Pass the ISC ISC 2 Credentials CISSP Questions and answers with CertsForce

Viewing page 10 out of 16 pages
Viewing questions 136-150 out of questions
Questions # 136:

Which of the following is a potential risk when a program runs in privileged mode?

Options:

A.

It may serve to create unnecessary code complexity


B.

It may not enforce job separation duties


C.

It may create unnecessary application hardening


D.

It may allow malicious code to be inserted


Expert Solution
Questions # 137:

Which of the following is a method used to prevent Structured Query Language (SQL) injection attacks?

Options:

A.

Data compression


B.

Data classification


C.

Data warehousing


D.

Data validation


Expert Solution
Questions # 138:

When building a data center, site location and construction factors that increase the level of vulnerability to physical threats include

Options:

A.

hardened building construction with consideration of seismic factors.


B.

adequate distance from and lack of access to adjacent buildings.


C.

curved roads approaching the data center.


D.

proximity to high crime areas of the city.


Expert Solution
Questions # 139:

Alternate encoding such as hexadecimal representations is MOST often observed in which of the following forms of attack?

Options:

A.

Smurf


B.

Rootkit exploit


C.

Denial of Service (DoS)


D.

Cross site scripting (XSS)


Expert Solution
Questions # 140:

The three PRIMARY requirements for a penetration test are

Options:

A.

A defined goal, limited time period, and approval of management


B.

A general objective, unlimited time, and approval of the network administrator


C.

An objective statement, disclosed methodology, and fixed cost


D.

A stated objective, liability waiver, and disclosed methodology


Expert Solution
Questions # 141:

Which of the following trust services principles refers to the accessibility of information used by the systems, products, or services offered to a third-party provider’s customers?

Options:

A.

Security


B.

Privacy


C.

Access


D.

Availability


Expert Solution
Questions # 142:

An organization plans to acquire @ commercial off-the-shelf (COTS) system to replace their aging home-built reporting system. When should the organization's security team FIRST get involved in this acquisition’s life cycle?

Options:

A.

When the system is being designed, purchased, programmed, developed, or otherwise constructed


B.

When the system is verified and validated


C.

When the system is deployed into production


D.

When the need for a system is expressed and the purpose of the system Is documented


Expert Solution
Questions # 143:

Which part of an operating system (OS) is responsible for providing security interfaces among the hardware, OS, and other parts of the computing system?

Options:

A.

Time separation


B.

Trusted Computing Base (TCB)


C.

Reference monitor


D.

Security kernel


Expert Solution
Questions # 144:

Which of the following examples is BEST to minimize the attack surface for a customer's private information?

Options:

A.

Obfuscation


B.

Collection limitation


C.

Authentication


D.

Data masking


Expert Solution
Questions # 145:

Which of the following is the reason that transposition ciphers are easily recognizable?

Options:

A.

Key


B.

Block


C.

Stream


D.

Character


Expert Solution
Questions # 146:

An application is used for funds transfer between an organization and a third-party. During a security audit, an issue with the business continuity/disaster recovery policy and procedures for this application. Which of the following reports should the audit file with the organization?

Options:

A.

Service Organization Control (SOC) 1


B.

Statement on Auditing Standards (SAS) 70


C.

Service Organization Control (SOC) 2


D.

Statement on Auditing Standards (SAS) 70-1


Expert Solution
Questions # 147:

What is the MOST effective way to determine a mission critical asset in an organization?

Options:

A.

Vulnerability analysis


B.

business process analysis


C.

Threat analysis


D.

Business risk analysis


Expert Solution
Questions # 148:

copyright provides protection for which of the following?

Options:

A.

Discoveries of natural phenomena


B.

New and non-obvious invention


C.

A particular expression of an idea


D.

Ideas expressed n literary works


Expert Solution
Questions # 149:

Which of the following practices provides the development team with a definition of

security and identification of threats in designing software?

Options:

A.

Penetration testing


B.

Stakeholder review


C.

Threat modeling


D.

Requirements review


Expert Solution
Questions # 150:

A new employee formally reported suspicious behavior to the organization security team. The report claims that someone not affiliated with the organization was inquiring about the member's work location, length of employment, and building access controls. The employee's reporting is MOST likely the result of which of the following?

Options:

A.

Risk avoidance


B.

Security engineering


C.

security awareness


D.

Phishing


Expert Solution
Viewing page 10 out of 16 pages
Viewing questions 136-150 out of questions