ISC CISSP - Certified Information Systems Security Professional Exam

Page:    1 / 97   
Total 484 questions

Physical assets defined in an organization's business impact analysis (BIA) could include which of the following?

  • A. Personal belongings of organizational staff members
  • B. Disaster recovery (DR) line-item revenues
  • C. Cloud-based applications
  • D. Supplies kept off-site a remote facility


Answer : D

When assessing the audit capability of an application, which of the following activities is MOST important?

  • A. Identify procedures to investigate suspicious activity.
  • B. Determine if audit records contain sufficient information.
  • C. Verify if sufficient storage is allocated for audit records.
  • D. Review security plan for actions to be taken in the event of audit failure.


Answer : C

An organization would like to implement an authorization mechanism that would simplify the assignment of various system access permissions for many users with similar job responsibilities. Which type of authorization mechanism would be the BEST choice for the organization to implement?

  • A. Role-based access control (RBAC)
  • B. Discretionary access control (DAC)
  • C. Content-dependent Access Control
  • D. Rule-based Access Control


Answer : A

What is the PRIMARY reason for criminal law being difficult to enforce when dealing with cybercrime?

  • A. Jurisdiction is hard to define.
  • B. Law enforcement agencies are understaffed.
  • C. Extradition treaties are rarely enforced.
  • D. Numerous language barriers exist.


Answer : A

Wi-Fi Protected Access 2 (WPA2) provides users with a higher level of assurance that their data will remain protected by using which protocol?

  • A. Extensible Authentication Protocol (EAP)
  • B. Internet Protocol Security (IPsec)
  • C. Secure Sockets Layer (SSL)
  • D. Secure Shell (SSH)


Answer : A

Page:    1 / 97   
Total 484 questions