Pass the ISC ISC Other Certification CSSLP Questions and answers with CertsForce

Viewing page 4 out of 11 pages
Viewing questions 31-40 out of questions
Questions # 31:

You work as a Network Auditor for Net Perfect Inc. The company has a Windows-based network. While auditing the company's network, you are facing problems in searching the faults and other entities that belong to it. Which of the following risks may occur due to the existence of these problems?

Options:

A.

Residual risk


B.

Secondary risk


C.

Detection risk


D.

Inherent risk


Expert Solution
Questions # 32:

Which of the following models uses a directed graph to specify the rights that a subject can transfer to an object or that a subject can take from another subject?

Options:

A.

Take-Grant Protection Model


B.

Biba Integrity Model


C.

Bell-LaPadula Model


D.

Access Matrix


Expert Solution
Questions # 33:

You are the project manager of the CUL project in your organization. You and the project team are assessing the risk events and creating a probability and impact matrix for the identified risks. Which one of the following statements best describes the requirements for the data type used in qualitative risk analysis?

Options:

A.

A qualitative risk analysis encourages biased data to reveal risk tolerances.


B.

A qualitative risk analysis required unbiased stakeholders with biased risk tolerances.


C.

A qualitative risk analysis requires accurate and unbiased data if it is to be credible.


D.

A qualitative risk analysis requires fast and simple data to complete the analysis.


Expert Solution
Questions # 34:

Drop the appropriate value to complete the formula.

Question # 34


Expert Solution
Questions # 35:

A Web-based credit card company had collected financial and personal details of Mark before issuing him a credit card. The company has now provided Mark's financial and personal details to another company. Which of the following Internet laws has the credit card issuing company violated?

Options:

A.

Trademark law


B.

Security law


C.

Privacy law


D.

Copyright law


Expert Solution
Questions # 36:

Drag and drop the appropriate principle documents in front of their respective functions.

Question # 36


Expert Solution
Questions # 37:

Which of the following types of attacks occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts?

Options:

A.

Denial-of-service attack


B.

Dictionary attack


C.

Man-in-the-middle attack


D.

Password guessing attack


Expert Solution
Questions # 38:

Which of the following security models characterizes the rights of each subject with respect to every object in the computer system?

Options:

A.

Clark-Wilson model


B.

Bell-LaPadula model


C.

Biba model


D.

Access matrix


Expert Solution
Questions # 39:

You work as a security engineer for BlueWell Inc. According to you, which of the following DITSCAP/NIACAP model phases occurs at the initiation of the project, or at the initial C&A effort of a legacy system?

Options:

A.

Validation


B.

Definition


C.

Verification


D.

Post Accreditation


Expert Solution
Questions # 40:

You are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers for the district they will need to be able to work from an alternate location. However, budget is an issue. Which of the following is most appropriate for this client?

Options:

A.

Cold site


B.

Off site


C.

Warm site


D.

Hot site


Expert Solution
Viewing page 4 out of 11 pages
Viewing questions 31-40 out of questions