Download ISC.CISSP.Train4Sure.2019-01-20.130q.vcex

Download Exam

File Info

Exam Certified Information Systems Security Professional
Number CISSP
File Name ISC.CISSP.Train4Sure.2019-01-20.130q.vcex
Size 86 KB
Posted Jan 20, 2019
Downloads: 1
Download ISC.CISSP.Train4Sure.2019-01-20.130q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.


With discount: 20%

Demo Questions

Question 1

When assessing an organization’s security policy according to standards established by the International Organization for Standardization (ISO) 27001 and 27002, when can management responsibilities be defined?

  1. Only when assets are clearly defined
  2. Only when standards are defined
  3. Only when controls are put in place
  4. Only procedures are defined
Correct answer: A

Question 2

Which of the following types of technologies would be the MOST cost-effective method to provide a reactive control for protecting personnel in public areas?

  1. Install mantraps at the building entrances
  2. Enclose the personnel entry area with polycarbonate plastic
  3. Supply a duress alarm for personnel exposed to the public
  4. Hire a guard to protect the public area
Correct answer: D

Question 3

An important principle of defense in depth is that achieving information security requires a balanced focus on which PRIMARY elements?

  1. Development, testing, and deployment
  2. Prevention, detection, and remediation
  3. People, technology, and operations
  4. Certification, accreditation, and monitoring
Correct answer: C
Reference: (14)
Reference: (14)

Question 4

Intellectual property rights are PRIMARY concerned with which of the following?

  1. Owner’s ability to realize financial gain
  2. Owner’s ability to maintain copyright
  3. Right of the owner to enjoy their creation
  4. Right of the owner to control delivery method
Correct answer: D

Question 5

A control to protect from a Denial-of-Service (DoS) attach has been determined to stop 50% of attacks, and additionally reduces the impact of an attack by 50%. What is the residual risk?

  1. 25%
  2. 50%
  3. 75%
  4. 100%
Correct answer: A

Question 6

In The Open System Interconnection (OSI) model, which layer is responsible for the transmission of binary data over a communications network?

  1. Physical Layer
  2. Application Layer
  3. Data-Link Layer
  4. Network Layer
Correct answer: A

Question 7

What is the term commonly used to refer to a technique of authentication one machine to another by forging packets from a trusted source?

  1. Smurfing
  2. Man-in-the-Middle (MITM) attack
  3. Session redirect
  4. Spoofing
Correct answer: D

Question 8

Which of the following entails identification of data and links to business processes, applications, and data stores as well as assignment of ownership responsibilities?

  1. Security governance
  2. Risk management
  3. Security portfolio management
  4. Risk assessment
Correct answer: B

Question 9

Which of the following mandates the amount and complexity of security controls applied to a security risk?

  1. Security vulnerabilities
  2. Risk tolerance
  3. Risk mitigation
  4. Security staff
Correct answer: C

Question 10

In a data classification scheme, the data is owned by the

  1. system security managers
  2. business managers
  3. Information Technology (IT) managers
  4. end users
Correct answer: B





You can buy ProfExam with a 20% discount!


Use ProfExam Simulator to open VCEX files