![](https://static.isu.pub/fe/default-story-images/news.jpg?width=720&quality=85%2C50)
1 minute read
CISSP Syllabus
Preparation tips for ISC2 CISSP Certification
• Perform enough practice with ISC2 system with related ISC2 CISSP certification subjects
Advertisement
• Identify the key configuration, workflow and data flow
• Understand the all Syllabus Topics of Exam which are Given in Description.
• Identify your weak areas from practice test and do more practice with system
• Repeat practice exams and try to score 100% on www.edusum.com a) Leaky attack b) Social engineering c) Banner attack d) Reading attack
Q 1) When a system fails to display leaky banners, information that's useful to a hacker is visible in error messages. This is an example of which type of attack?
Option.
c) Banner attack
Q 2) Retinal and fingerprint scanners do which of the following when enrolling a new user, if designed securely?
Option.
a) Save an image of the user's retina or fingerprint, and then encrypt the image.
b) Convert the user's retina or fingerprint image into a hash, and then encrypt the hash.
c) Save an image of the user's retina or fingerprint.
d) Convert the user's retina or fingerprint image into a hash.