PrepAway - Latest Free Exam Questions & Answers

Tag: CISSP

What type of technology does Joe need toimplement for this type of functionality?

Joe is a manager over the e-commerce capabilities and technologies within hiscompany. His boss has recently told him that the company is going to partner withanother company and that customer entitlements need to be able to transparentlytransverse the different networks. What type of technology does Joe need toimplement for this type of functionality?

Which of the following has the correct definition mapping?

Which of the following has the correct definition mapping?

i.Brute force attacks Performed with tools that cycle through many possiblecharacter, number, and symbol combinations to uncover a password.
ii. Dictionary attacks Files of thousands of words are compared to the user’spassword until a match is found.
iii. Social engineering An attacker falsely convinces an individual that she has thenecessary authorization to access specific resources.
iv. Rainbow table An attacker uses a table that contains all possible passwordsalready in a hash format.


Page 240 of 250« First...102030...238239240241242...250...Last »