Pass the ISC CISSP Concentrations ISSMP Questions and answers with CertsForce

Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which of the following are examples of physical controls used to prevent unauthorized access to sensitive materials?

Options:

A.

Thermal alarm systems


B.

Closed circuit cameras


C.

Encryption


D.

Security Guards


Expert Solution
Questions # 12:

Which of the following architecturally related vulnerabilities is a hardware or software mechanism, which was installed to permit system maintenance and to bypass the system's security protections?

Options:

A.

Maintenance hook


B.

Lack of parameter checking


C.

Time of Check to Time of Use (TOC/TOU) attack


D.

Covert channel


Expert Solution
Questions # 13:

NIST Special Publication 800-50 is a security awareness program. It is designed for those people who are currently working in the information technology field and want information on security policies. Which of the following are some of its critical steps? Each correct answer represents a complete solution. Choose two.

Options:

A.

Awareness and Training Material Effectiveness


B.

Awareness and Training Material Development


C.

Awareness and Training Material Implementation


D.

Awareness and Training Program Design


Expert Solution
Questions # 14:

Which of the following security models focuses on data confidentiality and controlled access to classified information?

Options:

A.

Bell-La Padula model


B.

Take-Grant model


C.

Clark-Wilson model


D.

Biba model


Expert Solution
Questions # 15:

Eric is the project manager of the NQQ Project and has hired the ZAS Corporation to complete part of the project work for Eric's organization. Due to a change request the ZAS Corporation is no longer needed on the project even though they have completed nearly all of the project work. Is Eric's organization liable to pay the ZAS Corporation for the work they have completed so far on the project?

Options:

A.

Yes, the ZAS Corporation did not choose to terminate the contract work.


B.

It depends on what the outcome of a lawsuit will determine.


C.

It dependson what the termination clause of the contract stipulates.


D.

No, the ZAS Corporation did not complete all of the work.


Expert Solution
Questions # 16:

Which of the following tools works by using standard set of MS-DOS commands and can create an MD5 hash of an entire drive, partition, or selected files?

Options:

A.

Device Seizure


B.

Ontrack


C.

DriveSpy


D.

Forensic Sorter


Expert Solution
Questions # 17:

Which of the following is used to back up forensic evidences or data folders from the network or locally attached hard disk drives?

Options:

A.

WinHex


B.

Vedit


C.

Device Seizure


D.

FAR system


Expert Solution
Questions # 18:

Which of the following options is an approach to restricting system access to authorized users?

Options:

A.

DAC


B.

MIC


C.

RBAC


D.

MAC


Expert Solution
Questions # 19:

A Web-based credit card company had collected financial and personal details of Mark before issuing him a credit card. The company has now provided Mark's financial and personal details to another company. Which of the following Internet laws has the credit card issuing company violated?

Options:

A.

Copyright law


B.

Trademark law


C.

Privacy law


D.

Security law


Expert Solution
Questions # 20:

The goal of Change Management is to ensure that standardized methods and procedures are used for efficient handling of all changes. Which of the following are Change Management terminologies? Each correct answer represents a part of the solution. Choose three.

Options:

A.

Request for Change


B.

Service Request Management


C.

Change


D.

Forward Schedule of Changes


Expert Solution
Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions