Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISSP Exam Dumps - Certified Information Systems Security Professional (CISSP)

Go to page:
Question # 137

What method could be used to prevent passive attacks against secure voice communications between an organization and its vendor?

A.

Encryption in transit

B.

Configure a virtual private network (VPN)

C.

Configure a dedicated connection

D.

Encryption at rest

Full Access
Question # 138

As a design principle, which one of the following actors is responsible for identifying and approving data security requirements in a cloud ecosystem?

A.

Cloud broker

B.

Cloud provider

C.

Cloud consumer

D.

Cloud auditor

Full Access
Question # 139

Which of the following is the PRIMARY goal of logical access controls?

A.

Restrict access to an information asset.

B.

Ensure integrity of an information asset.

C.

Restrict physical access to an information asset.

D.

Ensure availability of an information asset.

Full Access
Question # 140

Which of the following is MOST important when determining appropriate countermeasures for an identified risk?

A.

Interaction with existing controls

B.

Cost

C.

Organizational risk tolerance

D.

Patch availability

Full Access
Question # 141

Which of the following is a common feature of an Identity as a Service (IDaaS) solution?

A.

Single Sign-On (SSO) authentication support

B.

Privileged user authentication support

C.

Password reset service support

D.

Terminal Access Controller Access Control System (TACACS) authentication support

Full Access
Question # 142

When conducting a security assessment of access controls, which activity is part of the data analysis phase?

A.

Present solutions to address audit exceptions.

B.

Conduct statistical sampling of data transactions.

C.

Categorize and identify evidence gathered during the audit.

D.

Collect logs and reports.

Full Access
Question # 143

Which of the following is a characteristic of an internal audit?

A.

An internal audit is typically shorter in duration than an external audit.

B.

The internal audit schedule is published to the organization well in advance.

C.

The internal auditor reports to the Information Technology (IT) department

D.

Management is responsible for reading and acting upon the internal audit results

Full Access
Question # 144

A Security Operations Center (SOC) receives an incident response notification on a server with an active

intruder who has planted a backdoor. Initial notifications are sent and communications are established.

What MUST be considered or evaluated before performing the next step?

A.

Notifying law enforcement is crucial before hashing the contents of the server hard drive

B.

Identifying who executed the incident is more important than how the incident happened

C.

Removing the server from the network may prevent catching the intruder

D.

Copying the contents of the hard drive to another storage device may damage the evidence

Full Access
Go to page: