Pass the ISC ISC Other Certification CSSLP Questions and answers with CertsForce

Viewing page 8 out of 11 pages
Viewing questions 71-80 out of questions
Questions # 71:

The Phase 2 of DITSCAP C&A is known as Verification. The goal of this phase is to obtain a fully integrated system for certification testing and accreditation. What are the process activities of this phase? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Certification analysis


B.

Assessment of the Analysis Results


C.

Configuring refinement of the SSAA


D.

System development


E.

Registration


Expert Solution
Questions # 72:

Which of the following are the benefits of information classification for an organization? Each correct answer represents a complete solution. Choose two.

Options:

A.

It helps reduce the Total Cost of Ownership (TCO).


B.

It helps identify which protections apply to which information.


C.

It helps identify which information is the most sensitive or vital to an organization.


D.

It ensures that modifications are not made to data by unauthorized personnel or processes.


Expert Solution
Questions # 73:

You work as the Senior Project manager in Dotcoiss Inc. Your company has started a software project using configuration management and has completed 70% of it. You need to ensure that the network infrastructure devices and networking standards used in this project are installed in accordance with the requirements of its detailed project design documentation. Which of the following procedures will you employ to accomplish the task?

Options:

A.

Configuration identification


B.

Configuration control


C.

Functional configuration audit


D.

Physical configuration audit


Expert Solution
Questions # 74:

Which of the following disaster recovery tests includes the operations that shut down at the primary site, and are shifted to the recovery site according to the disaster recovery plan?

Options:

A.

Structured walk-through test


B.

Full-interruption test


C.

Parallel test


D.

Simulation test


Expert Solution
Questions # 75:

Which of the following NIST Special Publication documents provides a guideline on questionnaires and checklists through which systems can be evaluated for compliance against specific control objectives?

Options:

A.

NIST SP 800-37


B.

NIST SP 800-26


C.

NIST SP 800-53A


D.

NIST SP 800-59


E.

NIST SP 800-53


F.

NIST SP 800-60


Expert Solution
Questions # 76:

You work as a Security Manager for Tech Perfect Inc. You want to save all the data from the SQL injection attack, which can read sensitive data from the database and modify database data using some commands, such as Insert, Update, and Delete. Which of the following tasks will you perform? Each correct answer represents a complete solution. Choose three.

Options:

A.

Apply maximum number of database permissions.


B.

Use an encapsulated library for accessing databases.


C.

Create parameterized stored procedures.


D.

Create parameterized queries by using bound and typed parameters.


Expert Solution
Questions # 77:

Which of the following ISO standards is entitled as "Information technology - Security techniques - Information security management - Measurement"?

Options:

A.

ISO 27003


B.

ISO 27005


C.

ISO 27004


D.

ISO 27006


Expert Solution
Questions # 78:

In 2003, NIST developed a new Certification & Accreditation (C&A) guideline known as FIPS 199. What levels of potential impact are defined by FIPS 199? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Moderate


B.

Medium


C.

High


D.

Low


Expert Solution
Questions # 79:

Penetration tests are sometimes called white hat attacks because in a pen test, the good guys are attempting to break in. What are the different categories of penetration testing? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Open-box


B.

Closed-box


C.

Zero-knowledge test


D.

Full-box


E.

Full-knowledge test


F.

Partial-knowledge test


Expert Solution
Questions # 80:

Auditing is used to track user accounts for file and object access, logon attempts, system shutdown, and many more vulnerabilities to enhance the security of the network. It encompasses a wide variety of activities. Place the different auditing activities in front of their descriptions.

Question # 80


Expert Solution
Viewing page 8 out of 11 pages
Viewing questions 71-80 out of questions