Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISSP Exam Dumps - Certified Information Systems Security Professional (CISSP)

Go to page:
Question # 57

What does the Maximum Tolerable Downtime (MTD) determine?

A.

The estimated period of time a business critical database can remain down before customers are affected.

B.

The fixed length of time a company can endure a disaster without any Disaster Recovery (DR) planning

C.

The estimated period of time a business can remain interrupted beyond which it risks never recovering

D.

The fixed length of time in a DR process before redundant systems are engaged

Full Access
Question # 58

Which of the following information MUST be provided for user account provisioning?

A.

Full name

B.

Unique identifier

C.

Security question

D.

Date of birth

Full Access
Question # 59

What security risk does the role-based access approach mitigate MOST effectively?

A.

Excessive access rights to systems and data

B.

Segregation of duties conflicts within business applications

C.

Lack of system administrator activity monitoring

D.

Inappropriate access requests

Full Access
Question # 60

Which of the following is most helpful in applying the principle of LEAST privilege?

A.

Establishing a sandboxing environment

B.

Setting up a Virtual Private Network (VPN) tunnel

C.

Monitoring and reviewing privileged sessions

D.

Introducing a job rotation program

Full Access
Question # 61

Which of the following sets of controls should allow an investigation if an attack is not blocked by preventive controls or detected by monitoring?

A.

Logging and audit trail controls to enable forensic analysis

B.

Security incident response lessons learned procedures

C.

Security event alert triage done by analysts using a Security Information and Event Management (SIEM) system

D.

Transactional controls focused on fraud prevention

Full Access
Question # 62

When writing security assessment procedures, what is the MAIN purpose of the test outputs and reports?

A.

To force the software to fail and document the process

B.

To find areas of compromise in confidentiality and integrity

C.

To allow for objective pass or fail decisions

D.

To identify malware or hidden code within the test results

Full Access
Question # 63

What is the difference between media marking and media labeling?

A.

Media marking refers to the use of human-readable security attributes, while media labeling refers to the use of security attributes in internal data structures.

B.

Media labeling refers to the use of human-readable security attributes, while media marking refers to the use of security attributes in internal data structures.

C.

Media labeling refers to security attributes required by public policy/law, while media marking refers to security required by internal organizational policy.

D.

Media marking refers to security attributes required by public policy/law, while media labeling refers to security attributes required by internal organizational policy.

Full Access
Question # 64

When building a data classification scheme, which of the following is the PRIMARY concern?

A.

Purpose

B.

Cost effectiveness

C.

Availability

D.

Authenticity

Full Access
Go to page: