Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISSP Exam Dumps - Certified Information Systems Security Professional (CISSP)

Go to page:
Question # 17

Which of the following is the MOST important consideration when storing and processing Personally Identifiable Information (PII)?

A.

Encrypt and hash all PII to avoid disclosure and tampering.

B.

Store PII for no more than one year.

C.

Avoid storing PII in a Cloud Service Provider.

D.

Adherence to collection limitation laws and regulations.

Full Access
Question # 18

An internal Service Level Agreement (SLA) covering security is signed by senior managers and is in place. When should compliance to the SLA be reviewed to ensure that a good security posture is being delivered?

A.

As part of the SLA renewal process

B.

Prior to a planned security audit

C.

Immediately after a security breach

D.

At regularly scheduled meetings

Full Access
Question # 19

Which of the following is a security limitation of File Transfer Protocol (FTP)?

A.

Passive FTP is not compatible with web browsers.

B.

Anonymous access is allowed.

C.

FTP uses Transmission Control Protocol (TCP) ports 20 and 21.

D.

Authentication is not encrypted.

Full Access
Question # 20

Why MUST a Kerberos server be well protected from unauthorized access?

A.

It contains the keys of all clients.

B.

It always operates at root privilege.

C.

It contains all the tickets for services.

D.

It contains the Internet Protocol (IP) address of all network entities.

Full Access
Question # 21

The process of mutual authentication involves a computer system authenticating a user and authenticating the

A.

user to the audit process.

B.

computer system to the user.

C.

user's access to all authorized objects.

D.

computer system to the audit process.

Full Access
Question # 22

Which layer of the Open Systems Interconnections (OSI) model implementation adds information concerning the logical connection between the sender and receiver?

A.

Physical

B.

Session

C.

Transport

D.

Data-Link

Full Access
Question # 23

In Disaster Recovery (DR) and business continuity training, which BEST describes a functional drill?

A.

A full-scale simulation of an emergency and the subsequent response functions

B.

A specific test by response teams of individual emergency response functions

C.

A functional evacuation of personnel

D.

An activation of the backup site

Full Access
Question # 24

Which of the following is the FIRST action that a system administrator should take when it is revealed during a penetration test that everyone in an organization has unauthorized access to a server holding sensitive data?

A.

Immediately document the finding and report to senior management.

B.

Use system privileges to alter the permissions to secure the server

C.

Continue the testing to its completion and then inform IT management

D.

Terminate the penetration test and pass the finding to the server management team

Full Access
Go to page: