New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISSP Exam Dumps - Certified Information Systems Security Professional (CISSP)

Go to page:
Question # 153

A control to protect from a Denial-of-Service (DoS) attach has been determined to stop 50% of attacks, and additionally reduces the impact of an attack by 50%. What is the residual risk?

A.

25%

B.

50%

C.

75%

D.

100%

Full Access
Question # 154

Which of the following is the MOST important part of an awareness and training plan to prepare employees for emergency situations?

A.

Having emergency contacts established for the general employee population to get information

B.

Conducting business continuity and disaster recovery training for those who have a direct role in the recovery

C.

Designing business continuity and disaster recovery training programs for different audiences

D.

Publishing a corporate business continuity and disaster recovery plan on the corporate website

Full Access
Question # 155

Which of the following is the MOST appropriate action when reusing media that contains sensitive data?

A.

Erase

B.

Sanitize

C.

Encrypt

D.

Degauss

Full Access
Question # 156

Due to system constraints, a group of system administrators must share a high-level access set of credentials.

Which of the following would be MOST appropriate to implement?

A.

Increased console lockout times for failed logon attempts

B.

Reduce the group in size

C.

A credential check-out process for a per-use basis

D.

Full logging on affected systems

Full Access
Question # 157

The security accreditation task of the System Development Life Cycle (SDLC) process is completed at the end of which phase?

A.

System acquisition and development

B.

System operations and maintenance

C.

System initiation

D.

System implementation

Full Access
Question # 158

Unused space in a disk cluster is important in media analysis because it may contain which of the following?

A.

Residual data that has not been overwritten

B.

Hidden viruses and Trojan horses

C.

Information about the File Allocation table (FAT)

D.

Information about patches and upgrades to the system

Full Access
Question # 159

A Denial of Service (DoS) attack on a syslog server exploits weakness in which of the following protocols?

A.

Point-to-Point Protocol (PPP) and Internet Control Message Protocol (ICMP)

B.

Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)

C.

Address Resolution Protocol (ARP) and Reverse Address Resolution Protocol (RARP)

D.

Transport Layer Security (TLS) and Secure Sockets Layer (SSL)

Full Access
Question # 160

Which of the following provides the MOST comprehensive filtering of Peer-to-Peer (P2P) traffic?

A.

Application proxy

B.

Port filter

C.

Network boundary router

D.

Access layer switch

Full Access
Go to page: