Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC CISSP - Certified Information Systems Security Professional (CISSP)

Page: 1 / 12
Total 1486 questions

The BEST method to mitigate the risk of a dictionary attack on a system is to

A.

use a hardware token.

B.

use complex passphrases.

C.

implement password history.

D.

encrypt the access control list (ACL).

The implementation of which features of an identity management system reduces costs and administration overhead while improving audit and accountability?

A.

Two-factor authentication

B.

Single Sign-On (SSO)

C.

User self-service

D.

A metadirectory

Between which pair of Open System Interconnection (OSI) Reference Model layers are routers used as a communications device?

A.

Transport and Session

B.

Data-Link and Transport

C.

Network and Session

D.

Physical and Data-Link

Which of the following countermeasures is the MOST effective in defending against a social engineering attack?

A.

Mandating security policy acceptance

B.

Changing individual behavior

C.

Evaluating security awareness training

D.

Filtering malicious e-mail content

From a cryptographic perspective, the service of non-repudiation includes which of the following features?

A.

Validity of digital certificates

B.

Validity of the authorization rules

C.

Proof of authenticity of the message

D.

Proof of integrity of the message

Which of the following is a reason to use manual patch installation instead of automated patch management?

A.

The cost required to install patches will be reduced.

B.

The time during which systems will remain vulnerable to an exploit will be decreased.

C.

The likelihood of system or application incompatibilities will be decreased.

D.

The ability to cover large geographic areas is increased.

Match the objectives to the assessment questions in the governance domain of Software Assurance Maturity Model (SAMM).

Which of the following is the MOST important goal of information asset valuation?

A.

Developing a consistent and uniform method of controlling access on information assets

B.

Developing appropriate access control policies and guidelines

C.

Assigning a financial value to an organization’s information assets

D.

Determining the appropriate level of protection

Which of the following is the MOST effective method of mitigating data theft from an active user workstation?

A.

Implement full-disk encryption

B.

Enable multifactor authentication

C.

Deploy file integrity checkers

D.

Disable use of portable devices

What is the MOST important element when considering the effectiveness of a training program for Business Continuity (BC) and Disaster Recovery (DR)?

A.

Management support

B.

Consideration of organizational need

C.

Technology used for delivery

D.

Target audience

The MAIN reason an organization conducts a security authorization process is to

A.

force the organization to make conscious risk decisions.

B.

assure the effectiveness of security controls.

C.

assure the correct security organization exists.

D.

force the organization to enlist management support.

A.

Denial of Service (DoS) attack

B.

Address Resolution Protocol (ARP) spoof

C.

Buffer overflow

D.

Ping flood attack

In the network design below, where is the MOST secure Local Area Network (LAN) segment to deploy a Wireless Access Point (WAP) that provides contractors access to the Internet and authorized enterprise services?

What is the GREATEST challenge to identifying data leaks?

A.

Available technical tools that enable user activity monitoring.

B.

Documented asset classification policy and clear labeling of assets.

C.

Senior management cooperation in investigating suspicious behavior.

D.

Law enforcement participation to apprehend and interrogate suspects.

Which Web Services Security (WS-Security) specification negotiates how security tokens will be issued, renewed and validated? Click on the correct specification in the image below.