Pass the ISC ISC 2 Credentials CISSP Questions and answers with CertsForce

Viewing page 14 out of 16 pages
Viewing questions 196-210 out of questions
Questions # 196:

Which of the following is the MOST effective method to mitigate Cross-Site Scripting (XSS) attacks?

Options:

A.

Use Software as a Service (SaaS)


B.

Whitelist input validation


C.

Require client certificates


D.

Validate data output


Expert Solution
Questions # 197:

When developing solutions for mobile devices, in which phase of the Software Development Life Cycle (SDLC) should technical limitations related to devices be specified?

Options:

A.

Implementation


B.

Initiation


C.

Review


D.

Development


Expert Solution
Questions # 198:

Which security modes is MOST commonly used in a commercial environment because it protects the integrity

of financial and accounting data?

Options:

A.

Biba


B.

Graham-Denning


C.

Clark-Wilson


D.

Beil-LaPadula


Expert Solution
Questions # 199:

Who would be the BEST person to approve an organizations information security policy?

Options:

A.

Chief Information Officer (CIO)


B.

Chief Information Security Officer (CISO)


C.

Chief internal auditor


D.

Chief Executive Officer (CEO)


Expert Solution
Questions # 200:

Which of the following is MOST appropriate for protecting confidentially of data stored on a hard drive?

Options:

A.

Triple Data Encryption Standard (3DES)


B.

Advanced Encryption Standard (AES)


C.

Message Digest 5 (MD5)


D.

Secure Hash Algorithm 2(SHA-2)


Expert Solution
Questions # 201:

An Information Technology (IT) professional attends a cybersecurity seminar on current incident response methodologies.

What code of ethics canon is being observed?

Options:

A.

Provide diligent and competent service to principals


B.

Protect society, the commonwealth, and the infrastructure


C.

Advance and protect the profession


D.

Act honorable, honesty, justly, responsibly, and legally


Expert Solution
Questions # 202:

A Denial of Service (DoS) attack on a syslog server exploits weakness in which of the following protocols?

Options:

A.

Point-to-Point Protocol (PPP) and Internet Control Message Protocol (ICMP)


B.

Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)


C.

Address Resolution Protocol (ARP) and Reverse Address Resolution Protocol (RARP)


D.

Transport Layer Security (TLS) and Secure Sockets Layer (SSL)


Expert Solution
Questions # 203:

As part of the security assessment plan, the security professional has been asked to use a negative testing strategy on a new website. Which of the following actions would be performed?

Options:

A.

Use a web scanner to scan for vulnerabilities within the website.


B.

Perform a code review to ensure that the database references are properly addressed.


C.

Establish a secure connection to the web server to validate that only the approved ports are open.


D.

Enter only numbers in the web form and verify that the website prompts the user to enter a valid input.


Expert Solution
Questions # 204:

An organization has outsourced its financial transaction processing to a Cloud Service Provider (CSP) who will provide them with Software as a Service (SaaS). If there was a data breach who is responsible for monetary losses?

Options:

A.

The Data Protection Authority (DPA)


B.

The Cloud Service Provider (CSP)


C.

The application developers


D.

The data owner


Expert Solution
Questions # 205:

Even though a particular digital watermark is difficult to detect, which of the following represents a way it might still be inadvertently removed?

Options:

A.

Truncating parts of the data


B.

Applying Access Control Lists (ACL) to the data


C.

Appending non-watermarked data to watermarked data


D.

Storing the data in a database


Expert Solution
Questions # 206:

Which of the following techniques is known to be effective in spotting resource exhaustion problems, especially with resources such as processes, memory, and connections?

Options:

A.

Automated dynamic analysis


B.

Automated static analysis


C.

Manual code review


D.

Fuzzing


Expert Solution
Questions # 207:

Which of the following could be considered the MOST significant security challenge when adopting DevOps practices compared to a more traditional control framework?

Options:

A.

Achieving Service Level Agreements (SLA) on how quickly patches will be released when a security flaw is found.


B.

Maintaining segregation of duties.


C.

Standardized configurations for logging, alerting, and security metrics.


D.

Availability of security teams at the end of design process to perform last-minute manual audits and reviews.


Expert Solution
Questions # 208:

Which of the following is a common feature of an Identity as a Service (IDaaS) solution?

Options:

A.

Single Sign-On (SSO) authentication support


B.

Privileged user authentication support


C.

Password reset service support


D.

Terminal Access Controller Access Control System (TACACS) authentication support


Expert Solution
Questions # 209:

What is the PRIMARY goal of fault tolerance?

Options:

A.

Elimination of single point of failure


B.

Isolation using a sandbox


C.

Single point of repair


D.

Containment to prevent propagation


Expert Solution
Questions # 210:

A control to protect from a Denial-of-Service (DoS) attach has been determined to stop 50% of attacks, and additionally reduces the impact of an attack by 50%. What is the residual risk?

Options:

A.

25%


B.

50%


C.

75%


D.

100%


Expert Solution
Viewing page 14 out of 16 pages
Viewing questions 196-210 out of questions