Pass the ISC ISC 2 Credentials CISSP Questions and answers with CertsForce

Viewing page 16 out of 16 pages
Viewing questions 226-240 out of questions
Questions # 226:

Which of the following mobile code security models relies only on trust?

Options:

A.

Code signing


B.

Class authentication


C.

Sandboxing


D.

Type safety


Expert Solution
Questions # 227:

What is the second phase of Public Key Infrastructure (PKI) key/certificate life-cycle management?

Options:

A.

Implementation Phase


B.

Initialization Phase


C.

Cancellation Phase


D.

Issued Phase


Expert Solution
Questions # 228:

Which component of the Security Content Automation Protocol (SCAP) specification contains the data required to estimate the severity of vulnerabilities identified automated vulnerability assessments?

Options:

A.

Common Vulnerabilities and Exposures (CVE)


B.

Common Vulnerability Scoring System (CVSS)


C.

Asset Reporting Format (ARF)


D.

Open Vulnerability and Assessment Language (OVAL)


Expert Solution
Questions # 229:

Which security service is served by the process of encryption plaintext with the sender’s private key and decrypting cipher text with the sender’s public key?

Options:

A.

Confidentiality


B.

Integrity


C.

Identification


D.

Availability


Expert Solution
Questions # 230:

The use of private and public encryption keys is fundamental in the implementation of which of the following?

Options:

A.

Diffie-Hellman algorithm


B.

Secure Sockets Layer (SSL)


C.

Advanced Encryption Standard (AES)


D.

Message Digest 5 (MD5)


Expert Solution
Viewing page 16 out of 16 pages
Viewing questions 226-240 out of questions