Pass the ISC ISC 2 Credentials CISSP Questions and answers with CertsForce

Viewing page 3 out of 16 pages
Viewing questions 31-45 out of questions
Questions # 31:

Which of the following is MOST important when assigning ownership of an asset to a department?

Options:

A.

The department should report to the business owner


B.

Ownership of the asset should be periodically reviewed


C.

Individual accountability should be ensured


D.

All members should be trained on their responsibilities


Expert Solution
Questions # 32:

Which of the following BEST describes the responsibilities of a data owner?

Options:

A.

Ensuring quality and validation through periodic audits for ongoing data integrity


B.

Maintaining fundamental data availability, including data storage and archiving


C.

Ensuring accessibility to appropriate users, maintaining appropriate levels of data security


D.

Determining the impact the information has on the mission of the organization


Expert Solution
Questions # 33:

Which of the following is an effective control in preventing electronic cloning of Radio Frequency Identification (RFID) based access cards?

Options:

A.

Personal Identity Verification (PIV)


B.

Cardholder Unique Identifier (CHUID) authentication


C.

Physical Access Control System (PACS) repeated attempt detection


D.

Asymmetric Card Authentication Key (CAK) challenge-response


Expert Solution
Questions # 34:

When implementing a data classification program, why is it important to avoid too much granularity?

Options:

A.

The process will require too many resources


B.

It will be difficult to apply to both hardware and software


C.

It will be difficult to assign ownership to the data


D.

The process will be perceived as having value


Expert Solution
Questions # 35:

In a data classification scheme, the data is owned by the

Options:

A.

system security managers


B.

business managers


C.

Information Technology (IT) managers


D.

end users


Expert Solution
Questions # 36:

The goal of a Business Impact Analysis (BIA) is to determine which of the following?

Options:

A.

Cost effectiveness of business recovery


B.

Cost effectiveness of installing software security patches


C.

Resource priorities for recovery and Maximum Tolerable Downtime (MTD)


D.

Which security measures should be implemented


Expert Solution
Questions # 37:

What is one way to mitigate the risk of security flaws in custom software?

Options:

A.

Include security language in the Earned Value Management (EVM) contract


B.

Include security assurance clauses in the Service Level Agreement (SLA)


C.

Purchase only Commercial Off-The-Shelf (COTS) products


D.

Purchase only software with no open source Application Programming Interfaces (APIs)


Expert Solution
Questions # 38:

Which of the following is the MOST important element of change management documentation?

Options:

A.

List of components involved


B.

Number of changes being made


C.

Business case justification


D.

A stakeholder communication


Expert Solution
Questions # 39:

Discretionary Access Control (DAC) restricts access according to

Options:

A.

data classification labeling.


B.

page views within an application.


C.

authorizations granted to the user.


D.

management accreditation.


Expert Solution
Questions # 40:

Which of the following is the MAIN reason for using configuration management?

Options:

A.

To provide centralized administration


B.

To reduce the number of changes


C.

To reduce errors during upgrades


D.

To provide consistency in security controls


Expert Solution
Questions # 41:

While investigating a malicious event, only six days of audit logs from the last month were available. What policy should be updated to address this problem?

Options:

A.

Retention


B.

Reporting


C.

Recovery


D.

Remediation


Expert Solution
Questions # 42:

Which of the following disaster recovery test plans will be MOST effective while providing minimal risk?

Options:

A.

Read-through


B.

Parallel


C.

Full interruption


D.

Simulation


Expert Solution
Questions # 43:

What security risk does the role-based access approach mitigate MOST effectively?

Options:

A.

Excessive access rights to systems and data


B.

Segregation of duties conflicts within business applications


C.

Lack of system administrator activity monitoring


D.

Inappropriate access requests


Expert Solution
Questions # 44:

Which of the following BEST describes a chosen plaintext attack?

Options:

A.

The cryptanalyst can generate ciphertext from arbitrary text.


B.

The cryptanalyst examines the communication being sent back and forth.


C.

The cryptanalyst can choose the key and algorithm to mount the attack.


D.

The cryptanalyst is presented with the ciphertext from which the original message is determined.


Expert Solution
Questions # 45:

The PRIMARY characteristic of a Distributed Denial of Service (DDoS) attack is that it

Options:

A.

exploits weak authentication to penetrate networks.


B.

can be detected with signature analysis.


C.

looks like normal network activity.


D.

is commonly confused with viruses or worms.


Expert Solution
Viewing page 3 out of 16 pages
Viewing questions 31-45 out of questions