Pass the ISC ISC 2 Credentials CISSP Questions and answers with CertsForce

Viewing page 6 out of 16 pages
Viewing questions 76-90 out of questions
Questions # 76:

Refer to the information below to answer the question.

Desktop computers in an organization were sanitized for re-use in an equivalent security environment. The data was destroyed in accordance with organizational policy and all marking and other external indications of the sensitivity of the data that was formerly stored on the magnetic drives were removed.

Organizational policy requires the deletion of user data from Personal Digital Assistant (PDA) devices before disposal. It may not be possible to delete the user data if the device is malfunctioning. Which destruction method below provides the BEST assurance that the data has been removed?

Options:

A.

Knurling


B.

Grinding


C.

Shredding


D.

Degaussing


Expert Solution
Questions # 77:

A security manager has noticed an inconsistent application of server security controls resulting in vulnerabilities on critical systems. What is the MOST likely cause of this issue?

Options:

A.

A lack of baseline standards


B.

Improper documentation of security guidelines


C.

A poorly designed security policy communication program


D.

Host-based Intrusion Prevention System (HIPS) policies are ineffective


Expert Solution
Questions # 78:

A large bank deploys hardware tokens to all customers that use their online banking system. The token generates and displays a six digit numeric password every 60 seconds. The customers must log into their bank accounts using this numeric password. This is an example of

Options:

A.

asynchronous token.


B.

Single Sign-On (SSO) token.


C.

single factor authentication token.


D.

synchronous token.


Expert Solution
Questions # 79:

The amount of data that will be collected during an audit is PRIMARILY determined by the.

Options:

A.

audit scope.


B.

auditor's experience level.


C.

availability of the data.


D.

integrity of the data.


Expert Solution
Questions # 80:

Which of the following describes the concept of a Single Sign -On (SSO) system?

Options:

A.

Users are authenticated to one system at a time.


B.

Users are identified to multiple systems with several credentials.


C.

Users are authenticated to multiple systems with one login.


D.

Only one user is using the system at a time.


Expert Solution
Questions # 81:

An online retail company has formulated a record retention schedule for customer transactions. Which of the following is a valid reason a customer transaction is kept beyond the retention schedule?

Options:

A.

Pending legal hold


B.

Long term data mining needs


C.

Customer makes request to retain


D.

Useful for future business initiatives


Expert Solution
Questions # 82:

Which of the following provides the MOST protection against data theft of sensitive information when a laptop is stolen?

Options:

A.

Set up a BIOS and operating system password


B.

Encrypt the virtual drive where confidential files can be stored


C.

Implement a mandatory policy in which sensitive data cannot be stored on laptops, but only on the corporate network


D.

Encrypt the entire disk and delete contents after a set number of failed access attempts


Expert Solution
Questions # 83:

Refer to the information below to answer the question.

A new employee is given a laptop computer with full administrator access. This employee does not have a personal computer at home and has a child that uses the computer to send and receive e-mail, search the web, and use instant messaging. The organization’s Information Technology (IT) department discovers that a peer-to-peer program has been installed on the computer using the employee's access.

Which of the following solutions would have MOST likely detected the use of peer-to-peer programs when the computer was connected to the office network?

Options:

A.

Anti-virus software


B.

Intrusion Prevention System (IPS)


C.

Anti-spyware software


D.

Integrity checking software


Expert Solution
Questions # 84:

Which of the following is the BEST solution to provide redundancy for telecommunications links?

Options:

A.

Provide multiple links from the same telecommunications vendor.


B.

Ensure that the telecommunications links connect to the network in one location.


C.

Ensure that the telecommunications links connect to the network in multiple locations.


D.

Provide multiple links from multiple telecommunications vendors.


Expert Solution
Questions # 85:

Which of the following secure startup mechanisms are PRIMARILY designed to thwart attacks?

Options:

A.

Timing


B.

Cold boot


C.

Side channel


D.

Acoustic cryptanalysis


Expert Solution
Questions # 86:

Identify the component that MOST likely lacks digital accountability related to information access.

Click on the correct device in the image below.

Question # 86


Expert Solution
Questions # 87:

Refer to the information below to answer the question.

A large, multinational organization has decided to outsource a portion of their Information Technology (IT) organization to a third-party provider’s facility. This provider will be responsible for the design, development, testing, and support of several critical, customer-based applications used by the organization.

The organization should ensure that the third party's physical security controls are in place so that they

Options:

A.

are more rigorous than the original controls.


B.

are able to limit access to sensitive information.


C.

allow access by the organization staff at any time.


D.

cannot be accessed by subcontractors of the third party.


Expert Solution
Questions # 88:

What is the MOST effective method for gaining unauthorized access to a file protected with a long complex password?

Options:

A.

Brute force attack


B.

Frequency analysis


C.

Social engineering


D.

Dictionary attack


Expert Solution
Questions # 89:

Refer to the information below to answer the question.

In a Multilevel Security (MLS) system, the following sensitivity labels are used in increasing levels of sensitivity: restricted, confidential, secret, top secret. Table A lists the clearance levels for four users, while Table B lists the security classes of four different files.

Question # 89

Which of the following is true according to the star property (*property)?

Options:

A.

User D can write to File 1


B.

User B can write to File 1


C.

User A can write to File 1


D.

User C can write to File 1


Expert Solution
Questions # 90:

When implementing a secure wireless network, which of the following supports authentication and authorization for individual client endpoints.

Options:

A.

Temporal Key Integrity Protocol (TKIP)


B.

Wi-Fi Protected Access (WPA) Pre-Shared Key (PSK)


C.

Wi-Fi Protected Access 2 (WPA2) Enterprise


D.

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)


Expert Solution
Viewing page 6 out of 16 pages
Viewing questions 76-90 out of questions