Pass the ISC ISC 2 Credentials CISSP Questions and answers with CertsForce

Viewing page 8 out of 16 pages
Viewing questions 106-120 out of questions
Questions # 106:

Why must all users be positively identified prior to using multi-user computers?

Options:

A.

To provide access to system privileges


B.

To provide access to the operating system


C.

To ensure that unauthorized persons cannot access the computers


D.

To ensure that management knows what users are currently logged on


Expert Solution
Questions # 107:

Which of the following methods protects Personally Identifiable Information (PII) by use of a full replacement of the data element?

Options:

A.

Transparent Database Encryption (TDE)


B.

Column level database encryption


C.

Volume encryption


D.

Data tokenization


Expert Solution
Questions # 108:

Which of the following is TRUE about Disaster Recovery Plan (DRP) testing?

Options:

A.

Operational networks are usually shut down during testing.


B.

Testing should continue even if components of the test fail.


C.

The company is fully prepared for a disaster if all tests pass.


D.

Testing should not be done until the entire disaster plan can be tested.


Expert Solution
Questions # 109:

Which layer of the Open Systems Interconnections (OSI) model implementation adds information concerning the logical connection between the sender and receiver?

Options:

A.

Physical


B.

Session


C.

Transport


D.

Data-Link


Expert Solution
Questions # 110:

What would be the PRIMARY concern when designing and coordinating a security assessment for an Automatic Teller Machine (ATM) system?

Options:

A.

Physical access to the electronic hardware


B.

Regularly scheduled maintenance process


C.

Availability of the network connection


D.

Processing delays


Expert Solution
Questions # 111:

When implementing controls in a heterogeneous end-point network for an organization, it is critical that

Options:

A.

hosts are able to establish network communications.


B.

users can make modifications to their security software configurations.


C.

common software security components be implemented across all hosts.


D.

firewalls running on each host are fully customizable by the user.


Expert Solution
Questions # 112:

An engineer in a software company has created a virus creation tool. The tool can generate thousands of polymorphic viruses. The engineer is planning to use the tool in a controlled environment to test the company's next generation virus scanning software. Which would BEST describe the behavior of the engineer and why?

Options:

A.

The behavior is ethical because the tool will be used to create a better virus scanner.


B.

The behavior is ethical because any experienced programmer could create such a tool.


C.

The behavior is not ethical because creating any kind of virus is bad.


D.

The behavior is not ethical because such a tool could be leaked on the Internet.


Expert Solution
Questions # 113:

Including a Trusted Platform Module (TPM) in the design of a computer system is an example of a technique to what?

Options:

A.

Interface with the Public Key Infrastructure (PKI)


B.

Improve the quality of security software


C.

Prevent Denial of Service (DoS) attacks


D.

Establish a secure initial state


Expert Solution
Questions # 114:

Checking routing information on e-mail to determine it is in a valid format and contains valid information is an example of which of the following anti-spam approaches?

Options:

A.

Simple Mail Transfer Protocol (SMTP) blacklist


B.

Reverse Domain Name System (DNS) lookup


C.

Hashing algorithm


D.

Header analysis


Expert Solution
Questions # 115:

In Disaster Recovery (DR) and business continuity training, which BEST describes a functional drill?

Options:

A.

A full-scale simulation of an emergency and the subsequent response functions


B.

A specific test by response teams of individual emergency response functions


C.

A functional evacuation of personnel


D.

An activation of the backup site


Expert Solution
Questions # 116:

Why is a system's criticality classification important in large organizations?

Options:

A.

It provides for proper prioritization and scheduling of security and maintenance tasks.


B.

It reduces critical system support workload and reduces the time required to apply patches.


C.

It allows for clear systems status communications to executive management.


D.

It provides for easier determination of ownership, reducing confusion as to the status of the asset.


Expert Solution
Questions # 117:

Which of the following defines the key exchange for Internet Protocol Security (IPSec)?

Options:

A.

Secure Sockets Layer (SSL) key exchange


B.

Internet Key Exchange (IKE)


C.

Security Key Exchange (SKE)


D.

Internet Control Message Protocol (ICMP)


Expert Solution
Questions # 118:

When designing a networked Information System (IS) where there will be several different types of individual access, what is the FIRST step that should be taken to ensure all access control requirements are addressed?

Options:

A.

Create a user profile.


B.

Create a user access matrix.


C.

Develop an Access Control List (ACL).


D.

Develop a Role Based Access Control (RBAC) list.


Expert Solution
Questions # 119:

What is the MOST effective countermeasure to a malicious code attack against a mobile system?

Options:

A.

Sandbox


B.

Change control


C.

Memory management


D.

Public-Key Infrastructure (PKI)


Expert Solution
Questions # 120:

An external attacker has compromised an organization's network security perimeter and installed a sniffer onto an inside computer. Which of the following is the MOST effective layer of security the organization could have implemented to mitigate the attacker's ability to gain further information?

Options:

A.

Implement packet filtering on the network firewalls


B.

Require strong authentication for administrators


C.

Install Host Based Intrusion Detection Systems (HIDS)


D.

Implement logical network segmentation at the switches


Expert Solution
Viewing page 8 out of 16 pages
Viewing questions 106-120 out of questions