Why must all users be positively identified prior to using multi-user computers?

Options:

A.

To provide access to system privileges

B.

To provide access to the operating system

C.

To ensure that unauthorized persons cannot access the computers

D.

To ensure that management knows what users are currently logged on

Question 91

Which Hyper Text Markup Language 5 (HTML5) option presents a security challenge for network data leakage prevention and/or monitoring?

Options:

A.

Cross Origin Resource Sharing (CORS)

B.

WebSockets

C.

Document Object Model (DOM) trees

D.

Web Interface Definition Language (IDL)

Page: 22 / 45
Exam Code: CISSP
Exam Name: Certified Information Systems Security Professional (CISSP)
Last Update: Dec 22, 2024
Questions: 1486
CISSP pdf

CISSP PDF

$119.7  $399
CISSP Engine

CISSP Testing Engine

$134.7  $449
CISSP PDF + Engine

CISSP PDF + Testing Engine

$179.7  $599