Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the ISC 2 Credentials CISSP Questions and answers with ValidTests

Exam CISSP All Questions
Exam CISSP Premium Access

View all detail and faqs for the CISSP exam

Viewing page 5 out of 12 pages
Viewing questions 61-75 out of questions
Questions # 61:

Which of the following wraps the decryption key of a full disk encryption implementation and ties the hard disk drive to a particular device?

Options:

A.

Trusted Platform Module (TPM)

B.

Preboot eXecution Environment (PXE)

C.

Key Distribution Center (KDC)

D.

Simple Key-Management for Internet Protocol (SKIP)

Expert Solution
Questions # 62:

Which of the following is the best practice for testing a Business Continuity Plan (BCP)?

Options:

A.

Test before the IT Audit

B.

Test when environment changes

C.

Test after installation of security patches

D.

Test after implementation of system patches

Expert Solution
Questions # 63:

When constructing an Information Protection Policy (IPP), it is important that the stated rules are necessary, adequate, and

Options:

A.

flexible.

B.

confidential.

C.

focused.

D.

achievable.

Expert Solution
Questions # 64:

What principle requires that changes to the plaintext affect many parts of the ciphertext?

Options:

A.

Diffusion

B.

Encapsulation

C.

Obfuscation

D.

Permutation

Expert Solution
Questions # 65:

In a financial institution, who has the responsibility for assigning the classification to a piece of information?

Options:

A.

Chief Financial Officer (CFO)

B.

Chief Information Security Officer (CISO)

C.

Originator or nominated owner of the information

D.

Department head responsible for ensuring the protection of the information

Expert Solution
Questions # 66:

A security consultant has been asked to research an organization's legal obligations to protect privacy-related information. What kind of reading material is MOST relevant to this project?

Options:

A.

The organization's current security policies concerning privacy issues

B.

Privacy-related regulations enforced by governing bodies applicable to the organization

C.

Privacy best practices published by recognized security standards organizations

D.

Organizational procedures designed to protect privacy information

Expert Solution
Questions # 67:

Which of the following defines the key exchange for Internet Protocol Security (IPSec)?

Options:

A.

Secure Sockets Layer (SSL) key exchange

B.

Internet Key Exchange (IKE)

C.

Security Key Exchange (SKE)

D.

Internet Control Message Protocol (ICMP)

Expert Solution
Questions # 68:

Which of the following is an effective method for avoiding magnetic media data remanence?

Options:

A.

Degaussing

B.

Encryption

C.

Data Loss Prevention (DLP)

D.

Authentication

Expert Solution
Questions # 69:

Why is a system's criticality classification important in large organizations?

Options:

A.

It provides for proper prioritization and scheduling of security and maintenance tasks.

B.

It reduces critical system support workload and reduces the time required to apply patches.

C.

It allows for clear systems status communications to executive management.

D.

It provides for easier determination of ownership, reducing confusion as to the status of the asset.

Expert Solution
Questions # 70:

An organization is designing a large enterprise-wide document repository system. They plan to have several different classification level areas with increasing levels of controls. The BEST way to ensure document confidentiality in the repository is to

Options:

A.

encrypt the contents of the repository and document any exceptions to that requirement.

B.

utilize Intrusion Detection System (IDS) set drop connections if too many requests for documents are detected.

C.

keep individuals with access to high security areas from saving those documents into lower security areas.

D.

require individuals with access to the system to sign Non-Disclosure Agreements (NDA).

Expert Solution
Questions # 71:

Which of the following is a security limitation of File Transfer Protocol (FTP)?

Options:

A.

Passive FTP is not compatible with web browsers.

B.

Anonymous access is allowed.

C.

FTP uses Transmission Control Protocol (TCP) ports 20 and 21.

D.

Authentication is not encrypted.

Expert Solution
Questions # 72:

The type of authorized interactions a subject can have with an object is

Options:

A.

control.

B.

permission.

C.

procedure.

D.

protocol.

Expert Solution
Questions # 73:

When implementing controls in a heterogeneous end-point network for an organization, it is critical that

Options:

A.

hosts are able to establish network communications.

B.

users can make modifications to their security software configurations.

C.

common software security components be implemented across all hosts.

D.

firewalls running on each host are fully customizable by the user.

Expert Solution
Questions # 74:

What is the term commonly used to refer to a technique of authenticating one machine to another by forging packets from a trusted source?

Options:

A.

Man-in-the-Middle (MITM) attack

B.

Smurfing

C.

Session redirect

D.

Spoofing

Expert Solution
Questions # 75:

Which of the following is a web application control that should be put into place to prevent exploitation of Operating System (OS) bugs?

Options:

A.

Check arguments in function calls

B.

Test for the security patch level of the environment

C.

Include logging functions

D.

Digitally sign each application module

Expert Solution
Viewing page 5 out of 12 pages
Viewing questions 61-75 out of questions