Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISSP Exam Dumps - Certified Information Systems Security Professional (CISSP)

Go to page:
Question # 25

Which type of control recognizes that a transaction amount is excessive in accordance with corporate policy?

A.

Detection

B.

Prevention

C.

Investigation

D.

Correction

Full Access
Question # 26

Which of the following is a network intrusion detection technique?

A.

Statistical anomaly

B.

Perimeter intrusion

C.

Port scanning

D.

Network spoofing

Full Access
Question # 27

Which of the following methods protects Personally Identifiable Information (PII) by use of a full replacement of the data element?

A.

Transparent Database Encryption (TDE)

B.

Column level database encryption

C.

Volume encryption

D.

Data tokenization

Full Access
Question # 28

The three PRIMARY requirements for a penetration test are

A.

A defined goal, limited time period, and approval of management

B.

A general objective, unlimited time, and approval of the network administrator

C.

An objective statement, disclosed methodology, and fixed cost

D.

A stated objective, liability waiver, and disclosed methodology

Full Access
Question # 29

The Hardware Abstraction Layer (HAL) is implemented in the

A.

system software.

B.

system hardware.

C.

application software.

D.

network hardware.

Full Access
Question # 30

Passive Infrared Sensors (PIR) used in a non-climate controlled environment should

A.

reduce the detected object temperature in relation to the background temperature.

B.

increase the detected object temperature in relation to the background temperature.

C.

automatically compensate for variance in background temperature.

D.

detect objects of a specific temperature independent of the background temperature.

Full Access
Question # 31

The BEST way to check for good security programming practices, as well as auditing for possible backdoors, is to conduct

A.

log auditing.

B.

code reviews.

C.

impact assessments.

D.

static analysis.

Full Access
Question # 32

Which of the following is the PRIMARY risk with using open source software in a commercial software construction?

A.

Lack of software documentation

B.

License agreements requiring release of modified code

C.

Expiration of the license agreement

D.

Costs associated with support of the software

Full Access
Go to page: