Pass the ISC ISC Other Certification CSSLP Questions and answers with CertsForce

Viewing page 6 out of 11 pages
Viewing questions 51-60 out of questions
Questions # 51:

NIST SP 800-53A defines three types of interview depending on the level of assessment conducted. Which of the following NIST SP 800-53A interviews consists of informal and ad hoc interviews?

Options:

A.

Comprehensive


B.

Significant


C.

Abbreviated


D.

Substantial


Expert Solution
Questions # 52:

Which of the following policies can explain how the company interacts with partners, the company's goals and mission, and a general reporting structure in different situations?

Options:

A.

Informative


B.

Advisory


C.

Selective


D.

Regulatory


Expert Solution
Questions # 53:

You work as a security manager for BlueWell Inc. You are going through the NIST SP 800-37 C&A methodology, which is based on four well defined phases. In which of the following phases of NIST SP 800-37 C&A methodology does the security categorization occur?

Options:

A.

Security Accreditation


B.

Security Certification


C.

Continuous Monitoring


D.

Initiation


Expert Solution
Questions # 54:

Which of the following features of SIEM products is used in analysis for identifying potential problems and reviewing all available data that are associated with the problems?

Options:

A.

Security knowledge base


B.

Graphical user interface


C.

Asset information storage and correlation


D.

Incident tracking and reporting


Expert Solution
Questions # 55:

Which of the following specifies access privileges to a collection of resources by using the URL mapping?

Options:

A.

Code Access Security


B.

Security constraint


C.

Configuration Management


D.

Access Management


Expert Solution
Questions # 56:

The Data and Analysis Center for Software (DACS) specifies three general principles for software assurance which work as a framework in order to categorize various secure design principles. Which of the following principles and practices does the General Principle 1 include? Each correct answer represents a complete solution. Choose two.

Options:

A.

Principle of separation of privileges, duties, and roles


B.

Assume environment data is not trustworthy


C.

Simplify the design


D.

Principle of least privilege


Expert Solution
Questions # 57:

Continuous Monitoring is the fourth phase of the security certification and accreditation process. What activities are performed in the Continuous Monitoring process? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Security accreditation decision


B.

Security control monitoring and impact analyses of changes to the information system


C.

Security accreditation documentation


D.

Configuration management and control


E.

Status reporting and documentation


Expert Solution
Questions # 58:

Which of the following elements of BCP process includes the areas of plan implementation, plan testing, and ongoing plan maintenance, and also involves defining and documenting the continuity strategy?

Options:

A.

Business continuity plan development


B.

Business impact assessment


C.

Scope and plan initiation


D.

Plan approval and implementation


Expert Solution
Questions # 59:

Companies use some special marks to distinguish their products from those of other companies. These marks can include words, letters, numbers, drawings, etc. Which of the following terms describes these special marks?

Options:

A.

Business mark


B.

Trademark


C.

Sales mark


D.

Product mark


Expert Solution
Questions # 60:

Which of the following techniques is used to identify attacks originating from a botnet?

Options:

A.

Passive OS fingerprinting


B.

Recipient filtering


C.

IFilter


D.

BPF-based filter


Expert Solution
Viewing page 6 out of 11 pages
Viewing questions 51-60 out of questions