Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the ISC 2 Credentials CISSP Questions and answers with ValidTests

Exam CISSP All Questions
Exam CISSP Premium Access

View all detail and faqs for the CISSP exam

Viewing page 12 out of 12 pages
Viewing questions 166-180 out of questions
Questions # 166:

When evaluating third-party applications, which of the following is the GREATEST responsibility of Information Security?

Options:

A.

Accept the risk on behalf of the organization.

B.

Report findings to the business to determine security gaps.

C.

Quantify the risk to the business for product selection.

D.

Approve the application that best meets security requirements.

Expert Solution
Questions # 167:

Which Web Services Security (WS-Security) specification handles the management of security tokens and the underlying policies for granting access? Click on the correct specification in the image below.

Question # 167

Options:

Expert Solution
Questions # 168:

Which of the following entities is ultimately accountable for data remanence vulnerabilities with data replicated by a cloud service provider?

Options:

A.

Data owner

B.

Data steward

C.

Data custodian

D.

Data processor

Expert Solution
Questions # 169:

A company was ranked as high in the following National Institute of Standards and Technology (NIST) functions: Protect, Detect, Respond and Recover. However, a low maturity grade was attributed to the Identify function. In which of the following the controls categories does this company need to improve when analyzing its processes individually?

Options:

A.

Asset Management, Business Environment, Governance and Risk Assessment

B.

Access Control, Awareness and Training, Data Security and Maintenance

C.

Anomalies and Events, Security Continuous Monitoring and Detection Processes

D.

Recovery Planning, Improvements and Communications

Expert Solution
Questions # 170:

Which of the following are Systems Engineering Life Cycle (SELC) Technical Processes?

Options:

A.

Concept, Development, Production, Utilization, Support, Retirement

B.

Stakeholder Requirements Definition, Architectural Design, Implementation, Verification, Operation

C.

Acquisition, Measurement, Configuration Management, Production, Operation, Support

D.

Concept, Requirements, Design, Implementation, Production, Maintenance, Support, Disposal

Expert Solution
Questions # 171:

From a cryptographic perspective, the service of non-repudiation includes which of the following features?

Options:

A.

Validity of digital certificates

B.

Validity of the authorization rules

C.

Proof of authenticity of the message

D.

Proof of integrity of the message

Expert Solution
Questions # 172:

What type of test assesses a Disaster Recovery (DR) plan using realistic disaster scenarios while maintaining minimal impact to business operations?

Options:

A.

Parallel

B.

Walkthrough

C.

Simulation

D.

Tabletop

Expert Solution
Questions # 173:

Which of the following is a weakness of Wired Equivalent Privacy (WEP)?

Options:

A.

Length of Initialization Vector (IV)

B.

Protection against message replay

C.

Detection of message tampering

D.

Built-in provision to rotate keys

Expert Solution
Questions # 174:

Network-based logging has which advantage over host-based logging when reviewing malicious activity about a victim machine?

Options:

A.

Addresses and protocols of network-based logs are analyzed.

B.

Host-based system logging has files stored in multiple locations.

C.

Properly handled network-based logs may be more reliable and valid.

D.

Network-based systems cannot capture users logging into the console.

Expert Solution
Questions # 175:

An organization has decided to contract with a cloud-based service provider to leverage their identity as a service offering. They will use Open Authentication (OAuth) 2.0 to authenticate external users to the organization's services.

As part of the authentication process, which of the following must the end user provide?

Options:

A.

An access token

B.

A username and password

C.

A username

D.

A password

Expert Solution
Questions # 176:

Users require access rights that allow them to view the average salary of groups of employees. Which control would prevent the users from obtaining an individual employee’s salary?

Options:

A.

Limit access to predefined queries

B.

Segregate the database into a small number of partitions each with a separate security level

C.

Implement Role Based Access Control (RBAC)

D.

Reduce the number of people who have access to the system for statistical purposes

Expert Solution
Questions # 177:

What is the BEST approach for controlling access to highly sensitive information when employees have the same level of security clearance?

Options:

A.

Audit logs

B.

Role-Based Access Control (RBAC)

C.

Two-factor authentication

D.

Application of least privilege

Expert Solution
Questions # 178:

A manufacturing organization wants to establish a Federated Identity Management (FIM) system with its 20 different supplier companies. Which of the following is the BEST solution for the manufacturing organization?

Options:

A.

Trusted third-party certification

B.

Lightweight Directory Access Protocol (LDAP)

C.

Security Assertion Markup language (SAML)

D.

Cross-certification

Expert Solution
Questions # 179:

Which of the following BEST describes an access control method utilizing cryptographic keys derived from a smart card private key that is embedded within mobile devices?

Options:

A.

Derived credential

B.

Temporary security credential

C.

Mobile device credentialing service

D.

Digest authentication

Expert Solution
Viewing page 12 out of 12 pages
Viewing questions 166-180 out of questions