Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the ISC 2 Credentials CISSP Questions and answers with ValidTests

Exam CISSP All Questions
Exam CISSP Premium Access

View all detail and faqs for the CISSP exam

Viewing page 2 out of 12 pages
Viewing questions 16-30 out of questions
Questions # 16:

A recent security audit is reporting several unsuccessful login attempts being repeated at specific times during the day on an Internet facing authentication server. No alerts have been generated by the security information and event management (SIEM) system. What PRIMARY action should be taken to improve SIEM performance?

Options:

A.

Implement role-based system monitoring

B.

Audit firewall logs to identify the source of login attempts

C.

Enhance logging detail

D.

Confirm alarm thresholds

Expert Solution
Questions # 17:

employee training, risk management, and data handling procedures and policies could be characterized as which type of security measure?

Options:

A.

Non-essential

B.

Management

C.

Preventative

D.

Administrative

Expert Solution
Questions # 18:

What is the FIRST step in developing a security test and its evaluation?

Options:

A.

Determine testing methods

B.

Develop testing procedures

C.

Identify all applicable security requirements

D.

Identify people, processes, and products not in compliance

Expert Solution
Questions # 19:

In the area of disaster planning and recovery, what strategy entails the presentation of information about the plan?

Options:

A.

Communication

B.

Planning

C.

Recovery

D.

Escalation

Expert Solution
Questions # 20:

Which of the following could cause a Denial of Service (DoS) against an authentication system?

Options:

A.

Encryption of audit logs

B.

No archiving of audit logs

C.

Hashing of audit logs

D.

Remote access audit logs

Expert Solution
Questions # 21:

An organization recently conducted a review of the security of its network applications. One of the

vulnerabilities found was that the session key used in encrypting sensitive information to a third party server had been hard-coded in the client and server applications. Which of the following would be MOST effective in mitigating this vulnerability?

Options:

A.

Diffle-Hellman (DH) algorithm

B.

Elliptic Curve Cryptography (ECC) algorithm

C.

Digital Signature algorithm (DSA)

D.

Rivest-Shamir-Adleman (RSA) algorithm

Expert Solution
Questions # 22:

In an organization where Network Access Control (NAC) has been deployed, a device trying to connect to the network is being placed into an isolated domain. What could be done on this device in order to obtain proper

connectivity?

Options:

A.

Connect the device to another network jack

B.

Apply remediation’s according to security requirements

C.

Apply Operating System (OS) patches

D.

Change the Message Authentication Code (MAC) address of the network interface

Expert Solution
Questions # 23:

Which of the following operates at the Network Layer of the Open System Interconnection (OSI) model?

Options:

A.

Packet filtering

B.

Port services filtering

C.

Content filtering

D.

Application access control

Expert Solution
Questions # 24:

Which one of the following documentation should be included in a Disaster Recovery (DR) package?

Options:

A.

Source code, compiled code, firmware updates, operational log book and manuals.

B.

Data encrypted in original format, auditable transaction data, and recovery instructions for future extraction on demand.

C.

Hardware configuration instructions, hardware configuration software, an operating system image, a data restoration option, media retrieval instructions,…..

D.

System configuration including hardware, software, hardware, interfaces, software Application Programming Interface (API) configuration, data structure, ….

Expert Solution
Questions # 25:

Which of the fallowing statements is MOST accurate regarding information assets?

Options:

A.

International Organization for Standardization (ISO) 27001 compliance specifies which information assets must be included in asset inventory.

B.

S3 Information assets include any information that is valuable to the organization,

C.

Building an information assets register is a resource-intensive job.

D.

Information assets inventory is not required for risk assessment.

Expert Solution
Questions # 26:

Which of the following processes has the PRIMARY purpose of identifying outdated software versions, missing patches, and lapsed system updates?

Options:

A.

Penetration testing

B.

Vulnerability management

C.

Software Development Life Cycle (SDLC)

D.

Life cycle management

Expert Solution
Questions # 27:

Which of the following needs to be taken into account when assessing vulnerability?

Options:

A.

Risk identification and validation

B.

Threat mapping

C.

Risk acceptance criteria

D.

Safeguard selection

Expert Solution
Questions # 28:

Which of the following objects should be removed FIRST prior to uploading code to public code repositories?

Options:

A.

Security credentials

B.

Known vulnerabilities

C.

Inefficient algorithms

D.

Coding mistakes

Expert Solution
Questions # 29:

A cloud hosting provider would like to provide a Service Organization Control (SOC) report relevant to its security program. This report should an abbreviated report that can be freely distributed. Which type of report BEST meets this requirement?

Options:

A.

SOC 1

B.

SOC 2 Type I

C.

SOC 2 Type II

D.

SOC 3

Expert Solution
Questions # 30:

In the last 15 years a company has experienced three electrical failures. The cost associated with each failure is listed below.

Which of the following would be a reasonable annual loss expectation?

Question # 30

Options:

A.

140,000

B.

3,500

C.

350,000

D.

14,000

Expert Solution
Viewing page 2 out of 12 pages
Viewing questions 16-30 out of questions