Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ISC Certified Information Systems Security Professional (CISSP) CISSP Questions and answers with ValidTests

Viewing page 1 out of 12 pages
Viewing questions 1-15 out of questions
Questions # 1:

Which of the following techniques evaluates the secure Bet principles of network or software architectures?

Options:

A.

Threat modeling

B.

Risk modeling

C.

Waterfall method

D.

Fuzzing

Expert Solution
Questions # 2:

When performing an investigation with the potential for legal action, what should be the analyst's FIRST consideration?

Options:

A.

Chain-of-custody

B.

Authorization to collect

C.

Court admissibility

D.

Data decryption

Expert Solution
Questions # 3:

The security architect has been mandated to assess the security of various brands of mobile devices. At what phase of the product lifecycle would this be MOST likely to occur?

Options:

A.

Disposal

B.

Implementation

C.

Development

D.

Operations and maintenance

Expert Solution
Questions # 4:

An organization operates a legacy Industrial Control System (ICS) to support its core business service, which carrot be replaced. Its management MUST be performed remotely through an administrative console software, which in tum depends on an old version of the Java Runtime Environment (JPE) known to be vulnerable to a number of attacks, How is this risk BEST managed?

Options:

A.

Isolate the full ICS by moving It onto its own network segment

B.

Air-gap and harden the host used for management purposes

C.

Convince the management to decommission the ICS and mitigate to a modem technology

D.

Deploy a restrictive proxy between all clients and the vulnerable management station

Expert Solution
Questions # 5:

Which of the following features is MOST effective in mitigating against theft of data on a corporate mobile device which has been stolen?

Options:

A.

Mobile Device Management (MDM) with device wipe

B.

Whole device encryption with key escrow

C.

Virtual private network (VPN) with traffic encryption

D.

Mobile device tracking with geolocation

Expert Solution
Questions # 6:

The personal laptop of an organization executive is stolen from the office, complete with personnel and project records. Which of the following should be done FIRST to mitigate future occurrences?

Options:

A.

Encrypt disks on personal laptops.

B.

Issue cable locks for use on personal laptops.

C.

Create policies addressing critical information on personal laptops.

D.

Monitor personal laptops for critical information.

Expert Solution
Questions # 7:

Internet protocol security (IPSec), point-to-point tunneling protocol (PPTP), and secure sockets Layer (SSL) all use Which of the following to prevent replay attacks?

Options:

A.

Large Key encryption

B.

Single integrity protection

C.

Embedded sequence numbers

D.

Randomly generated nonces

Expert Solution
Questions # 8:

A company is enrolled in a hard drive reuse program where decommissioned equipment is sold back to the vendor when it is no longer needed. The vendor pays more money for functioning drives than equipment that is no longer operational. Which method of data sanitization would provide the most secure means of preventing unauthorized data loss, while also receiving the most money from the vendor?

Options:

A.

Pinning

B.

Single-pass wipe

C.

Degaussing

D.

Multi-pass wipes

Expert Solution
Questions # 9:

Which application type is considered high risk and provides a common way for malware and viruses to enter a network?

Options:

A.

Instant messaging or chat applications

B.

E-mail applications

C.

Peer-to-Peer (P2P) file sharing applications

D.

End-to-end applications

Expert Solution
Questions # 10:

Which layer of the Open system Interconnect (OSI) model is responsible for secure data transfer between applications, flow control, and error detection and correction?

Options:

A.

Layer 2

B.

Layer 4

C.

Layer 5

D.

Layer 6

Expert Solution
Questions # 11:

An organization has implemented a password complexity and an account lockout policy enforcing five incorrect logins tries within ten minutes. Network users have reported significantly increased account lockouts. Which of the following security principles is this company affecting?

Options:

A.

Availability

B.

Integrity

C.

Confidentiality

D.

Authentication

Expert Solution
Questions # 12:

In which process MUST security be considered during the acquisition of new software?

Options:

A.

Contract negotiation

B.

Request for proposal (RFP)

C.

Implementation

D.

Vendor selection

Expert Solution
Questions # 13:

What is the FIRST step that should be considered in a Data Loss Prevention (DLP) program?

Options:

A.

Configuration management (CM)

B.

Information Rights Management (IRM)

C.

Policy creation

D.

Data classification

Expert Solution
Questions # 14:

Which of the following poses the GREATEST privacy risk to personally identifiable information (PII) when disposing of an office printer or copier?

Options:

A.

The device could contain a document with PII on the platen glass

B.

Organizational network configuration information could still be present within the device

C.

A hard disk drive (HDD) in the device could contain PII

D.

The device transfer roller could contain imprints of PII

Expert Solution
Questions # 15:

Which of the following is the final phase of the identity and access provisioning lifecycle?

Options:

A.

Recertification

B.

Revocation

C.

Removal

D.

Validation

Expert Solution
Viewing page 1 out of 12 pages
Viewing questions 1-15 out of questions