Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISSP Exam Dumps - Certified Information Systems Security Professional (CISSP)

Go to page:
Question # 9

Which of the following does the Encapsulating Security Payload (ESP) provide?

A.

Authorization and integrity

B.

Availability and integrity

C.

Integrity and confidentiality

D.

Authorization and confidentiality

Full Access
Question # 10

A practice that permits the owner of a data object to grant other users access to that object would usually provide

A.

Mandatory Access Control (MAC).

B.

owner-administered control.

C.

owner-dependent access control.

D.

Discretionary Access Control (DAC).

Full Access
Question # 11

Which of the following elements MUST a compliant EU-US Safe Harbor Privacy Policy contain?

A.

An explanation of how long the data subject's collected information will be retained for and how it will be eventually disposed.

B.

An explanation of who can be contacted at the organization collecting the information if corrections are required by the data subject.

C.

An explanation of the regulatory frameworks and compliance standards the information collecting organization adheres to.

D.

An explanation of all the technologies employed by the collecting organization in gathering information on the data subject.

Full Access
Question # 12

In Business Continuity Planning (BCP), what is the importance of documenting business processes?

A.

Provides senior management with decision-making tools

B.

Establishes and adopts ongoing testing and maintenance strategies

C.

Defines who will perform which functions during a disaster or emergency

D.

Provides an understanding of the organization's interdependencies

Full Access
Question # 13

Which of the following is an authentication protocol in which a new random number is generated uniquely for each login session?

A.

Challenge Handshake Authentication Protocol (CHAP)

B.

Point-to-Point Protocol (PPP)

C.

Extensible Authentication Protocol (EAP)

D.

Password Authentication Protocol (PAP)

Full Access
Question # 14

A security professional has just completed their organization's Business Impact Analysis (BIA). Following Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) best practices, what would be the professional's NEXT step?

A.

Identify and select recovery strategies.

B.

Present the findings to management for funding.

C.

Select members for the organization's recovery teams.

D.

Prepare a plan to test the organization's ability to recover its operations.

Full Access
Question # 15

Which of the following is an attacker MOST likely to target to gain privileged access to a system?

A.

Programs that write to system resources

B.

Programs that write to user directories

C.

Log files containing sensitive information

D.

Log files containing system calls

Full Access
Question # 16

When designing a networked Information System (IS) where there will be several different types of individual access, what is the FIRST step that should be taken to ensure all access control requirements are addressed?

A.

Create a user profile.

B.

Create a user access matrix.

C.

Develop an Access Control List (ACL).

D.

Develop a Role Based Access Control (RBAC) list.

Full Access
Go to page: