Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISSP Exam Dumps - Certified Information Systems Security Professional (CISSP)

Go to page:
Question # 97

Refer to the information below to answer the question.

A new employee is given a laptop computer with full administrator access. This employee does not have a personal computer at home and has a child that uses the computer to send and receive e-mail, search the web, and use instant messaging. The organization’s Information Technology (IT) department discovers that a peer-to-peer program has been installed on the computer using the employee's access.

Which of the following solutions would have MOST likely detected the use of peer-to-peer programs when the computer was connected to the office network?

A.

Anti-virus software

B.

Intrusion Prevention System (IPS)

C.

Anti-spyware software

D.

Integrity checking software

Full Access
Question # 98

Refer to the information below to answer the question.

A new employee is given a laptop computer with full administrator access. This employee does not have a personal computer at home and has a child that uses the computer to send and receive e-mail, search the web, and use instant messaging. The organization’s Information Technology (IT) department discovers that a peer-to-peer program has been installed on the computer using the employee's access.

Which of the following documents explains the proper use of the organization's assets?

A.

Human resources policy

B.

Acceptable use policy

C.

Code of ethics

D.

Access control policy

Full Access
Question # 99

Refer to the information below to answer the question.

A large organization uses unique identifiers and requires them at the start of every system session. Application access is based on job classification. The organization is subject to periodic independent reviews of access controls and violations. The organization uses wired and wireless networks and remote access. The organization also uses secure connections to branch offices and secure backup and recovery strategies for selected information and processes.

What MUST the access control logs contain in addition to the identifier?

A.

Time of the access

B.

Security classification

C.

Denied access attempts

D.

Associated clearance

Full Access
Question # 100

Which of the following is required to determine classification and ownership?

A.

System and data resources are properly identified

B.

Access violations are logged and audited

C.

Data file references are identified and linked

D.

System security controls are fully integrated

Full Access
Question # 101

Which of the following is the MAIN goal of a data retention policy?

A.

Ensure that data is destroyed properly.

B.

Ensure that data recovery can be done on the datA.

C.

Ensure the integrity and availability of data for a predetermined amount of time.

D.

Ensure the integrity and confidentiality of data for a predetermined amount of time.

Full Access
Question # 102

Which of the following describes the concept of a Single Sign -On (SSO) system?

A.

Users are authenticated to one system at a time.

B.

Users are identified to multiple systems with several credentials.

C.

Users are authenticated to multiple systems with one login.

D.

Only one user is using the system at a time.

Full Access
Question # 103

A business has implemented Payment Card Industry Data Security Standard (PCI-DSS) compliant handheld credit card processing on their Wireless Local Area Network (WLAN) topology. The network team partitioned the WLAN to create a private segment for credit card processing using a firewall to control device access and route traffic to the card processor on the Internet. What components are in the scope of PCI-DSS?

A.

The entire enterprise network infrastructure.

B.

The handheld devices, wireless access points and border gateway.

C.

The end devices, wireless access points, WLAN, switches, management console, and firewall.

D.

The end devices, wireless access points, WLAN, switches, management console, and Internet

Full Access
Question # 104

Which of the following secure startup mechanisms are PRIMARILY designed to thwart attacks?

A.

Timing

B.

Cold boot

C.

Side channel

D.

Acoustic cryptanalysis

Full Access
Go to page: