O'Reilly logo

CISSP in 21 Days - Second Edition by M. L. Srinivasan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Mock test

Q1. An attack that compromises the information stored in the client machine by web browsers for faster retrieval during subsequent visits is called what?

  1. Path traversal
  2. Data structure attacks
  3. Eavesdropping
  4. Cache poisoning

Q2. Which of the following are risk management processes? (This is a drag-and-drop type of question. Here, and for similar drag-and-drop questions, you can draw a line from the list of answers from the left to the empty box on the right.)

Mock test

Q3. Primary criterion of a Business continuity planning is to ensure that the scoping is _____.

  1. Adequate
  2. Large
  3. Appropriate
  4. Wide coverage

Q4. What is the algorithm used by the Wi-Fi Protected Access ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required