CISSP Practice Test Questions

1487 Questions


Topic 13: New Questions B

Who would be the BEST person to approve an organizations information security policy?


A.

Chief Information Officer (CIO)


B.

Chief Information Security Officer (CISO)


C.

Chief internal auditor


D.

Chief Executive Officer (CEO)





B.
  

Chief Information Security Officer (CISO)



As part of an application penetration testing process, session hijacking can BEST be achieved by which of the following?


A.

Known-plaintext attack


B.

Denial of Service (DoS)


C.

Cookie manipulation


D.

Structured Query Language (SQL) injection





C.
  

Cookie manipulation



A minimal implementation of endpoint security includes which of the following?


A.

Trusted platforms


B.

Host-based firewalls


C.

Token-based authentication


D.

Wireless Access Points (AP)





B.
  

Host-based firewalls



Which security modes is MOST commonly used in a commercial environment because it
protects the integrity
of financial and accounting data?


A.

Biba


B.

Graham-Denning


C.

Clark-Wilson


D.

Beil-LaPadula





C.
  

Clark-Wilson



What does electronic vaulting accomplish?


A.

It protects critical files.


B.

It ensures the fault tolerance of Redundant Array of Independent Disks (RAID) systems


C.

It stripes all database records


D.

It automates the Disaster Recovery Process (DRP)





A.
  

It protects critical files.



Explanation: Section: Security Operations

When developing solutions for mobile devices, in which phase of the Software
Development Life Cycle (SDLC) should technical limitations related to devices be
specified?


A.

Implementation


B.

Initiation


C.

Review


D.

Development





A.
  

Implementation



Which of the following would BEST support effective testing of patch compatibility when patches are applied to an organization’s systems?


A.

Standardized configurations for devices


B.

Standardized patch testing equipment


C.

Automated system patching


D.

Management support for patching





C.
  

Automated system patching



Explanation: Section: Security Assessment and Testing

Which of the following is the BEST metric to obtain when gaining support for an Identify and Access Management (IAM) solution?


A.

Application connection successes resulting in data leakage


B.

Administrative costs for restoring systems after connection failure


C.

Employee system timeouts from implementing wrong limits


D.

Help desk costs required to support password reset requests





D.
  

Help desk costs required to support password reset requests



During examination of Internet history records, the following string occurs within a Unique Resource Locator (URL):
http://www.companysite.com/products/products.asp?productid=123 or 1=1
What type of attack does this indicate?


A.

Directory traversal


B.

Structured Query Language (SQL) injection


C.

Cross-Site Scripting (XSS)


D.

Shellcode injection





C.
  

Cross-Site Scripting (XSS)



A user has infected a computer with malware by connecting a Universal Serial Bus (USB) storage device. Which of the following is MOST effective to mitigate future infections?


A.

Develop a written organizational policy prohibiting unauthorized USB devices


B.

Train users on the dangers of transferring data in USB devices


C.

Implement centralized technical control of USB port connections


D.

Encrypt removable USB devices containing data at rest





C.
  

Implement centralized technical control of USB port connections



The security accreditation task of the System Development Life Cycle (SDLC) process is completed at the end of which phase?


A.

System acquisition and development


B.

System operations and maintenance


C.

System initiation


D.

System implementation





B.
  

System operations and maintenance



Which of the following presents the PRIMARY concern to an organization when setting up a federated single sign-on (SSO) solution with another


A.

Sending assertions to an identity provider


B.

Requesting Identity assertions from the partners domain


C.

defining the identity mapping scheme


D.

Having the resource provider query the Identity provider





C.
  

defining the identity mapping scheme




Page 54 out of 124 Pages
Previous