Pass the ISC ISC 2 Credentials CISSP Questions and answers with CertsForce

Viewing page 12 out of 16 pages
Viewing questions 166-180 out of questions
Questions # 166:

What type of access control determines the authorization to resource based on pre-defined job titles within an organization?

Options:

A.

Role-Based Access Control (RBAC)


B.

Role-based access control


C.

Non-discretionary access control


D.

Discretionary Access Control (DAC)


Expert Solution
Questions # 167:

An organization with divisions in the United States (US) and the United Kingdom (UK) processes data comprised of personal information belonging to subjects living in the European Union (EU) and in the US. Which data MUST be handled according to the privacy protections of General Data Protection Regulation (GDPR)?

Options:

A.

Only the EU citizens’ data


B.

Only the EU residents' data


C.

Only the UK citizens’ data


D.

Only data processed in the UK


Expert Solution
Questions # 168:

Which of the following is a PRIMARY challenge when running a penetration test?

Options:

A.

Determining the cost


B.

Establishing a business case


C.

Remediating found vulnerabilities


D.

Determining the depth of coverage


Expert Solution
Questions # 169:

An organization has implemented a password complexity and an account lockout policy enforcing five incorrect logins tries within ten minutes. Network users have reported significantly increased account lockouts. Which of the following security principles is this company affecting?

Options:

A.

Availability


B.

Integrity


C.

Confidentiality


D.

Authentication


Expert Solution
Questions # 170:

In a DevOps environment, which of the following actions is MOST necessary to have confidence in the quality of the changes being made?

Options:

A.

Prepare to take corrective actions quickly.


B.

Receive approval from the change review board.


C.

Review logs for any anomalies.


D.

Automate functionality testing.


Expert Solution
Questions # 171:

An application developer receives a report back from the security team showing their automated tools were able to successfully enter unexpected data into the organization's customer service portal, causing the site to crash. This is an example of which type of testing?

Options:

A.

Non-functional


B.

Positive


C.

Performance


D.

Negative


Expert Solution
Questions # 172:

Which type of access control includes a system that allows only users that are type=managers and department=sales to access employee records?

Options:

A.

Discretionary access control (DAC)


B.

Mandatory access control (MAC)


C.

Role-based access control (RBAC)


D.

Attribute-based access control (ABAC)


Expert Solution
Questions # 173:

Which of the following is the MOST effective preventative method to identify security flaws in software?

Options:

A.

Monitor performance in production environments.


B.

Perform a structured code review.


C.

Perform application penetration testing.


D.

Use automated security vulnerability testing tods.


Expert Solution
Questions # 174:

A vehicle of a private courier company that transports backup data for offsite storage was robbed while in transport backup data for offsite was robbed while in transit. The incident management team is now responsible to estimate the robbery, which of the following would help the incident management team to MOST effectively analyze the business impact of the robbery?

Options:

A.

Log of backup administrative actions


B.

Log of the transported media and its classification marking


C.

Log of the transported media and Its detailed contents


D.

Log of backed up data and their respective data custodians


Expert Solution
Questions # 175:

Which software defined networking (SDN) architectural component is responsible for translating network requirements?

Options:

A.

SDN Application


B.

SDN Data path


C.

SDN Controller


D.

SDN Northbound Interfaces


Expert Solution
Questions # 176:

As part of an application penetration testing process, session hijacking can BEST be achieved by which of the following?

Options:

A.

Known-plaintext attack


B.

Denial of Service (DoS)


C.

Cookie manipulation


D.

Structured Query Language (SQL) injection


Expert Solution
Questions # 177:

The design review for an application has been completed and is ready for release. What technique should an organization use to assure application integrity?

Options:

A.

Application authentication


B.

Input validation


C.

Digital signing


D.

Device encryption


Expert Solution
Questions # 178:

Which of the following is the MOST effective practice in managing user accounts when an employee is terminated?

Options:

A.

Implement processes for automated removal of access for terminated employees.


B.

Delete employee network and system IDs upon termination.


C.

Manually remove terminated employee user-access to all systems and applications.


D.

Disable terminated employee network ID to remove all access.


Expert Solution
Questions # 179:

The organization would like to deploy an authorization mechanism for an Information Technology (IT)

infrastructure project with high employee turnover.

Which access control mechanism would be preferred?

Options:

A.

Attribute Based Access Control (ABAC)


B.

Discretionary Access Control (DAC)


C.

Mandatory Access Control (MAC)


D.

Role-Based Access Control (RBAC)


Expert Solution
Questions # 180:

Which of the following MUST be in place to recognize a system attack?

Options:

A.

Stateful firewall


B.

Distributed antivirus


C.

Log analysis


D.

Passive honeypot


Expert Solution
Viewing page 12 out of 16 pages
Viewing questions 166-180 out of questions