Pass the ISC ISC 2 Credentials CISSP Questions and answers with CertsForce

Viewing page 15 out of 16 pages
Viewing questions 211-225 out of questions
Questions # 211:

Which of the following types of business continuity tests includes assessment of resilience to internal and external risks without endangering live operations?

Options:

A.

Walkthrough


B.

Simulation


C.

Parallel


D.

White box


Expert Solution
Questions # 212:

What is the PRIMARY reason for implementing change management?

Options:

A.

Certify and approve releases to the environment


B.

Provide version rollbacks for system changes


C.

Ensure that all applications are approved


D.

Ensure accountability for changes to the environment


Expert Solution
Questions # 213:

What is the MOST important step during forensic analysis when trying to learn the purpose of an unknown application?

Options:

A.

Disable all unnecessary services


B.

Ensure chain of custody


C.

Prepare another backup of the system


D.

Isolate the system from the network


Expert Solution
Questions # 214:

When is a Business Continuity Plan (BCP) considered to be valid?

Options:

A.

When it has been validated by the Business Continuity (BC) manager


B.

When it has been validated by the board of directors


C.

When it has been validated by all threat scenarios


D.

When it has been validated by realistic exercises


Expert Solution
Questions # 215:

A continuous information security-monitoring program can BEST reduce risk through which of the following?

Options:

A.

Collecting security events and correlating them to identify anomalies


B.

Facilitating system-wide visibility into the activities of critical user accounts


C.

Encompassing people, process, and technology


D.

Logging both scheduled and unscheduled system changes


Expert Solution
Questions # 216:

What would be the MOST cost effective solution for a Disaster Recovery (DR) site given that the organization’s systems cannot be unavailable for more than 24 hours?

Options:

A.

Warm site


B.

Hot site


C.

Mirror site


D.

Cold site


Expert Solution
Questions # 217:

A Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) will provide which of the following?

Options:

A.

Guaranteed recovery of all business functions


B.

Minimization of the need decision making during a crisis


C.

Insurance against litigation following a disaster


D.

Protection from loss of organization resources


Expert Solution
Questions # 218:

What should be the FIRST action to protect the chain of evidence when a desktop computer is involved?

Options:

A.

Take the computer to a forensic lab


B.

Make a copy of the hard drive


C.

Start documenting


D.

Turn off the computer


Expert Solution
Questions # 219:

Which of the following is the FIRST step in the incident response process?

Options:

A.

Determine the cause of the incident


B.

Disconnect the system involved from the network


C.

Isolate and contain the system involved


D.

Investigate all symptoms to confirm the incident


Expert Solution
Questions # 220:

An organization is found lacking the ability to properly establish performance indicators for its Web hosting solution during an audit. What would be the MOST probable cause?

Options:

A.

Absence of a Business Intelligence (BI) solution


B.

Inadequate cost modeling


C.

Improper deployment of the Service-Oriented Architecture (SOA)


D.

Insufficient Service Level Agreement (SLA)


Expert Solution
Questions # 221:

With what frequency should monitoring of a control occur when implementing Information Security Continuous Monitoring (ISCM) solutions?

Options:

A.

Continuously without exception for all security controls


B.

Before and after each change of the control


C.

At a rate concurrent with the volatility of the security control


D.

Only during system implementation and decommissioning


Expert Solution
Questions # 222:

Recovery strategies of a Disaster Recovery planning (DRIP) MUST be aligned with which of the following?

Options:

A.

Hardware and software compatibility issues


B.

Applications’ critically and downtime tolerance


C.

Budget constraints and requirements


D.

Cost/benefit analysis and business objectives


Expert Solution
Questions # 223:

Which of the following is a PRIMARY advantage of using a third-party identity service?

Options:

A.

Consolidation of multiple providers


B.

Directory synchronization


C.

Web based logon


D.

Automated account management


Expert Solution
Questions # 224:

Who in the organization is accountable for classification of data information assets?

Options:

A.

Data owner


B.

Data architect


C.

Chief Information Security Officer (CISO)


D.

Chief Information Officer (CIO)


Expert Solution
Questions # 225:

Which technique can be used to make an encryption scheme more resistant to a known plaintext attack?

Options:

A.

Hashing the data before encryption


B.

Hashing the data after encryption


C.

Compressing the data after encryption


D.

Compressing the data before encryption


Expert Solution
Viewing page 15 out of 16 pages
Viewing questions 211-225 out of questions