Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISSP Exam Dumps - Certified Information Systems Security Professional (CISSP)

Go to page:
Question # 129

With what frequency should monitoring of a control occur when implementing Information Security Continuous Monitoring (ISCM) solutions?

A.

Continuously without exception for all security controls

B.

Before and after each change of the control

C.

At a rate concurrent with the volatility of the security control

D.

Only during system implementation and decommissioning

Full Access
Question # 130

An organization is found lacking the ability to properly establish performance indicators for its Web hosting solution during an audit. What would be the MOST probable cause?

A.

Absence of a Business Intelligence (BI) solution

B.

Inadequate cost modeling

C.

Improper deployment of the Service-Oriented Architecture (SOA)

D.

Insufficient Service Level Agreement (SLA)

Full Access
Question # 131

Which of the following is a PRIMARY advantage of using a third-party identity service?

A.

Consolidation of multiple providers

B.

Directory synchronization

C.

Web based logon

D.

Automated account management

Full Access
Question # 132

When should an application invoke re-authentication in addition to initial user authentication?

A.

At the application sign-off

B.

Periodically during a session

C.

After a period of inactivity

D.

For each business process

Full Access
Question # 133

Which of the following System and Organization Controls (SOC) report types should an organization request if they require a period of time report covering security and availability for a particular system?

A.

SOC 1 Type1

B.

SOC 1Type2

C.

SOC 2 Type 1

D.

SOC 2 Type 2

Full Access
Question # 134

Vulnerability scanners may allow for the administrator to assign which of the following in order to assist in prioritizing remediation activities?

A.

Definitions for each exposure type

B.

Vulnerability attack vectors

C.

Asset values for networks

D.

Exploit code metrics

Full Access
Question # 135

Which layer handle packet fragmentation and reassembly in the Open system interconnection (OSI) Reference model?

A.

Session

B.

Transport

C.

Data Link

D.

Network

Full Access
Question # 136

A cloud service provider requires its customer organizations to enable maximum audit logging for its data storage service and to retain the logs for the period of three

months. The audit logging generates extremely high amount of logs. What is the MOST appropriate strategy for the log retention?

A.

Keep last week's logs in an online storage and the rest in a near-line storage.

B.

Keep all logs in an online storage.

C.

Keep all logs in an offline storage.

D.

Keep last week's logs in an online storage and the rest in an offline storage.

Full Access
Go to page: