Pass the ISC ISC 2 Credentials CISSP Questions and answers with CertsForce

Viewing page 7 out of 16 pages
Viewing questions 91-105 out of questions
Questions # 91:

Refer to the information below to answer the question.

In a Multilevel Security (MLS) system, the following sensitivity labels are used in increasing levels of sensitivity: restricted, confidential, secret, top secret. Table A lists the clearance levels for four users, while Table B lists the security classes of four different files.

Question # 91

In a Bell-LaPadula system, which user cannot write to File 3?

Options:

A.

User A


B.

User B


C.

User C


D.

User D


Expert Solution
Questions # 92:

What component of a web application that stores the session state in a cookie an attacker can bypass?

Options:

A.

An initialization check


B.

An identification check


C.

An authentication check


D.

An authorization check


Expert Solution
Questions # 93:

Refer to the information below to answer the question.

A security practitioner detects client-based attacks on the organization’s network. A plan will be necessary to address these concerns.

What MUST the plan include in order to reduce client-side exploitation?

Options:

A.

Approved web browsers


B.

Network firewall procedures


C.

Proxy configuration


D.

Employee education


Expert Solution
Questions # 94:

During an audit, the auditor finds evidence of potentially illegal activity. Which of the following is the MOST appropriate action to take?

Options:

A.

Immediately call the police


B.

Work with the client to resolve the issue internally


C.

Advise the person performing the illegal activity to cease and desist


D.

Work with the client to report the activity to the appropriate authority


Expert Solution
Questions # 95:

Which of the following actions MUST be taken if a vulnerability is discovered during the maintenance stage in a System Development Life Cycle (SDLC)?

Options:

A.

Make changes following principle and design guidelines.


B.

Stop the application until the vulnerability is fixed.


C.

Report the vulnerability to product owner.


D.

Monitor the application and review code.


Expert Solution
Questions # 96:

Which of the following is the BEST countermeasure to brute force login attacks?

Options:

A.

Changing all canonical passwords


B.

Decreasing the number of concurrent user sessions


C.

Restricting initial password delivery only in person


D.

Introducing a delay after failed system access attempts


Expert Solution
Questions # 97:

Which of the following BEST mitigates a replay attack against a system using identity federation and Security Assertion Markup Language (SAML) implementation?

Options:

A.

Two-factor authentication


B.

Digital certificates and hardware tokens


C.

Timed sessions and Secure Socket Layer (SSL)


D.

Passwords with alpha-numeric and special characters


Expert Solution
Questions # 98:

When using third-party software developers, which of the following is the MOST effective method of providing software development Quality Assurance (QA)?

Options:

A.

Retain intellectual property rights through contractual wording.


B.

Perform overlapping code reviews by both parties.


C.

Verify that the contractors attend development planning meetings.


D.

Create a separate contractor development environment.


Expert Solution
Questions # 99:

Refer to the information below to answer the question.

During the investigation of a security incident, it is determined that an unauthorized individual accessed a system which hosts a database containing financial information.

If it is discovered that large quantities of information have been copied by the unauthorized individual, what attribute of the data has been compromised?

Options:

A.

Availability


B.

Integrity


C.

Accountability


D.

Confidentiality


Expert Solution
Questions # 100:

Refer to the information below to answer the question.

In a Multilevel Security (MLS) system, the following sensitivity labels are used in increasing levels of sensitivity: restricted, confidential, secret, top secret. Table A lists the clearance levels for four users, while Table B lists the security classes of four different files.

Question # 100

In a Bell-LaPadula system, which user has the MOST restrictions when writing data to any of the four files?

Options:

A.

User A


B.

User B


C.

User C


D.

User D


Expert Solution
Questions # 101:

Refer to the information below to answer the question.

During the investigation of a security incident, it is determined that an unauthorized individual accessed a system which hosts a database containing financial information.

If the intrusion causes the system processes to hang, which of the following has been affected?

Options:

A.

System integrity


B.

System availability


C.

System confidentiality


D.

System auditability


Expert Solution
Questions # 102:

Which of the following assures that rules are followed in an identity management architecture?

Options:

A.

Policy database


B.

Digital signature


C.

Policy decision point


D.

Policy enforcement point


Expert Solution
Questions # 103:

Refer to the information below to answer the question.

A security practitioner detects client-based attacks on the organization’s network. A plan will be necessary to address these concerns.

In the plan, what is the BEST approach to mitigate future internal client-based attacks?

Options:

A.

Block all client side web exploits at the perimeter.


B.

Remove all non-essential client-side web services from the network.


C.

Screen for harmful exploits of client-side services before implementation.


D.

Harden the client image before deployment.


Expert Solution
Questions # 104:

During the procurement of a new information system, it was determined that some of the security requirements were not addressed in the system specification. Which of the following is the MOST likely reason for this?

Options:

A.

The procurement officer lacks technical knowledge.


B.

The security requirements have changed during the procurement process.


C.

There were no security professionals in the vendor's bidding team.


D.

The description of the security requirements was insufficient.


Expert Solution
Questions # 105:

Which of the following is the BEST reason to review audit logs periodically?

Options:

A.

Verify they are operating properly


B.

Monitor employee productivity


C.

Identify anomalies in use patterns


D.

Meet compliance regulations


Expert Solution
Viewing page 7 out of 16 pages
Viewing questions 91-105 out of questions