Pass the ISC ISC Other Certification CSSLP Questions and answers with CertsForce

Viewing page 9 out of 11 pages
Viewing questions 81-90 out of questions
Questions # 81:

The NIST ITL Cloud Research Team defines some primary and secondary technologies as the fundamental elements of cloud computing in its "Effectively and Securely Using the Cloud Computing Paradigm" presentation. Which of the following technologies are included in the primary technologies? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Web application framework


B.

Free and open source software


C.

SOA


D.

Virtualization


Expert Solution
Questions # 82:

Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?

Options:

A.

Confidentiality


B.

Non-repudiation


C.

Authentication


D.

Integrity


Expert Solution
Questions # 83:

FITSAF stands for Federal Information Technology Security Assessment Framework. It is a methodology for assessing the security of information systems. Which of the following FITSAF levels shows that the procedures and controls are tested and reviewed?

Options:

A.

Level 4


B.

Level 5


C.

Level 2


D.

Level 3


E.

Level 1


Expert Solution
Questions # 84:

What are the differences between managed and unmanaged code technologies? Each correct answer represents a complete solution. Choose two.

Options:

A.

Managed code is referred to as Hex code, whereas unmanaged code is referred to as byte code.


B.

C and C++ are the examples of managed code, whereas Java EE and Microsoft.NET are the examples of unmanaged code.


C.

Managed code executes under management of a runtime environment, whereas unmanaged code is executed by the CPU of a computer system.


D.

Managed code is compiled into an intermediate code format, whereas unmanaged code is compiled into machine code.


Expert Solution
Questions # 85:

FIPS 199 defines the three levels of potential impact on organizations: low, moderate, and high. Which of the following are the effects of loss of confidentiality, integrity, or availability in a high level potential impact?

Options:

A.

The loss of confidentiality, integrity, or availability might result in a major damage to organizational assets.


B.

The loss of confidentiality, integrity, or availability might result in severe damages like life threatening injuries or loss of life.


C.

The loss of confidentiality, integrity, or availability might result in major financial losses.


D.

The loss of confidentiality, integrity, or availability might cause severe degradation in or loss of mission capability to an extent.


Expert Solution
Questions # 86:

Which of the following steps of the LeGrand Vulnerability-Oriented Risk Management method determines the necessary compliance offered by risk management practices and assessment of risk levels?

Options:

A.

Assessment, monitoring, and assurance


B.

Vulnerability management


C.

Risk assessment


D.

Adherence to security standards and policies for development and deployment


Expert Solution
Questions # 87:

Maria has been recently appointed as a Network Administrator in Gentech Inc. She has been tasked to perform network security testing to find out the vulnerabilities and shortcomings of the present network infrastructure. Which of the following testing approaches will she apply to accomplish this task?

Options:

A.

Gray-box testing


B.

White-box testing


C.

Black-box testing


D.

Unit testing


Expert Solution
Questions # 88:

Mark is the project manager of the NHQ project in StarTech Inc. The project has an asset valued at $195,000 and is subjected to an exposure factor of 35 percent. What will be the Single Loss Expectancy of the project?

Options:

A.

$68,250


B.

$92,600


C.

$72,650


D.

$67,250


Expert Solution
Questions # 89:

Which of the following plans is a comprehensive statement of consistent actions to be taken before, during, and after a disruptive event that causes a significant loss of information systems resources?

Options:

A.

Contingency plan


B.

Continuity of Operations plan


C.

Disaster recovery plan


D.

Business Continuity plan


Expert Solution
Questions # 90:

Which of the following components of configuration management involves periodic checks to determine the consistency and completeness of accounting information and to verify that all configuration management policies are being followed?

Options:

A.

Configuration Identification


B.

Configuration Auditing


C.

Configuration Control


D.

Configuration Status Accounting


Expert Solution
Viewing page 9 out of 11 pages
Viewing questions 81-90 out of questions