Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC CISSP - Certified Information Systems Security Professional (CISSP)

Page: 2 / 12
Total 1486 questions

Place in order, from BEST (1) to WORST (4), the following methods to reduce the risk of data remanence on magnetic media.

Retaining system logs for six months or longer can be valuable for what activities?

A.

Disaster recovery and business continuity

B.

Forensics and incident response

C.

Identity and authorization management

D.

Physical and logical access control

Which of the following statements is TRUE regarding value boundary analysis as a functional software testing technique?

A.

It is useful for testing communications protocols and graphical user interfaces.

B.

It is characterized by the stateless behavior of a process implemented in a function.

C.

Test inputs are obtained from the derived threshold of the given functional specifications.

D.

An entire partition can be covered by considering only one representative value from that partition.

What is the process called when impact values are assigned to the security objectives for information types?

A.

Qualitative analysis

B.

Quantitative analysis

C.

Remediation

D.

System security categorization

The goal of a Business Continuity Plan (BCP) training and awareness program is to

A.

enhance the skills required to create, maintain, and execute the plan.

B.

provide for a high level of recovery in case of disaster.

C.

describe the recovery organization to new employees.

D.

provide each recovery team with checklists and procedures.

What is the MOST efficient way to secure a production program and its data?

A.

Disable default accounts and implement access control lists (ACL)

B.

Harden the application and encrypt the data

C.

Disable unused services and implement tunneling

D.

Harden the servers and backup the data

A vulnerability in which of the following components would be MOST difficult to detect?

A.

Kernel

B.

Shared libraries

C.

Hardware

D.

System application

After a thorough analysis, it was discovered that a perpetrator compromised a network by gaining access to the network through a Secure Socket Layer (SSL) Virtual Private Network (VPN) gateway. The perpetrator guessed a username and brute forced the password to gain access. Which of the following BEST mitigates this issue?

A.

Implement strong passwords authentication for VPN

B.

Integrate the VPN with centralized credential stores

C.

Implement an Internet Protocol Security (IPSec) client

D.

Use two-factor authentication mechanisms

Which of the following activities BEST identifies operational problems, security misconfigurations, and malicious attacks?

A.

Policy documentation review

B.

Authentication validation

C.

Periodic log reviews

D.

Interface testing

Which of the following BEST describes the purpose of performing security certification?

A.

To identify system threats, vulnerabilities, and acceptable level of risk

B.

To formalize the confirmation of compliance to security policies and standards

C.

To formalize the confirmation of completed risk mitigation and risk analysis

D.

To verify that system architecture and interconnections with other systems are effectively implemented

Which of the following prevents improper aggregation of privileges in Role Based Access Control (RBAC)?

A.

Hierarchical inheritance

B.

Dynamic separation of duties

C.

The Clark-Wilson security model

D.

The Bell-LaPadula security model

Which of the following is needed to securely distribute symmetric cryptographic keys?

A.

Officially approved Public-Key Infrastructure (PKI) Class 3 or Class 4 certificates

B.

Officially approved and compliant key management technology and processes

C.

An organizationally approved communication protection policy and key management plan

D.

Hardware tokens that protect the user’s private key.

What operations role is responsible for protecting the enterprise from corrupt or contaminated media?

A.

Information security practitioner

B.

Information librarian

C.

Computer operator

D.

Network administrator

Which of the following adds end-to-end security inside a Layer 2 Tunneling Protocol (L2TP) Internet Protocol Security (IPSec) connection?

A.

Temporal Key Integrity Protocol (TKIP)

B.

Secure Hash Algorithm (SHA)

C.

Secure Shell (SSH)

D.

Transport Layer Security (TLS)

Which of the following is a function of Security Assertion Markup Language (SAML)?

A.

File allocation

B.

Redundancy check

C.

Extended validation

D.

Policy enforcement