Pass the ISC ISC Other Certification CSSLP Questions and answers with CertsForce

Viewing page 1 out of 11 pages
Viewing questions 1-10 out of questions
Questions # 1:

In which of the following alternative processing sites is the backup facility maintained in a constant order, with a full complement of servers, workstations, and communication links ready to assume the primary operations responsibility?

Options:

A.

Cold Site


B.

Hot Site


C.

Warm Site


D.

Mobile Site


Expert Solution
Questions # 2:

You work as a project manager for BlueWell Inc. You are working on a project and the management wants a rapid and cost-effective means for establishing priorities for planning risk responses in your project. Which risk management process can satisfy management's objective for your project?

Options:

A.

Qualitative risk analysis


B.

Historical information


C.

Rolling wave planning


D.

Quantitative analysis


Expert Solution
Questions # 3:

The Phase 1 of DITSCAP C&A is known as Definition Phase. The goal of this phase is to define the C&A level of effort, identify the main C&A roles and responsibilities, and create an agreement on the method for implementing the security requirements. What are the process activities of this phase? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Negotiation


B.

Registration


C.

Document mission need


D.

Initial Certification Analysis


Expert Solution
Questions # 4:

Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?

Options:

A.

Copyright


B.

Snooping


C.

Utility model


D.

Patent


Expert Solution
Questions # 5:

The NIST Information Security and Privacy Advisory Board (ISPAB) paper "Perspectives on Cloud Computing and Standards" specifies potential advantages and disdvantages of virtualization. Which of the following disadvantages does it include? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It increases capabilities for fault tolerant computing using rollback and snapshot features.


B.

It increases intrusion detection through introspection.


C.

It initiates the risk that malicious software is targeting the VM environment.


D.

It increases overall security risk shared resources.


E.

It creates the possibility that remote attestation may not work.


F.

It involves new protection mechanisms for preventing VM escape, VM detection, and VM-VM interference.


G.

It increases configuration effort because of complexity and composite system.


Expert Solution
Questions # 6:

Which of the following cryptographic system services ensures that information will not be disclosed to any unauthorized person on a local network?

Options:

A.

Authentication


B.

Integrity


C.

Non-repudiation


D.

Confidentiality


Expert Solution
Questions # 7:

Which of the following are the types of access controls? Each correct answer represents a complete solution. Choose three.

Options:

A.

Physical


B.

Technical


C.

Administrative


D.

Automatic


Expert Solution
Questions # 8:

You work as a systems engineer for BlueWell Inc. Which of the following tools will you use to look outside your own organization to examine how others achieve their performance levels, and what processes they use to reach those levels?

Options:

A.

Benchmarking


B.

Six Sigma


C.

ISO 9001:2000


D.

SEI-CMM


Expert Solution
Questions # 9:

Adam works as a Computer Hacking Forensic Investigator for a garment company in the United States. A project has been assigned to him to investigate a case of a disloyal employee who is suspected of stealing design of the garments, which belongs to the company and selling those garments of the same design under different brand name. Adam investigated that the company does not have any policy related to the copy of design of the garments. He also investigated that the trademark under which the employee is selling the garments is almost identical to the original trademark of the company. On the grounds of which of the following laws can the employee be prosecuted?

Options:

A.

Espionage law


B.

Trademark law


C.

Cyber law


D.

Copyright law


Expert Solution
Questions # 10:

You work as a Security Manager for Tech Perfect Inc. You have set up a SIEM server for the following purposes: Analyze the data from different log sources Correlate the events among the log entries Identify and prioritize significant events Initiate responses to events if required One of your log monitoring staff wants to know the features of SIEM product that will help them in these purposes. What features will you recommend? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Asset information storage and correlation


B.

Transmission confidentiality protection


C.

Incident tracking and reporting


D.

Security knowledge base


E.

Graphical user interface


Expert Solution
Viewing page 1 out of 11 pages
Viewing questions 1-10 out of questions