Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the ISC 2 Credentials CISSP Questions and answers with ValidTests

Exam CISSP All Questions
Exam CISSP Premium Access

View all detail and faqs for the CISSP exam

Viewing page 8 out of 12 pages
Viewing questions 106-120 out of questions
Questions # 106:

What is the MOST important step during forensic analysis when trying to learn the purpose of an unknown application?

Options:

A.

Disable all unnecessary services

B.

Ensure chain of custody

C.

Prepare another backup of the system

D.

Isolate the system from the network

Expert Solution
Questions # 107:

Refer to the information below to answer the question.

A security practitioner detects client-based attacks on the organization’s network. A plan will be necessary to address these concerns.

What is the BEST reason for the organization to pursue a plan to mitigate client-based attacks?

Options:

A.

Client privilege administration is inherently weaker than server privilege administration.

B.

Client hardening and management is easier on clients than on servers.

C.

Client-based attacks are more common and easier to exploit than server and network based attacks.

D.

Client-based attacks have higher financial impact.

Expert Solution
Questions # 108:

Which of the following is a detective access control mechanism?

Options:

A.

Log review

B.

Least privilege

C.

Password complexity

D.

Non-disclosure agreement

Expert Solution
Questions # 109:

A user has infected a computer with malware by connecting a Universal Serial Bus (USB) storage device.

Which of the following is MOST effective to mitigate future infections?

Options:

A.

Develop a written organizational policy prohibiting unauthorized USB devices

B.

Train users on the dangers of transferring data in USB devices

C.

Implement centralized technical control of USB port connections

D.

Encrypt removable USB devices containing data at rest

Expert Solution
Questions # 110:

Which of the following is the BEST reason for writing an information security policy?

Options:

A.

To support information security governance

B.

To reduce the number of audit findings

C.

To deter attackers

D.

To implement effective information security controls

Expert Solution
Questions # 111:

Which of the following MUST be in place to recognize a system attack?

Options:

A.

Stateful firewall

B.

Distributed antivirus

C.

Log analysis

D.

Passive honeypot

Expert Solution
Questions # 112:

Which of the following techniques is known to be effective in spotting resource exhaustion problems, especially with resources such as processes, memory, and connections?

Options:

A.

Automated dynamic analysis

B.

Automated static analysis

C.

Manual code review

D.

Fuzzing

Expert Solution
Questions # 113:

Which of the following is the MOST important part of an awareness and training plan to prepare employees for emergency situations?

Options:

A.

Having emergency contacts established for the general employee population to get information

B.

Conducting business continuity and disaster recovery training for those who have a direct role in the recovery

C.

Designing business continuity and disaster recovery training programs for different audiences

D.

Publishing a corporate business continuity and disaster recovery plan on the corporate website

Expert Solution
Questions # 114:

What is the BEST location in a network to place Virtual Private Network (VPN) devices when an internal review reveals network design flaws in remote access?

Options:

A.

In a dedicated Demilitarized Zone (DMZ)

B.

In its own separate Virtual Local Area Network (VLAN)

C.

At the Internet Service Provider (ISP)

D.

Outside the external firewall

Expert Solution
Questions # 115:

When developing solutions for mobile devices, in which phase of the Software Development Life Cycle (SDLC) should technical limitations related to devices be specified?

Options:

A.

Implementation

B.

Initiation

C.

Review

D.

Development

Expert Solution
Questions # 116:

Digital certificates used in Transport Layer Security (TLS) support which of the following?

Options:

A.

Information input validation

B.

Non-repudiation controls and data encryption

C.

Multi-Factor Authentication (MFA)

D.

Server identity and data confidentially

Expert Solution
Questions # 117:

A security compliance manager of a large enterprise wants to reduce the time it takes to perform network,

system, and application security compliance audits while increasing quality and effectiveness of the results.

What should be implemented to BEST achieve the desired results?

Options:

A.

Configuration Management Database (CMDB)

B.

Source code repository

C.

Configuration Management Plan (CMP)

D.

System performance monitoring application

Expert Solution
Questions # 118:

Even though a particular digital watermark is difficult to detect, which of the following represents a way it might still be inadvertently removed?

Options:

A.

Truncating parts of the data

B.

Applying Access Control Lists (ACL) to the data

C.

Appending non-watermarked data to watermarked data

D.

Storing the data in a database

Expert Solution
Questions # 119:

Access to which of the following is required to validate web session management?

Options:

A.

Log timestamp

B.

Live session traffic

C.

Session state variables

D.

Test scripts

Expert Solution
Questions # 120:

An organization has discovered that users are visiting unauthorized websites using anonymous proxies.

Which of the following is the BEST way to prevent future occurrences?

Options:

A.

Remove the anonymity from the proxy

B.

Analyze Internet Protocol (IP) traffic for proxy requests

C.

Disable the proxy server on the firewall

D.

Block the Internet Protocol (IP) address of known anonymous proxies

Expert Solution
Viewing page 8 out of 12 pages
Viewing questions 106-120 out of questions