Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

ISC 2 Credentials CISSP Full Course Free

Page: 33 / 45
Question 132

An attacker is able to remain indefinitely logged into a exploiting to remain on the web service?

Options:

A.

Alert management

B.

Password management

C.

Session management

D.

Identity management (IM)

Question 133

Which of the following threats would be MOST likely mitigated by monitoring assets containing open source libraries for vulnerabilities?

Options:

A.

Distributed denial-of-service (DDoS) attack

B.

Zero-day attack

C.

Phishing attempt

D.

Advanced persistent threat (APT) attempt

Question 134

What is the FIRST step required in establishing a records retention program?

Options:

A.

Identify and inventory all records.

B.

Identify and inventory all records storage locations

C.

Classify records based on sensitivity.

D.

Draft a records retention policy.

Question 135

A cloud service provider requires its customer organizations to enable maximum audit logging for its data storage service and to retain the logs for the period of three

months. The audit logging generates extremely high amount of logs. What is the MOST appropriate strategy for the log retention?

Options:

A.

Keep last week's logs in an online storage and the rest in a near-line storage.

B.

Keep all logs in an online storage.

C.

Keep all logs in an offline storage.

D.

Keep last week's logs in an online storage and the rest in an offline storage.

Page: 33 / 45
Exam Code: CISSP
Exam Name: Certified Information Systems Security Professional (CISSP)
Last Update: Nov 21, 2024
Questions: 1486
CISSP pdf

CISSP PDF

$139.65  $399
CISSP Engine

CISSP Testing Engine

$157.15  $449
CISSP PDF + Engine

CISSP PDF + Testing Engine

$209.65  $599