Pass the ISC ISC 2 Credentials CISSP Questions and answers with CertsForce

Viewing page 13 out of 16 pages
Viewing questions 181-195 out of questions
Questions # 181:

Which of the following is the BEST reason for writing an information security policy?

Options:

A.

To support information security governance


B.

To reduce the number of audit findings


C.

To deter attackers


D.

To implement effective information security controls


Expert Solution
Questions # 182:

Which of the following is the GREATEST benefit of implementing a Role Based Access Control (RBAC)

system?

Options:

A.

Integration using Lightweight Directory Access Protocol (LDAP)


B.

Form-based user registration process


C.

Integration with the organizations Human Resources (HR) system


D.

A considerably simpler provisioning process


Expert Solution
Questions # 183:

An organization has discovered that users are visiting unauthorized websites using anonymous proxies.

Which of the following is the BEST way to prevent future occurrences?

Options:

A.

Remove the anonymity from the proxy


B.

Analyze Internet Protocol (IP) traffic for proxy requests


C.

Disable the proxy server on the firewall


D.

Block the Internet Protocol (IP) address of known anonymous proxies


Expert Solution
Questions # 184:

From a security perspective, which of the following assumptions MUST be made about input to an

application?

Options:

A.

It is tested


B.

It is logged


C.

It is verified


D.

It is untrusted


Expert Solution
Questions # 185:

An international medical organization with headquarters in the United States (US) and branches in France

wants to test a drug in both countries. What is the organization allowed to do with the test subject’s data?

Options:

A.

Aggregate it into one database in the US


B.

Process it in the US, but store the information in France


C.

Share it with a third party


D.

Anonymize it and process it in the US


Expert Solution
Questions # 186:

Which one of the following is an advantage of an effective release control strategy form a configuration control standpoint?

Options:

A.

Ensures that a trace for all deliverables is maintained and auditable


B.

Enforces backward compatibility between releases


C.

Ensures that there is no loss of functionality between releases


D.

Allows for future enhancements to existing features


Expert Solution
Questions # 187:

Match the name of access control model with its associated restriction.

Drag each access control model to its appropriate restriction access on the right.

Question # 187


Expert Solution
Questions # 188:

Which of the following mandates the amount and complexity of security controls applied to a security risk?

Options:

A.

Security vulnerabilities


B.

Risk tolerance


C.

Risk mitigation


D.

Security staff


Expert Solution
Questions # 189:

Who has the PRIMARY responsibility to ensure that security objectives are aligned with organization goals?

Options:

A.

Senior management


B.

Information security department


C.

Audit committee


D.

All users


Expert Solution
Questions # 190:

Who is accountable for the information within an Information System (IS)?

Options:

A.

Security manager


B.

System owner


C.

Data owner


D.

Data processor


Expert Solution
Questions # 191:

Which of the following is the MOST efficient mechanism to account for all staff during a speedy nonemergency evacuation from a large security facility?

Options:

A.

Large mantrap where groups of individuals leaving are identified using facial recognition technology


B.

Radio Frequency Identification (RFID) sensors worn by each employee scanned by sensors at each exitdoor


C.

Emergency exits with push bars with coordinates at each exit checking off the individual against a

predefined list


D.

Card-activated turnstile where individuals are validated upon exit


Expert Solution
Questions # 192:

Which type of test would an organization perform in order to locate and target exploitable defects?

Options:

A.

Penetration


B.

System


C.

Performance


D.

Vulnerability


Expert Solution
Questions # 193:

Which of the following is a responsibility of a data steward?

Options:

A.

Ensure alignment of the data governance effort to the organization.


B.

Conduct data governance interviews with the organization.


C.

Document data governance requirements.


D.

Ensure that data decisions and impacts are communicated to the organization.


Expert Solution
Questions # 194:

A security analyst for a large financial institution is reviewing network traffic related to an incident. The analyst determines the traffic is irrelevant to the investigation but in the process of the review, the analyst also finds that an applications data, which included full credit card cardholder data, is transferred in clear text between the server and user’s desktop. The analyst knows this violates the Payment Card Industry Data Security Standard (PCI-DSS). Which of the following is the analyst’s next step?

Options:

A.

Send the log file co-workers for peer review


B.

Include the full network traffic logs in the incident report


C.

Follow organizational processes to alert the proper teams to address the issue.


D.

Ignore data as it is outside the scope of the investigation and the analyst’s role.


Expert Solution
Questions # 195:

Which of the following is a direct monetary cost of a security incident?

Options:

A.

Morale


B.

Reputation


C.

Equipment


D.

Information


Expert Solution
Viewing page 13 out of 16 pages
Viewing questions 181-195 out of questions