Pass the ISC ISC 2 Credentials CISSP Questions and answers with CertsForce

Viewing page 5 out of 16 pages
Viewing questions 61-75 out of questions
Questions # 61:

Which of the following are effective countermeasures against passive network-layer attacks?

Options:

A.

Federated security and authenticated access controls


B.

Trusted software development and run time integrity controls


C.

Encryption and security enabled applications


D.

Enclave boundary protection and computing environment defense


Expert Solution
Questions # 62:

Which of the following BEST describes the purpose of performing security certification?

Options:

A.

To identify system threats, vulnerabilities, and acceptable level of risk


B.

To formalize the confirmation of compliance to security policies and standards


C.

To formalize the confirmation of completed risk mitigation and risk analysis


D.

To verify that system architecture and interconnections with other systems are effectively implemented


Expert Solution
Questions # 63:

Which of the following statements is TRUE regarding value boundary analysis as a functional software testing technique?

Options:

A.

It is useful for testing communications protocols and graphical user interfaces.


B.

It is characterized by the stateless behavior of a process implemented in a function.


C.

Test inputs are obtained from the derived threshold of the given functional specifications.


D.

An entire partition can be covered by considering only one representative value from that partition.


Expert Solution
Questions # 64:

Match the objectives to the assessment questions in the governance domain of Software Assurance Maturity Model (SAMM).

Question # 64


Expert Solution
Questions # 65:

Which of the following activities BEST identifies operational problems, security misconfigurations, and malicious attacks?

Options:

A.

Policy documentation review


B.

Authentication validation


C.

Periodic log reviews


D.

Interface testing


Expert Solution
Questions # 66:

In order for a security policy to be effective within an organization, it MUST include

Options:

A.

strong statements that clearly define the problem.


B.

a list of all standards that apply to the policy.


C.

owner information and date of last revision.


D.

disciplinary measures for non compliance.


Expert Solution
Questions # 67:

Which of the following standards/guidelines requires an Information Security Management System (ISMS) to be defined?

Options:

A.

International Organization for Standardization (ISO) 27000 family


B.

Information Technology Infrastructure Library (ITIL)


C.

Payment Card Industry Data Security Standard (PCIDSS)


D.

ISO/IEC 20000


Expert Solution
Questions # 68:

Which of the following is the BEST method to reduce the effectiveness of phishing attacks?

Options:

A.

User awareness


B.

Two-factor authentication


C.

Anti-phishing software


D.

Periodic vulnerability scan


Expert Solution
Questions # 69:

Which of the following command line tools can be used in the reconnaisance phase of a network vulnerability assessment?

Options:

A.

dig


B.

ifconfig


C.

ipconfig


D.

nbtstat


Expert Solution
Questions # 70:

Which of the following is the PRIMARY security concern associated with the implementation of smart cards?

Options:

A.

The cards have limited memory


B.

Vendor application compatibility


C.

The cards can be misplaced


D.

Mobile code can be embedded in the card


Expert Solution
Questions # 71:

A manufacturing organization wants to establish a Federated Identity Management (FIM) system with its 20 different supplier companies. Which of the following is the BEST solution for the manufacturing organization?

Options:

A.

Trusted third-party certification


B.

Lightweight Directory Access Protocol (LDAP)


C.

Security Assertion Markup language (SAML)


D.

Cross-certification


Expert Solution
Questions # 72:

Which of the following BEST describes an access control method utilizing cryptographic keys derived from a smart card private key that is embedded within mobile devices?

Options:

A.

Derived credential


B.

Temporary security credential


C.

Mobile device credentialing service


D.

Digest authentication


Expert Solution
Questions # 73:

What is the BEST approach for controlling access to highly sensitive information when employees have the same level of security clearance?

Options:

A.

Audit logs


B.

Role-Based Access Control (RBAC)


C.

Two-factor authentication


D.

Application of least privilege


Expert Solution
Questions # 74:

Users require access rights that allow them to view the average salary of groups of employees. Which control would prevent the users from obtaining an individual employee’s salary?

Options:

A.

Limit access to predefined queries


B.

Segregate the database into a small number of partitions each with a separate security level


C.

Implement Role Based Access Control (RBAC)


D.

Reduce the number of people who have access to the system for statistical purposes


Expert Solution
Questions # 75:

With data labeling, which of the following MUST be the key decision maker?

Options:

A.

Information security


B.

Departmental management


C.

Data custodian


D.

Data owner


Expert Solution
Viewing page 5 out of 16 pages
Viewing questions 61-75 out of questions