Free CISSP Exam Dumps

Question 256

- (Exam Topic 9)
Which of the following is a security limitation of File Transfer Protocol (FTP)?

Correct Answer:D

Question 257

- (Exam Topic 9)
The birthday attack is MOST effective against which one of the following cipher technologies?

Correct Answer:C

Question 258

- (Exam Topic 1)
A company whose Information Technology (IT) services are being delivered from a Tier 4 data center, is preparing a companywide Business Continuity Planning (BCP). Which of the following failures should the IT manager be concerned with?

Correct Answer:C

Question 259

- (Exam Topic 13)
Which of the following entails identification of data and links to business processes, applications, and data stores as well as assignment of ownership responsibilities?

Correct Answer:B

Question 260

- (Exam Topic 9)
The process of mutual authentication involves a computer system authenticating a user and authenticating the

Correct Answer:B