Month End Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CISSP Exam Dumps - ISC 2 Credentials Questions and Answers

Question # 139

An application is used for funds transfer between an organization and a third-party. During a security audit, an issue with the business continuity/disaster recovery policy and procedures for this application. Which of the following reports should the audit file with the organization?

Options:

A.

Service Organization Control (SOC) 1

B.

Statement on Auditing Standards (SAS) 70

C.

Service Organization Control (SOC) 2

D.

Statement on Auditing Standards (SAS) 70-1

Buy Now
Question # 140

What is the PRIMARY objective for conducting an internal security audit?

Options:

A.

Verify that all systems and Standard Operating Procedures (SOP) are properly documented.

B.

Verify that all personnel supporting a system are knowledgeable of their responsibilities.

C.

Verify that security controls are established following best practices.

D.

Verify that applicable security controls are implemented and effective.

Buy Now
Question # 141

The Chief Information Officer (CIO) has decided that as part of business modernization efforts the organization will move towards a cloud architecture. All business-critical data will be migrated to either internal or external cloud services within the next two years. The CIO has a PRIMARY obligation to work with personnel in which role in order to ensure proper protection of data during and after the cloud migration?

Options:

A.

Information owner

B.

General Counsel

C.

Chief Information Security Officer (CISO)

D.

Chief Security Officer (CSO)

Buy Now
Question # 142

During a recent assessment an organization has discovered that the wireless signal can be detected outside the campus area. What logical control should be implemented in order to BFST protect One confidentiality of information traveling One wireless transmission media?

Options:

A.

Configure a firewall to logically separate the data at the boundary.

B.

Configure the Access Points (AP) to use Wi-Fi Protected Access 2 (WPA2) encryption.

C.

Disable the Service Set Identifier (SSID) broadcast on the Access Points (AP).

D.

Perform regular technical assessments on the Wireless Local Area Network (WLAN).

Buy Now
Question # 143

Which of the following is the BEST way to protect an organization's data assets?

Options:

A.

Monitor and enforce adherence to security policies.

B.

Encrypt data in transit and at rest using up-to-date cryptographic algorithms.

C.

Create the Demilitarized Zone (DMZ) with proxies, firewalls and hardened bastion hosts.

D.

Require Multi-Factor Authentication (MFA) and Separation of Duties (SoD).

Buy Now
Question # 144

A large human resources organization wants to integrate their identity management with a trusted partner organization. The human resources organization wants to maintain the creation and management of the identities and may want to share with other partners in the future. Which of the following options BEST serves their needs?

Options:

A.

Federated identity

B.

Cloud Active Directory (AD)

C.

Security Assertion Markup Language (SAML)

D.

Single sign-on (SSO)

Buy Now
Question # 145

A mobile device application that restricts the storage of user information to just that which is needed to accomplish lawful business goals adheres to what privacy principle?

Options:

A.

Onward transfer

B.

Collection Limitation

C.

Collector Accountability

D.

Individual Participation

Buy Now
Question # 146

During the Security Assessment and Authorization process, what is the PRIMARY purpose for conducting a hardware and software inventory?

Options:

A.

Calculate the value of assets being accredited.

B.

Create a list to include in the Security Assessment and Authorization package.

C.

Identify obsolete hardware and software.

D.

Define the boundaries of the information system.

Buy Now
Question # 147

A security architect plans to reference a Mandatory Access Control (MAC) model for implementation. This indicates that which of the following properties are being prioritized?

Options:

A.

Confidentiality

B.

Integrity

C.

Availability

D.

Accessibility

Buy Now
Question # 148

In configuration management, what baseline configuration information MUST be maintained for each computer system?

Options:

A.

Operating system and version, patch level, applications running, and versions.

B.

List of system changes, test reports, and change approvals

C.

Last vulnerability assessment report and initial risk assessment report

D.

Date of last update, test report, and accreditation certificate

Buy Now
Question # 149

When designing a vulnerability test, which one of the following is likely to give the BEST indication of what components currently operate on the network?

Options:

A.

Topology diagrams

B.

Mapping tools

C.

Asset register

D.

Ping testing

Buy Now
Question # 150

What is the MOST efficient way to secure a production program and its data?

Options:

A.

Disable default accounts and implement access control lists (ACL)

B.

Harden the application and encrypt the data

C.

Disable unused services and implement tunneling

D.

Harden the servers and backup the data

Buy Now
Question # 151

Which of the following roles has the obligation to ensure that a third party provider is capable of processing and handling data in a secure manner and meeting the standards set by the organization?

Options:

A.

Data Custodian

B.

Data Owner

C.

Data Creator

D.

Data User

Buy Now
Question # 152

Which of the following is the BEST approach to take in order to effectively incorporate the concepts of business continuity into the organization?

Options:

A.

Ensure end users are aware of the planning activities

B.

Validate all regulatory requirements are known and fully documented

C.

Develop training and awareness programs that involve all stakeholders

D.

Ensure plans do not violate the organization's cultural objectives and goals

Buy Now
Question # 153

What operations role is responsible for protecting the enterprise from corrupt or contaminated media?

Options:

A.

Information security practitioner

B.

Information librarian

C.

Computer operator

D.

Network administrator

Buy Now
Exam Code: CISSP
Exam Name: Certified Information Systems Security Professional (CISSP)
Last Update: Jan 31, 2025
Questions: 1486
CISSP pdf

CISSP PDF

$119.7  $399
CISSP Engine

CISSP Testing Engine

$134.7  $449
CISSP PDF + Engine

CISSP PDF + Testing Engine

$179.7  $599