Pass the ISC ISC 2 Credentials CISSP Questions and answers with CertsForce

Viewing page 11 out of 16 pages
Viewing questions 151-165 out of questions
Questions # 151:

Which of the following is the MOST important consideration in selecting a security testing method based on different Radio-Frequency Identification (RFID) vulnerability types?

Options:

A.

The performance and resource utilization of tools


B.

The quality of results and usability of tools


C.

An understanding of the attack surface


D.

Adaptability of testing tools to multiple technologies


Expert Solution
Questions # 152:

Which of the following would be the BEST mitigation practice for man-in-the-middle (MITM) Voice over Internet Protocol (VoIP) attacks?

Options:

A.

Use Media Gateway Control Protocol (MGCP)


B.

Use Transport Layer Security (TLS) protocol


C.

Use File Transfer Protocol (FTP)


D.

Use Secure Shell (SSH) protocol


Expert Solution
Questions # 153:

When a flaw in Industrial control (ICS) software is discovered, what is the GREATEST impediment to deploying a patch?

Options:

A.

Many IG systems have software that is no longer being maintained by the venders.


B.

Compensating controls may impact IG performance.


C.

Testing a patch in an IG may require more resources than the organization can commit.


D.

vendors are required to validate the operability patches.


Expert Solution
Questions # 154:

A developer is creating an application that requires secure logging of all user activity. What is the BEST permission the developer should assign to the log file to ensure requirements are met?

Options:

A.

Read


B.

Execute


C.

Write


D.

Append


Expert Solution
Questions # 155:

The Chief Information Officer (CIO) has decided that as part of business modernization efforts the organization will move towards a cloud architecture. All business-critical data will be migrated to either internal or external cloud services within the next two years. The CIO has a PRIMARY obligation to work with personnel in which role in order to ensure proper protection of data during and after the cloud migration?

Options:

A.

Information owner


B.

General Counsel


C.

Chief Information Security Officer (CISO)


D.

Chief Security Officer (CSO)


Expert Solution
Questions # 156:

Which of the following BEST describes centralized identity management?

Options:

A.

Service providers rely on a trusted third party (TTP) to provide requestors with both credentials and identifiers.


B.

Service providers agree to integrate identity system recognition across organizational boundaries.


C.

Service providers identify an entity by behavior analysis versus an identification factor.


D.

Service providers perform as both the credential and identity provider (IdP).


Expert Solution
Questions # 157:

When assessing the audit capability of an application, which of the following activities is MOST important?

Options:

A.

Determine if audit records contain sufficient information.


B.

Review security plan for actions to be taken in the event of audit failure.


C.

Verify if sufficient storage is allocated for audit records.


D.

Identify procedures to investigate suspicious activity.


Expert Solution
Questions # 158:

When designing a new Voice over Internet Protocol (VoIP) network, an organization's top concern is preventing unauthorized users accessing the VoIP network. Which of the following will BEST help secure the VoIP network?

Options:

A.

Transport Layer Security (TLS)


B.

802.1x


C.

802.119


D.

Web application firewall (WAF)


Expert Solution
Questions # 159:

Which of the following is the MOST significant benefit to implementing a third-party federated identity architecture?

Options:

A.

Attribute assertions as agencies can request a larger set of attributes to fulfill service delivery


B.

Data decrease related to storing personal information


C.

Reduction in operational costs to the agency


D.

Enable business objectives so departments can focus on mission rather than the business of identity management


Expert Solution
Questions # 160:

A customer continues to experience attacks on their email, web, and File Transfer Protocol (FTP) servers. These attacks are impacting their business operations. Which of the following is the BEST recommendation to make?

Options:

A.

Configure an intrusion detection system (IDS).


B.

Create a demilitarized zone (DMZ).


C.

Deploy a bastion host.


D.

Setup a network firewall.


Expert Solution
Questions # 161:

The MAIN purpose of placing a tamper seal on a computer system's case is to:

Options:

A.

raise security awareness.


B.

detect efforts to open the case.


C.

expedite physical auditing.


D.

make it difficult to steal internal components.


Expert Solution
Questions # 162:

Which of the following is the BEST statement for a professional to include as port of business continuity (BC) procedure?

Options:

A.

A full data backup must be done upon management request.


B.

An incremental data backup must be done upon management request.


C.

A full data backup must be done based on the needs of the business.


D.

In incremental data backup must be done after each system change.


Expert Solution
Questions # 163:

How should the retention period for an organization's social media content be defined?

Options:

A.

By the retention policies of each social media service


B.

By the records retention policy of the organization


C.

By the Chief Information Officer (CIO)


D.

By the amount of available storage space


Expert Solution
Questions # 164:

A software developer wishes to write code that will execute safely and only as intended. Which of the following programming language types is MOST likely to achieve this goal?

Options:

A.

Statically typed


B.

Weakly typed


C.

Strongly typed


D.

Dynamically typed


Expert Solution
Questions # 165:

An establish information technology (IT) consulting firm is considering acquiring a successful local startup. To gain a comprehensive understanding of the startup’s security posture’ which type of assessment provides the BEST information?

Options:

A.

A security audit


B.

A penetration test


C.

A tabletop exercise


D.

A security threat model


Expert Solution
Viewing page 11 out of 16 pages
Viewing questions 151-165 out of questions