Download ISC.CISSP.ActualTests.2018-09-07.37q.vcex

Download Exam

File Info

Exam Certified Information Systems Security Professional
Number CISSP
File Name ISC.CISSP.ActualTests.2018-09-07.37q.vcex
Size 22 KB
Posted Sep 07, 2018
Download ISC.CISSP.ActualTests.2018-09-07.37q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Which of the following represents the GREATEST risk to data confidentiality?


  1. Network redundancies are not implemented
  2. Security awareness training is not completed
  3. Backup tapes are generated unencrypted
  4. Users have administrative privileges
Correct answer: C



Question 2

What is the MOST important consideration from a data security perspective when an organization plans to relocate?


  1. Ensure the fire prevention and detection systems are sufficient to protect personnel
  2. Review the architectural plans to determine how many emergency exits are present
  3. Conduct a gap analysis of a new facilities against existing security requirements
  4. Revise the Disaster Recovery and Business Continuity (DR/BC) plan
Correct answer: C



Question 3

Which of the following is an initial consideration when developing an information security management system?


  1. Identify the contractual security obligations that apply to the organizations
  2. Understand the value of the information assets
  3. Identify the level of residual risk that is tolerable to management
  4. Identify relevant legislative and regulatory compliance requirements
Correct answer: B



Question 4

Which of the following is an effective control in preventing electronic cloning of Radio Frequency Identification (RFID) based access cards?


  1. Personal Identity Verification (PIV)
  2. Cardholder Unique Identifier (CHUID) authentication
  3. Physical Access Control System (PACS) repeated attempt detection
  4. Asymmetric Card Authentication Key (CAK) challenge-response
Correct answer: C



Question 5

Which security service is served by the process of encryption plaintext with the sender’s private key and decrypting cipher text with the sender’s public key?


  1. Confidentiality
  2. Integrity
  3. Identification
  4. Availability
Correct answer: A



Question 6

Which of the following mobile code security models relies only on trust?


  1. Code signing
  2. Class authentication
  3. Sandboxing
  4. Type safety
Correct answer: A
Explanation:
Reference: https://csrc.nist.gov/csrc/media/publications/conference-paper/1999/10/21/proceedings-of-the-22nd-nissc-1999/documents/papers/t09.pdf (11)
Reference: https://csrc.nist.gov/csrc/media/publications/conference-paper/1999/10/21/proceedings-of-the-22nd-nissc-1999/documents/papers/t09.pdf (11)



Question 7

Which technique can be used to make an encryption scheme more resistant to a known plaintext attack?


  1. Hashing the data before encryption
  2. Hashing the data after encryption
  3. Compressing the data after encryption
  4. Compressing the data before encryption
Correct answer: A



Question 8

What is the second phase of Public Key Infrastructure (PKI) key/certificate life-cycle management?


  1. Implementation Phase
  2. Initialization Phase
  3. Cancellation Phase
  4. Issued Phase
Correct answer: D



Question 9

Which component of the Security Content Automation Protocol (SCAP) specification contains the data required to estimate the severity of vulnerabilities identified automated vulnerability assessments?


  1. Common Vulnerabilities and Exposures (CVE)
  2. Common Vulnerability Scoring System (CVSS)
  3. Asset Reporting Format (ARF)
  4. Open Vulnerability and Assessment Language (OVAL)
Correct answer: B



Question 10

Who in the organization is accountable for classification of data information assets?


  1. Data owner
  2. Data architect
  3. Chief Information Security Officer (CISO)
  4. Chief Information Officer (CIO)
Correct answer: A









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files