Pass the ISC ISC 2 Credentials CISSP Questions and answers with CertsForce

Viewing page 9 out of 16 pages
Viewing questions 121-135 out of questions
Questions # 121:

Logical access control programs are MOST effective when they are

Options:

A.

approved by external auditors.


B.

combined with security token technology.


C.

maintained by computer security officers.


D.

made part of the operating system.


Expert Solution
Questions # 122:

Which of the following is ensured when hashing files during chain of custody handling?

Options:

A.

Availability


B.

Accountability


C.

Integrity


D.

Non-repudiation


Expert Solution
Questions # 123:

A security consultant has been asked to research an organization's legal obligations to protect privacy-related information. What kind of reading material is MOST relevant to this project?

Options:

A.

The organization's current security policies concerning privacy issues


B.

Privacy-related regulations enforced by governing bodies applicable to the organization


C.

Privacy best practices published by recognized security standards organizations


D.

Organizational procedures designed to protect privacy information


Expert Solution
Questions # 124:

Which of the following is an authentication protocol in which a new random number is generated uniquely for each login session?

Options:

A.

Challenge Handshake Authentication Protocol (CHAP)


B.

Point-to-Point Protocol (PPP)


C.

Extensible Authentication Protocol (EAP)


D.

Password Authentication Protocol (PAP)


Expert Solution
Questions # 125:

The process of mutual authentication involves a computer system authenticating a user and authenticating the

Options:

A.

user to the audit process.


B.

computer system to the user.


C.

user's access to all authorized objects.


D.

computer system to the audit process.


Expert Solution
Questions # 126:

Which of the following Disaster Recovery (DR) sites is the MOST difficult to test?

Options:

A.

Hot site


B.

Cold site


C.

Warm site


D.

Mobile site


Expert Solution
Questions # 127:

Which of the following does Temporal Key Integrity Protocol (TKIP) support?

Options:

A.

Multicast and broadcast messages


B.

Coordination of IEEE 802.11 protocols


C.

Wired Equivalent Privacy (WEP) systems


D.

Synchronization of multiple devices


Expert Solution
Questions # 128:

To prevent inadvertent disclosure of restricted information, which of the following would be the LEAST effective process for eliminating data prior to the media being discarded?

Options:

A.

Multiple-pass overwriting


B.

Degaussing


C.

High-level formatting


D.

Physical destruction


Expert Solution
Questions # 129:

By allowing storage communications to run on top of Transmission Control Protocol/Internet Protocol (TCP/IP) with a Storage Area Network (SAN), the

Options:

A.

confidentiality of the traffic is protected.


B.

opportunity to sniff network traffic exists.


C.

opportunity for device identity spoofing is eliminated.


D.

storage devices are protected against availability attacks.


Expert Solution
Questions # 130:

What is the ultimate objective of information classification?

Options:

A.

To assign responsibility for mitigating the risk to vulnerable systems


B.

To ensure that information assets receive an appropriate level of protection


C.

To recognize that the value of any item of information may change over time


D.

To recognize the optimal number of classification categories and the benefits to be gained from their use


Expert Solution
Questions # 131:

Which security action should be taken FIRST when computer personnel are terminated from their jobs?

Options:

A.

Remove their computer access


B.

Require them to turn in their badge


C.

Conduct an exit interview


D.

Reduce their physical access level to the facility


Expert Solution
Questions # 132:

Which of the following is an essential element of a privileged identity lifecycle management?

Options:

A.

Regularly perform account re-validation and approval


B.

Account provisioning based on multi-factor authentication


C.

Frequently review performed activities and request justification


D.

Account information to be provided by supervisor or line manager


Expert Solution
Questions # 133:

When constructing an Information Protection Policy (IPP), it is important that the stated rules are necessary, adequate, and

Options:

A.

flexible.


B.

confidential.


C.

focused.


D.

achievable.


Expert Solution
Questions # 134:

Which of the following assessment metrics is BEST used to understand a system's vulnerability to potential exploits?

Options:

A.

Determining the probability that the system functions safely during any time period


B.

Quantifying the system's available services


C.

Identifying the number of security flaws within the system


D.

Measuring the system's integrity in the presence of failure


Expert Solution
Questions # 135:

What maintenance activity is responsible for defining, implementing, and testing updates to application systems?

Options:

A.

Program change control


B.

Regression testing


C.

Export exception control


D.

User acceptance testing


Expert Solution
Viewing page 9 out of 16 pages
Viewing questions 121-135 out of questions