Month End Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CISSP Exam Dumps - ISC 2 Credentials Questions and Answers

Question # 19

In a data classification scheme, the data is owned by the

Options:

A.

system security managers

B.

business managers

C.

Information Technology (IT) managers

D.

end users

Buy Now
Question # 20

Which of the following is an initial consideration when developing an information security management system?

Options:

A.

Identify the contractual security obligations that apply to the organizations

B.

Understand the value of the information assets

C.

Identify the level of residual risk that is tolerable to management

D.

Identify relevant legislative and regulatory compliance requirements

Buy Now
Question # 21

Which of the following BEST describes the responsibilities of a data owner?

Options:

A.

Ensuring quality and validation through periodic audits for ongoing data integrity

B.

Maintaining fundamental data availability, including data storage and archiving

C.

Ensuring accessibility to appropriate users, maintaining appropriate levels of data security

D.

Determining the impact the information has on the mission of the organization

Buy Now
Question # 22

Which of the following is MOST important when assigning ownership of an asset to a department?

Options:

A.

The department should report to the business owner

B.

Ownership of the asset should be periodically reviewed

C.

Individual accountability should be ensured

D.

All members should be trained on their responsibilities

Buy Now
Question # 23

Which of the following is an effective control in preventing electronic cloning of Radio Frequency Identification (RFID) based access cards?

Options:

A.

Personal Identity Verification (PIV)

B.

Cardholder Unique Identifier (CHUID) authentication

C.

Physical Access Control System (PACS) repeated attempt detection

D.

Asymmetric Card Authentication Key (CAK) challenge-response

Buy Now
Question # 24

Which one of the following affects the classification of data?

Options:

A.

Assigned security label

B.

Multilevel Security (MLS) architecture

C.

Minimum query size

D.

Passage of time

Buy Now
Question # 25

When implementing a data classification program, why is it important to avoid too much granularity?

Options:

A.

The process will require too many resources

B.

It will be difficult to apply to both hardware and software

C.

It will be difficult to assign ownership to the data

D.

The process will be perceived as having value

Buy Now
Question # 26

Which type of security testing is being performed when an ethical hacker has no knowledge about the target system but the testing target is notified before the test?

Options:

A.

Reversal

B.

Gray box

C.

Blind

D.

White box

Buy Now
Question # 27

Which of the following is the final phase of the identity and access provisioning lifecycle?

Options:

A.

Recertification

B.

Revocation

C.

Removal

D.

Validation

Buy Now
Question # 28

Which Wide Area Network (WAN) technology requires the first router in the path to determine the full path the packet will travel, removing the need for other routers in the path to make independent determinations?

Options:

A.

Multiprotocol Label Switching (MPLS)

B.

Synchronous Optical Networking (SONET)

C.

Session Initiation Protocol (SIP)

D.

Fiber Channel Over Ethernet (FCoE)

Buy Now
Question # 29

Which of the following technologies can be used to monitor and dynamically respond to potential threats on web applications?

Options:

A.

Security Assertion Markup Language (SAML)

B.

Web application vulnerability scanners

C.

Runtime application self-protection (RASP)

D.

Field-level tokenization

Buy Now
Question # 30

Which of the following security tools will ensure authorized data is sent to the application when implementing a cloud based application?

Options:

A.

Host-based intrusion prevention system (HIPS)

B.

Access control list (ACL)

C.

File integrity monitoring (FIM)

D.

Data loss prevention (DLP)

Buy Now
Question # 31

Which application type is considered high risk and provides a common way for malware and viruses to enter a network?

Options:

A.

Instant messaging or chat applications

B.

E-mail applications

C.

Peer-to-Peer (P2P) file sharing applications

D.

End-to-end applications

Buy Now
Question # 32

A cloud service provider requires its customer organizations to enable maximum audit logging for its data storage service and to retain the logs for the period of three

months. The audit logging generates extremely high amount of logs. What is the MOST appropriate strategy for the log retention?

Options:

A.

Keep last week's logs in an online storage and the rest in a near-line storage.

B.

Keep all logs in an online storage.

C.

Keep all logs in an offline storage.

D.

Keep last week's logs in an online storage and the rest in an offline storage.

Buy Now
Question # 33

What is the FIRST step required in establishing a records retention program?

Options:

A.

Identify and inventory all records.

B.

Identify and inventory all records storage locations

C.

Classify records based on sensitivity.

D.

Draft a records retention policy.

Buy Now
Exam Code: CISSP
Exam Name: Certified Information Systems Security Professional (CISSP)
Last Update: Jan 31, 2025
Questions: 1486
CISSP pdf

CISSP PDF

$119.7  $399
CISSP Engine

CISSP Testing Engine

$134.7  $449
CISSP PDF + Engine

CISSP PDF + Testing Engine

$179.7  $599