Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISSP Exam Dumps - Certified Information Systems Security Professional (CISSP)

Go to page:
Question # 161

Which of the following alarm systems is recommended to detect intrusions through windows in a high-noise, occupied environment?

A.

Acoustic sensor

B.

Motion sensor

C.

Shock sensor

D.

Photoelectric sensor

Full Access
Question # 162

“Stateful” differs from “Static” packet filtering firewalls by being aware of which of the following?

A.

Difference between a new and an established connection

B.

Originating network location

C.

Difference between a malicious and a benign packet payload

D.

Originating application session

Full Access
Question # 163

What does electronic vaulting accomplish?

A.

It protects critical files.

B.

It ensures the fault tolerance of Redundant Array of Independent Disks (RAID) systems

C.

It stripes all database records

D.

It automates the Disaster Recovery Process (DRP)

Full Access
Question # 164

Even though a particular digital watermark is difficult to detect, which of the following represents a way it might still be inadvertently removed?

A.

Truncating parts of the data

B.

Applying Access Control Lists (ACL) to the data

C.

Appending non-watermarked data to watermarked data

D.

Storing the data in a database

Full Access
Question # 165

Mandatory Access Controls (MAC) are based on:

A.

security classification and security clearance

B.

data segmentation and data classification

C.

data labels and user access permissions

D.

user roles and data encryption

Full Access
Question # 166

What is the expected outcome of security awareness in support of a security awareness program?

A.

Awareness activities should be used to focus on security concerns and respond to those concerns

accordingly

B.

Awareness is not an activity or part of the training but rather a state of persistence to support the program

C.

Awareness is training. The purpose of awareness presentations is to broaden attention of security.

D.

Awareness is not training. The purpose of awareness presentation is simply to focus attention on security.

Full Access
Question # 167

Attack trees are MOST useful for which of the following?

A.

Determining system security scopes

B.

Generating attack libraries

C.

Enumerating threats

D.

Evaluating Denial of Service (DoS) attacks

Full Access
Question # 168

Which factors MUST be considered when classifying information and supporting assets for risk management, legal discovery, and compliance?

A.

System owner roles and responsibilities, data handling standards, storage and secure development lifecycle requirements

B.

Data stewardship roles, data handling and storage standards, data lifecycle requirements

C.

Compliance office roles and responsibilities, classified material handling standards, storage system lifecycle requirements

D.

System authorization roles and responsibilities, cloud computing standards, lifecycle requirements

Full Access
Go to page: