Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ISC CISSP - Certified Information Systems Security Professional (CISSP)

Page: 11 / 12
Total 1486 questions

An advantage of link encryption in a communications network is that it

A.

makes key management and distribution easier.

B.

protects data from start to finish through the entire network.

C.

improves the efficiency of the transmission.

D.

encrypts all information, including headers and routing information.

Contingency plan exercises are intended to do which of the following?

A.

Train personnel in roles and responsibilities

B.

Validate service level agreements

C.

Train maintenance personnel

D.

Validate operation metrics

Which one of the following considerations has the LEAST impact when considering transmission security?

A.

Network availability

B.

Data integrity

C.

Network bandwidth

D.

Node locations

Which of the following assessment metrics is BEST used to understand a system's vulnerability to potential exploits?

A.

Determining the probability that the system functions safely during any time period

B.

Quantifying the system's available services

C.

Identifying the number of security flaws within the system

D.

Measuring the system's integrity in the presence of failure

Which of the following MUST be part of a contract to support electronic discovery of data stored in a cloud environment?

A.

Integration with organizational directory services for authentication

B.

Tokenization of data

C.

Accommodation of hybrid deployment models

D.

Identification of data location

Which of the following MUST be done when promoting a security awareness program to senior management?

A.

Show the need for security; identify the message and the audience

B.

Ensure that the security presentation is designed to be all-inclusive

C.

Notify them that their compliance is mandatory

D.

Explain how hackers have enhanced information security

Which of the following wraps the decryption key of a full disk encryption implementation and ties the hard disk drive to a particular device?

A.

Trusted Platform Module (TPM)

B.

Preboot eXecution Environment (PXE)

C.

Key Distribution Center (KDC)

D.

Simple Key-Management for Internet Protocol (SKIP)

Which of the following can BEST prevent security flaws occurring in outsourced software development?

A.

Contractual requirements for code quality

B.

Licensing, code ownership and intellectual property rights

C.

Certification of the quality and accuracy of the work done

D.

Delivery dates, change management control and budgetary control

Which of the following is an attacker MOST likely to target to gain privileged access to a system?

A.

Programs that write to system resources

B.

Programs that write to user directories

C.

Log files containing sensitive information

D.

Log files containing system calls

Who must approve modifications to an organization's production infrastructure configuration?

A.

Technical management

B.

Change control board

C.

System operations

D.

System users

Two companies wish to share electronic inventory and purchase orders in a supplier and client relationship. What is the BEST security solution for them?

A.

Write a Service Level Agreement (SLA) for the two companies.

B.

Set up a Virtual Private Network (VPN) between the two companies.

C.

Configure a firewall at the perimeter of each of the two companies.

D.

Establish a File Transfer Protocol (FTP) connection between the two companies.

Which of the following statements is TRUE of black box testing?

A.

Only the functional specifications are known to the test planner.

B.

Only the source code and the design documents are known to the test planner.

C.

Only the source code and functional specifications are known to the test planner.

D.

Only the design documents and the functional specifications are known to the test planner.

Including a Trusted Platform Module (TPM) in the design of a computer system is an example of a technique to what?

A.

Interface with the Public Key Infrastructure (PKI)

B.

Improve the quality of security software

C.

Prevent Denial of Service (DoS) attacks

D.

Establish a secure initial state

Which security action should be taken FIRST when computer personnel are terminated from their jobs?

A.

Remove their computer access

B.

Require them to turn in their badge

C.

Conduct an exit interview

D.

Reduce their physical access level to the facility

Checking routing information on e-mail to determine it is in a valid format and contains valid information is an example of which of the following anti-spam approaches?

A.

Simple Mail Transfer Protocol (SMTP) blacklist

B.

Reverse Domain Name System (DNS) lookup

C.

Hashing algorithm

D.

Header analysis