Pass the ISC CISSP Concentrations ISSMP Questions and answers with CertsForce

Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions
Questions # 41:

Which of the following governance bodies provides management, operational and technical controls to satisfy security requirements?

Options:

A.

Senior Management


B.

Business Unit Manager


C.

Information Security Steering Committee


D.

Chief Information Security Officer


Expert Solution
Questions # 42:

Which of the following is the correct order of digital investigations Standard Operating Procedure (SOP)?

Options:

A.

Initial analysis, request for service, data collection, data reporting, data analysis


B.

Initial analysis, request for service, data collection, data analysis, data reporting


C.

Request for service, initial analysis, data collection, data analysis, data reporting


D.

Request for service, initial analysis, data collection, data reporting, data analysis


Expert Solution
Questions # 43:

Which of the following security issues does the Bell-La Padula model focus on?

Options:

A.

Authentication


B.

Confidentiality


C.

Integrity


D.

Authorization


Expert Solution
Questions # 44:

Which of the following issues are addressed by the change control phase in the maintenance phase of the life cycle models? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Performing quality control


B.

Recreating and analyzing the problem


C.

Developing the changes and corresponding tests


D.

Establishing the priorities of requests


Expert Solution
Questions # 45:

Which of the following signatures watches for the connection attempts to well-known, frequently attacked ports?

Options:

A.

Port signatures


B.

Digital signatures


C.

Header condition signatures


D.

String signatures


Expert Solution
Questions # 46:

Which of the following is a documentation of guidelines that computer forensics experts use to handle evidences?

Options:

A.

Evidence access policy


B.

Incident responsepolicy


C.

Chain of custody


D.

Chain of evidence


Expert Solution
Questions # 47:

You work as a Web Administrator for Perfect World Inc. The company is planning to host an E-commerce Web site. You are required to design a security plan for it. Client computers with different operating systems will access the Web server. How will you configure the Web server so that it is secure and only authenticated users are able to access it? Each correct answer represents a part of the solution. Choose two.

Options:

A.

Use encrypted authentication.


B.

Use the SSL protocol.


C.

Use the EAP protocol.


D.

Use Basic authentication.


Expert Solution
Questions # 48:

An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?

Options:

A.

Network security policy


B.

Backup policy


C.

Privacy policy


D.

User password policy


Expert Solution
Questions # 49:

Which of the following is the process performed between organizations that have unique hardware or software that cannot be maintained at a hot or warm site?

Options:

A.

Cold sites arrangement


B.

Business impact analysis


C.

Duplicate processing facilities


D.

Reciprocal agreements


Expert Solution
Questions # 50:

Fill in the blank with an appropriate phrase. _______is a branch of forensic science pertaining to legal evidence found in computers and digital storage media.

Options:

A.

Computer forensics


Expert Solution
Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions