Cissp 3
Cissp 3
Cissp 3
CISSP Dumps
https://www.certleader.com/CISSP-dumps.html
NEW QUESTION 1
- (Exam Topic 1)
A company whose Information Technology (IT) services are being delivered from a Tier 4 data center, is preparing a companywide Business Continuity Planning
(BCP). Which of the following failures should the IT manager be concerned with?
A. Application
B. Storage
C. Power
D. Network
Answer: C
NEW QUESTION 2
- (Exam Topic 1)
What is the MOST important consideration from a data security perspective when an organization plans to relocate?
A. Ensure the fire prevention and detection systems are sufficient to protect personnel
B. Review the architectural plans to determine how many emergency exits are present
C. Conduct a gap analysis of a new facilities against existing security requirements
D. Revise the Disaster Recovery and Business Continuity (DR/BC) plan
Answer: C
NEW QUESTION 3
- (Exam Topic 2)
Which of the following is an initial consideration when developing an information security management system?
Answer: B
NEW QUESTION 4
- (Exam Topic 2)
Which of the following is an effective control in preventing electronic cloning of Radio Frequency Identification (RFID) based access cards?
Answer: C
NEW QUESTION 5
- (Exam Topic 2)
An organization has doubled in size due to a rapid market share increase. The size of the Information Technology (IT) staff has maintained pace with this growth.
The organization hires several contractors whose onsite time is limited. The IT department has pushed its limits building servers and rolling out workstations and
has a backlog of account management requests.
Which contract is BEST in offloading the task from the IT staff?
Answer: B
NEW QUESTION 6
- (Exam Topic 3)
Who in the organization is accountable for classification of data information assets?
A. Data owner
B. Data architect
C. Chief Information Security Officer (CISO)
D. Chief Information Officer (CIO)
Answer: A
NEW QUESTION 7
- (Exam Topic 3)
What is the second phase of Public Key Infrastructure (PKI) key/certificate life-cycle management?
A. Implementation Phase
B. Initialization Phase
C. Cancellation Phase
D. Issued Phase
Answer: D
NEW QUESTION 8
- (Exam Topic 4)
Which of the following operates at the Network Layer of the Open System Interconnection (OSI) model?
A. Packet filtering
B. Port services filtering
C. Content filtering
D. Application access control
Answer: A
NEW QUESTION 9
- (Exam Topic 4)
Which of the following is used by the Point-to-Point Protocol (PPP) to determine packet formats?
Answer: B
NEW QUESTION 10
- (Exam Topic 4)
Which of the following is the BEST network defense against unknown types of attacks or stealth attacks in progress?
Answer: D
NEW QUESTION 10
- (Exam Topic 4)
At what level of the Open System Interconnection (OSI) model is data at rest on a Storage Area Network (SAN) located?
A. Link layer
B. Physical layer
C. Session layer
D. Application layer
Answer: D
NEW QUESTION 15
- (Exam Topic 5)
A manufacturing organization wants to establish a Federated Identity Management (FIM) system with its 20 different supplier companies. Which of the following is
the BEST solution for the manufacturing organization?
Answer: C
NEW QUESTION 16
- (Exam Topic 5)
What is the BEST approach for controlling access to highly sensitive information when employees have the same level of security clearance?
A. Audit logs
B. Role-Based Access Control (RBAC)
C. Two-factor authentication
D. Application of least privilege
Answer: B
NEW QUESTION 20
- (Exam Topic 6)
Which of the following is of GREATEST assistance to auditors when reviewing system configurations?
Answer: A
NEW QUESTION 21
- (Exam Topic 7)
What is the MOST important step during forensic analysis when trying to learn the purpose of an unknown application?
Answer: D
NEW QUESTION 23
- (Exam Topic 7)
A continuous information security monitoring program can BEST reduce risk through which of the following?
Answer: B
NEW QUESTION 28
- (Exam Topic 7)
Which of the following types of business continuity tests includes assessment of resilience to internal and external risks without endangering live operations?
A. Walkthrough
B. Simulation
C. Parallel
D. White box
Answer: B
NEW QUESTION 31
- (Exam Topic 7)
What should be the FIRST action to protect the chain of evidence when a desktop computer is involved?
Answer: C
NEW QUESTION 32
- (Exam Topic 8)
Which of the following is a web application control that should be put into place to prevent exploitation of Operating System (OS) bugs?
Answer: B
NEW QUESTION 33
- (Exam Topic 8)
What is the BEST approach to addressing security issues in legacy web applications?
Answer: D
NEW QUESTION 34
- (Exam Topic 8)
A Java program is being developed to read a file from computer A and write it to computer B, using a third computer C. The program is not working as expected.
What is the MOST probable security feature of Java preventing the program from operating as intended?
A. Least privilege
B. Privilege escalation
C. Defense in depth
D. Privilege bracketing
Answer: A
NEW QUESTION 36
- (Exam Topic 8)
The configuration management and control task of the certification and accreditation process is incorporated in which phase of the System Development Life Cycle
(SDLC)?
Answer: A
Explanation:
Reference https://online.concordiA.edu/computer-science/system-development-life-cycle-phases/
NEW QUESTION 41
- (Exam Topic 9)
What is the FIRST step in developing a security test and its evaluation?
Answer: C
NEW QUESTION 46
- (Exam Topic 9)
Internet Protocol (IP) source address spoofing is used to defeat
A. address-based authentication.
B. Address Resolution Protocol (ARP).
C. Reverse Address Resolution Protocol (RARP).
D. Transmission Control Protocol (TCP) hijacking.
Answer: A
NEW QUESTION 47
- (Exam Topic 9)
Which of the following is the FIRST action that a system administrator should take when it is revealed during a penetration test that everyone in an organization
has unauthorized access to a server holding sensitive data?
Answer: A
NEW QUESTION 52
- (Exam Topic 9)
Which of the following is a limitation of the Common Vulnerability Scoring System (CVSS) as it relates to conducting code review?
Answer: C
NEW QUESTION 54
- (Exam Topic 9)
Which one of the following is a threat related to the use of web-based client side input validation?
A. Users would be able to alter the input after validation has occurred
B. The web server would not be able to validate the input after transmission
C. The client system could receive invalid input from the web server
D. The web server would not be able to receive invalid input from the client
Answer: A
NEW QUESTION 59
- (Exam Topic 9)
An organization allows ping traffic into and out of their network. An attacker has installed a program on the network that uses the payload portion of the ping packet
to move data into and out of the network. What type of attack has the organization experienced?
A. Data leakage
B. Unfiltered channel
C. Data emanation
D. Covert channel
Answer: D
NEW QUESTION 63
- (Exam Topic 9)
Contingency plan exercises are intended to do which of the following?
Answer: A
NEW QUESTION 66
- (Exam Topic 9)
In the area of disaster planning and recovery, what strategy entails the presentation of information about the plan?
A. Communication
B. Planning
C. Recovery
D. Escalation
Answer: A
NEW QUESTION 70
- (Exam Topic 9)
Which one of the following transmission media is MOST effective in preventing data interception?
A. Microwave
B. Twisted-pair
C. Fiber optic
D. Coaxial cable
Answer: C
NEW QUESTION 74
- (Exam Topic 9)
What is the term commonly used to refer to a technique of authenticating one machine to another by forging packets from a trusted source?
Answer: D
NEW QUESTION 76
- (Exam Topic 9)
Checking routing information on e-mail to determine it is in a valid format and contains valid information is an example of which of the following anti-spam
approaches?
Answer: D
NEW QUESTION 77
- (Exam Topic 9)
Answer: A
NEW QUESTION 81
- (Exam Topic 9)
Which of the following is considered best practice for preventing e-mail spoofing?
A. Spam filtering
B. Cryptographic signature
C. Uniform Resource Locator (URL) filtering
D. Reverse Domain Name Service (DNS) lookup
Answer: B
NEW QUESTION 83
- (Exam Topic 9)
Multi-threaded applications are more at risk than single-threaded applications to
A. race conditions.
B. virus infection.
C. packet sniffing.
D. database injection.
Answer: A
NEW QUESTION 87
- (Exam Topic 9)
The BEST method of demonstrating a company's security level to potential customers is
Answer: A
NEW QUESTION 92
- (Exam Topic 9)
Which of the following does the Encapsulating Security Payload (ESP) provide?
Answer: C
NEW QUESTION 93
- (Exam Topic 9)
Which of the following is an essential element of a privileged identity lifecycle management?
Answer: A
NEW QUESTION 95
- (Exam Topic 9)
Which of the following statements is TRUE for point-to-point microwave transmissions?
Answer: D
- (Exam Topic 9)
Which of the following is the MAIN reason that system re-certification and re-accreditation are needed?
Answer: C
A. log auditing.
B. code reviews.
C. impact assessments.
D. static analysis.
Answer: B
Answer: C
A. system software.
B. system hardware.
C. application software.
D. network hardware.
Answer: A
Answer: C
A. Exceed the threshold limit of the connection queue for a given service
B. Set the threshold to zero for a given service
C. Cause the buffer to overflow, allowing root access
D. Flush the register stack, allowing hijacking of the root account
Answer: A
Answer: B
Answer: B
Answer: C
Answer: B
A. Encryption routines
B. Random number generator
C. Obfuscated code
D. Botnet command and control
Answer: C
Answer: D
Answer: C
Answer: D
A. Topology diagrams
B. Mapping tools
C. Asset register
D. Ping testing
Answer: B
A. flexible.
B. confidential.
C. focused.
D. achievable.
Answer: D
A. Show the need for security; identify the message and the audience
B. Ensure that the security presentation is designed to be all-inclusive
C. Notify them that their compliance is mandatory
D. Explain how hackers have enhanced information security
Answer: A
A. encrypt the contents of the repository and document any exceptions to that requirement.
B. utilize Intrusion Detection System (IDS) set drop connections if too many requests for documents are detected.
C. keep individuals with access to high security areas from saving those documents into lower security areas.
D. require individuals with access to the system to sign Non-Disclosure Agreements (NDA).
Answer: C
Answer: C
Answer: C
A. Disassembly, analysis, or reverse engineering will reveal the security functionality of the computer system.
B. Algorithms must be protected to ensure the security and interoperability of the designed system.
C. A knowledgeable user should have limited privileges on the system to prevent their ability to compromise security capabilities.
D. The security of a mechanism should not depend on the secrecy of its design or implementation.
Answer: D
Answer: A
A. Hot site
B. Cold site
C. Warm site
D. Mobile site
Answer: B
Answer: B
Answer: B
A. Non-repudiation
B. Traceability
C. Anonymity
D. Resilience
Answer: C
A. User accounts
B. System accounts
C. Generic accounts
D. Privileged accounts
Answer: C
Answer: C
Answer: C
Answer: A
Answer: D
A. 802.11i
B. Kerberos
C. Lightweight Directory Access Protocol (LDAP)
D. Security Assertion Markup Language (SAML)
Answer: D
Answer: C
Answer: A
A. processes that are identical to that of the organization doing the outsourcing.
B. access to the original personnel that were on staff at the organization.
C. the ability to maintain all of the applications in languages they are familiar with.
D. access to the skill sets consistent with the programming languages used by the organization.
Answer: D
Answer: B
A. Executive sponsorship
B. Information security sponsorship
C. End-user acceptance
D. Internal audit acceptance
Answer: A
Answer: D
Answer: A
A. Least privilege
B. Lattice Based Access Control (LBAC)
C. Role Based Access Control (RBAC)
D. Lightweight Directory Access Control (LDAP)
Answer: C
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A. Provide students with Internet Protocol Security (IPSec) Virtual Private Network (VPN) client software.
B. Use Secure Sockets Layer (SSL) VPN technology.
C. Use Secure Shell (SSH) with public/private keys.
D. Require students to purchase home router capable of VPN.
Answer: B
After magnetic drives were degaussed twice according to the product manufacturer's directions, what is the MOST LIKELY security issue with degaussing?
A. Commercial products often have serious weaknesses of the magnetic force available in the degausser product.
B. Degausser products may not be properly maintained and operated.
C. The inability to turn the drive around in the chamber for the second pass due to human error.
D. Inadequate record keeping when sanitizing mediA.
Answer: B
A. Hash functions
B. Data segregation
C. File system permissions
D. Non-repudiation controls
Answer: B
Answer: D
A. application dismissal.
B. business procedures.
C. digital certificates expiration.
D. regulatory compliance.
Answer: D
A. The organizational structure of the third party and how it may impact timelines within the organization
B. The ability of the third party to respond to the organization in a timely manner and with accurate information
C. The effects of transborder data flows and customer expectations regarding the storage or processing of their data
D. The quantity of data that must be provided to the third party and how it is to be used
Answer: C
Answer: B
Answer: D
A. Hierarchical inheritance
B. Dynamic separation of duties
C. The Clark-Wilson security model
D. The Bell-LaPadula security model
Answer: B
A. Negative testing
B. White box testing
C. Penetration testing
D. Black box testing
Answer: B
A. The remaining photons left in a fiber optic cable after a secure transmission.
B. The retention period required by law or regulation.
C. The magnetic flux created when removing the network connection from a server or personal computer.
D. The residual information left on magnetic storage media after a deletion or erasure.
Answer: D
Answer: A
A. Onward transfer
B. Collection Limitation
C. Collector Accountability
D. Individual Participation
Answer: B
Answer: A
Answer: B
A. Read-through
B. Parallel
C. Full interruption
D. Simulation
Answer: B
Answer: D
Answer: B
Answer: B
Answer: A
Answer: C
Answer: C
A. Logging configurations
B. Transaction log files
C. User account configurations
D. Access control lists (ACL)
Answer: B
Answer: D
A. Mastered
B. Not Mastered
Answer: A
Explanation:
WS-Federation
Reference: Java Web Services: Up and Running” By Martin Kalin page 228
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer: C
A. Mastered
B. Not Mastered
Answer: A
Explanation:
WS-Trust
The protocol used for issuing security tokens is based on WS-Trust. WS-Trust is a Web service specification that builds on WS-Security. It describes a protocol
used for issuance, exchange, and validation of security tokens. WS-Trust provides a solution for interoperability by defining a protocol for issuing and exchanging
security tokens, based on token format, namespace, or trust boundaries.
Reference: https://msdn.microsoft.com/en-us/library/ff650503.aspx
Answer: B
A. Best practices
B. Business objectives
C. Legal and regulatory mandates
D. Employee's compliance to policies and standards
Answer: C
A. An access token
B. A username and password
C. A username
D. A password
Answer: A
A. enhance the skills required to create, maintain, and execute the plan.
B. provide for a high level of recovery in case of disaster.
C. describe the recovery organization to new employees.
D. provide each recovery team with checklists and procedures.
Answer: A
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer: D
Answer: B
Answer: D
A. After the system preliminary design has been developed and the data security categorization has been performed
B. After the business functional analysis and the data security categorization have been performed
C. After the vulnerability analysis has been performed and before the system detailed design begins
D. After the system preliminary design has been developed and before the data security categorization begins
Answer: B
Answer: B
A. Data Custodian
B. Executive Management
C. Chief Information Security Officer
D. Data/Information/Business Owners
Answer: B
Answer: C
Answer: A
Answer: D
Answer: D
Answer: B
A. Transport
B. Data link
C. Network
D. Application
Answer: D
Answer: B
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Mandatory Access Control – End user cannot set controls
Discretionary Access Control (DAC) – Subject has total control over objects
Role Based Access Control (RBAC) – Dynamically assigns roles permissions to particular duties based on job function
Rule Based access control – Dynamically assigns roles to subjects based on criteria assigned by a custodian.
A. User awareness
B. Two-factor authentication
C. Anti-phishing software
D. Periodic vulnerability scan
Answer: A
Answer: B
Answer: D
Answer: D
Answer: C
A. organization policy.
B. industry best practices.
C. industry laws and regulations.
D. management feedback.
Answer: A
Answer: B
A. Reversal
B. Gray box
C. Blind
D. White box
Answer: B
Answer: B
A. The estimated period of time a business critical database can remain down before customers are affected.
B. The fixed length of time a company can endure a disaster without any Disaster Recovery (DR) planning
C. The estimated period of time a business can remain interrupted beyond which it risks never recovering
D. The fixed length of time in a DR process before redundant systems are engaged
Answer: C
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Administrative – labeling of sensitive data Technical – Constrained user interface Logical – Biometrics for authentication
Physical – Radio Frequency Identification 9RFID) badge
Answer: A
Answer: A
A. Transport Layer
B. Data-Link Layer
C. Network Layer
D. Application Layer
Answer: C
Answer: C
Answer: C
Answer: A
Answer: C
A. Confidentiality
B. Integrity
C. Availability
D. Accessibility
Answer: C
Answer: D
Answer: B
Answer: C
Answer: A
A. Alert data
B. User data
C. Content data
D. Statistical data
Answer: D
A. clear-text attack.
B. known cipher attack.
C. frequency analysis.
D. stochastic assessment.
Answer: C
A. Management support
B. Consideration of organizational need
C. Technology used for delivery
D. Target audience
Answer: B
A. Purpose
B. Cost effectiveness
C. Availability
D. Authenticity
Answer: D
A. Notification tool
B. Message queuing tool
C. Security token tool
D. Synchronization tool
Answer: C
Answer: A
Answer: C
Answer: A
Answer: D
A. 25%
B. 50%
C. 75%
D. 100%
Answer:
Answer: B
Answer: B
Answer: A
Answer: C
Explanation:
Section: Security Operations
A. It is tested
B. It is logged
C. It is verified
D. It is untrusted
Answer: D
Answer: B
Answer: D
Answer: A
A. Password encryption
B. File encryption
C. Source library control
D. File authentication
Answer: A
Answer: D
A. Compartmentalization
B. Segmentation
C. Error correction
D. Virtual Local Area Network (VLAN) tagging
Answer: B
A. Achieving Service Level Agreements (SLA) on how quickly patches will be released when a security flaw is found.
B. Maintaining segregation of duties.
C. Standardized configurations for logging, alerting, and security metrics.
D. Availability of security teams at the end of design process to perform last-minute manual audits and reviews.
Answer: B
Answer: A
A. Application authentication
B. Input validation
C. Digital signing
D. Device encryption
Answer: C
Answer: C
A. Large mantrap where groups of individuals leaving are identified using facial recognition technology
B. Radio Frequency Identification (RFID) sensors worn by each employee scanned by sensors at each exitdoor
C. Emergency exits with push bars with coordinates at each exit checking off the individual against a predefined list
D. Card-activated turnstile where individuals are validated upon exit
Answer: B
Explanation:
Section: Security Operations
A. Purging
B. Encryption
C. Destruction
D. Clearing
Answer: A
Answer: A
A. Countermeasure effectiveness
B. Type of potential loss
C. Incident likelihood
D. Information ownership
Answer: C
Answer: D
Answer: B
Answer: D
Answer: A
Explanation:
Section: Security Assessment and Testing
A. Non-repudiation
B. Efficiency
C. Confidentially
D. Privacy
Answer: A
Answer: A
Explanation:
Section: Security Operations
Answer: B
Answer: D
Answer: A
A. Input protocols
B. Target processes
C. Error messages
D. Access rights
Answer: C
Explanation:
Section: Security Assessment and Testing
Answer: B
Answer: C
A. Awareness activities should be used to focus on security concerns and respond to those concerns accordingly
B. Awareness is not an activity or part of the training but rather a state of persistence to support the program
C. Awareness is trainin
D. The purpose of awareness presentations is to broaden attention of security.
E. Awareness is not trainin
F. The purpose of awareness presentation is simply to focus attention on security.
Answer: C
Answer: C
Answer: D
A. Encryption
B. Cipher
C. Hash
D. Entropy
Answer: A
A. Security vulnerabilities
B. Risk tolerance
C. Risk mitigation
D. Security staff
Answer: C
A. annually
B. to correspond with staff promotions
C. to correspond with terminations
D. continually
Answer: A
Answer: D
A. Forces Transmission Control Protocol /Internet Protocol (TCP/IP) connections into a reset state
B. Establishes many new Transmission Control Protocol / Internet Protocol (TCP/IP) connections
C. Empties the queue of pending Transmission Control Protocol /Internet Protocol (TCP/IP) requests
D. Exceeds the limits for new Transmission Control Protocol /Internet Protocol (TCP/IP) connections
Answer: B
A. Trusted platforms
B. Host-based firewalls
C. Token-based authentication
D. Wireless Access Points (AP)
Answer: A
Answer: C
A. Erase
B. Sanitize
C. Encrypt
D. Degauss
Answer: B
Answer: C
Answer: B
A. Acoustic sensor
B. Motion sensor
C. Shock sensor
D. Photoelectric sensor
Answer: C
A. Having emergency contacts established for the general employee population to get information
B. Conducting business continuity and disaster recovery training for those who have a direct role in the recovery
C. Designing business continuity and disaster recovery training programs for different audiences
D. Publishing a corporate business continuity and disaster recovery plan on the corporate website
Answer: C
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A. Deploying load balancers to distribute inbound traffic across multiple data centers
B. Set Up Web Application Firewalls (WAFs) to filter out malicious traffic
C. Implementing reverse web-proxies to validate each new inbound connection
D. Coordinate with and utilize capabilities within Internet Service Provider (ISP)
Answer: D
A. Notifying law enforcement is crucial before hashing the contents of the server hard drive
B. Identifying who executed the incident is more important than how the incident happened
C. Removing the server from the network may prevent catching the intruder
D. Copying the contents of the hard drive to another storage device may damage the evidence
Answer: C
Explanation:
Section: Security Operations
Answer: D
In Disaster Recovery (DR) and Business Continuity (DC) training, which BEST describes a functional drill?
Answer: D
Answer: D
A. Application proxy
B. Port filter
C. Network boundary router
D. Access layer switch
Answer: A
A. Log timestamp
B. Live session traffic
C. Session state variables
D. Test scripts
Answer: C
100% Pass Your CISSP Exam with Our Prep Materials Via below:
https://www.certleader.com/CISSP-dumps.html