Page 945 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 945

C.  SSH

                    D.  TLS

              10.  Which of the following is not a benefit of NAT?


                    A.  Hiding the internal IP addressing scheme

                    B.  Sharing a few public internet addresses with a large number of
                        internal clients

                    C.  Using the private IP addresses from RFC 1918 on an internal
                        network

                    D.  Filtering network traffic to prevent brute-force attacks

               11.  A significant benefit of a security control is when it goes unnoticed
                    by users. What is this called?

                    A.  Invisibility

                    B.  Transparency


                    C.  Diversion

                    D.  Hiding in plain sight

               12.  When you’re designing a security system for internet-delivered
                    email, which of the following is least important?

                    A.  Nonrepudiation

                    B.  Availability

                    C.  Message integrity

                    D.  Access restriction

               13.  Which of the following is typically not an element that must be

                    discussed with end users in regard to email retention policies?

                    A.  Privacy

                    B.  Auditor review

                    C.  Length of retainer

                    D.  Backup method
   940   941   942   943   944   945   946   947   948   949   950