Pass the ISC ISC Other Certification CSSLP Questions and answers with CertsForce

Viewing page 5 out of 11 pages
Viewing questions 41-50 out of questions
Questions # 41:

Which of the following vulnerabilities occurs when an application directly uses or concatenates potentially hostile input with data file or stream functions?

Options:

A.

Insecure cryptographic storage


B.

Malicious file execution


C.

Insecure communication


D.

Injection flaw


Expert Solution
Questions # 42:

Which of the following access control models uses a predefined set of access privileges for an object of a system?

Options:

A.

Role-Based Access Control


B.

Discretionary Access Control


C.

Policy Access Control


D.

Mandatory Access Control


Expert Solution
Questions # 43:

Which of the following is a malicious exploit of a website, whereby unauthorized commands are transmitted from a user trusted by the website?

Options:

A.

Cross-Site Scripting


B.

Injection flaw


C.

Side channel attack


D.

Cross-Site Request Forgery


Expert Solution
Questions # 44:

Which of the following activities are performed by the 'Do' cycle component of PDCA (plan-do-check-act)? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It detects and responds to incidents properly.


B.

It determines controls and their objectives.


C.

It manages resources that are required to achieve a goal.


D.

It performs security awareness training.


E.

It operates the selected controls.


Expert Solution
Questions # 45:

Which of the following are the scanning methods used in penetration testing? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Vulnerability


B.

Port


C.

Services


D.

Network


Expert Solution
Questions # 46:

Which of the following statements about the authentication concept of information security management is true?

Options:

A.

It establishes the users' identity and ensures that the users are who they say they are.


B.

It ensures the reliable and timely access to resources.


C.

It determines the actions and behaviors of a single individual within a system, and identifies that particular individual.


D.

It ensures that modifications are not made to data by unauthorized personnel or processes.


Expert Solution
Questions # 47:

Which of the following technologies is used by hardware manufacturers, publishers, copyright holders and individuals to impose limitations on the usage of digital content and devices?

Options:

A.

Hypervisor


B.

Grid computing


C.

Code signing


D.

Digital rights management


Expert Solution
Questions # 48:

Which of the following testing methods tests the system efficiency by systematically selecting the suitable and minimum set of tests that are required to effectively cover the affected changes?

Options:

A.

Unit testing


B.

Integration testing


C.

Acceptance testing


D.

Regression testing


Expert Solution
Questions # 49:

Which of the following programming languages are compiled into machine code and directly executed by the CPU of a computer system? Each correct answer represents a complete solution. Choose two.

Options:

A.

C


B.

Microosft.NET


C.

Java EE


D.

C++


Expert Solution
Questions # 50:

Which of the following are the goals of risk management? Each correct answer represents a complete solution. Choose three.

Options:

A.

Identifying the risk


B.

Assessing the impact of potential threats


C.

Identifying the accused


D.

Finding an economic balance between the impact of the risk and the cost of the countermeasure


Expert Solution
Viewing page 5 out of 11 pages
Viewing questions 41-50 out of questions