Page 945 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 945
C. SSH
D. TLS
10. Which of the following is not a benefit of NAT?
A. Hiding the internal IP addressing scheme
B. Sharing a few public internet addresses with a large number of
internal clients
C. Using the private IP addresses from RFC 1918 on an internal
network
D. Filtering network traffic to prevent brute-force attacks
11. A significant benefit of a security control is when it goes unnoticed
by users. What is this called?
A. Invisibility
B. Transparency
C. Diversion
D. Hiding in plain sight
12. When you’re designing a security system for internet-delivered
email, which of the following is least important?
A. Nonrepudiation
B. Availability
C. Message integrity
D. Access restriction
13. Which of the following is typically not an element that must be
discussed with end users in regard to email retention policies?
A. Privacy
B. Auditor review
C. Length of retainer
D. Backup method

