Pass the ISC ISC 2 Credentials CISSP Questions and answers with CertsForce

Viewing page 4 out of 16 pages
Viewing questions 46-60 out of questions
Questions # 46:

Which Web Services Security (WS-Security) specification handles the management of security tokens and the underlying policies for granting access? Click on the correct specification in the image below.

Question # 46


Expert Solution
Questions # 47:

Which of the following BEST describes a Protection Profile (PP)?

Options:

A.

A document that expresses an implementation independent set of security requirements for an IT product that meets specific consumer needs.


B.

A document that is used to develop an IT security product from its security requirements definition.


C.

A document that expresses an implementation dependent set of security requirements which contains only the security functional requirements.


D.

A document that represents evaluated products where there is a one-to-one correspondence between a PP and a Security Target (ST).


Expert Solution
Questions # 48:

A global organization wants to implement hardware tokens as part of a multifactor authentication solution for remote access. The PRIMARY advantage of this implementation is

Options:

A.

the scalability of token enrollment.


B.

increased accountability of end users.


C.

it protects against unauthorized access.


D.

it simplifies user access administration.


Expert Solution
Questions # 49:

Which of the following is a weakness of Wired Equivalent Privacy (WEP)?

Options:

A.

Length of Initialization Vector (IV)


B.

Protection against message replay


C.

Detection of message tampering


D.

Built-in provision to rotate keys


Expert Solution
Questions # 50:

During the Security Assessment and Authorization process, what is the PRIMARY purpose for conducting a hardware and software inventory?

Options:

A.

Calculate the value of assets being accredited.


B.

Create a list to include in the Security Assessment and Authorization package.


C.

Identify obsolete hardware and software.


D.

Define the boundaries of the information system.


Expert Solution
Questions # 51:

What is the PRIMARY difference between security policies and security procedures?

Options:

A.

Policies are used to enforce violations, and procedures create penalties


B.

Policies point to guidelines, and procedures are more contractual in nature


C.

Policies are included in awareness training, and procedures give guidance


D.

Policies are generic in nature, and procedures contain operational details


Expert Solution
Questions # 52:

Sensitive customer data is going to be added to a database. What is the MOST effective implementation for ensuring data privacy?

Options:

A.

Discretionary Access Control (DAC) procedures


B.

Mandatory Access Control (MAC) procedures


C.

Data link encryption


D.

Segregation of duties


Expert Solution
Questions # 53:

Which of the following is the MOST important goal of information asset valuation?

Options:

A.

Developing a consistent and uniform method of controlling access on information assets


B.

Developing appropriate access control policies and guidelines


C.

Assigning a financial value to an organization’s information assets


D.

Determining the appropriate level of protection


Expert Solution
Questions # 54:

Single Sign-On (SSO) is PRIMARILY designed to address which of the following?

Options:

A.

Confidentiality and Integrity


B.

Availability and Accountability


C.

Integrity and Availability


D.

Accountability and Assurance


Expert Solution
Questions # 55:

A vulnerability in which of the following components would be MOST difficult to detect?

Options:

A.

Kernel


B.

Shared libraries


C.

Hardware


D.

System application


Expert Solution
Questions # 56:

In which identity management process is the subject’s identity established?

Options:

A.

Trust


B.

Provisioning


C.

Authorization


D.

Enrollment


Expert Solution
Questions # 57:

Although code using a specific program language may not be susceptible to a buffer overflow attack,

Options:

A.

most calls to plug-in programs are susceptible.


B.

most supporting application code is susceptible.


C.

the graphical images used by the application could be susceptible.


D.

the supporting virtual machine could be susceptible.


Expert Solution
Questions # 58:

Which of the following is a remote access protocol that uses a static authentication?

Options:

A.

Point-to-Point Tunneling Protocol (PPTP)


B.

Routing Information Protocol (RIP)


C.

Password Authentication Protocol (PAP)


D.

Challenge Handshake Authentication Protocol (CHAP)


Expert Solution
Questions # 59:

When designing a vulnerability test, which one of the following is likely to give the BEST indication of what components currently operate on the network?

Options:

A.

Topology diagrams


B.

Mapping tools


C.

Asset register


D.

Ping testing


Expert Solution
Questions # 60:

During the risk assessment phase of the project the CISO discovered that a college within the University is collecting Protected Health Information (PHI) data via an application that was developed in-house. The college collecting this data is fully aware of the regulations for Health Insurance Portability and Accountability Act (HIPAA) and is fully compliant.

What is the best approach for the CISO?

During the risk assessment phase of the project the CISO discovered that a college within the University is collecting Protected Health Information (PHI) data via an application that was developed in-house. The college collecting this data is fully aware of the regulations for Health Insurance Portability and Accountability Act (HIPAA) and is fully compliant.

What is the best approach for the CISO?

Options:

A.

Document the system as high risk


B.

Perform a vulnerability assessment


C.

Perform a quantitative threat assessment


D.

Notate the information and move on


Expert Solution
Viewing page 4 out of 16 pages
Viewing questions 46-60 out of questions