New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

How to Easily Pass the ISC CISSP Exam: Expert Advice

Questions 136

In the network design below, where is the MOST secure Local Area Network (LAN) segment to deploy a Wireless Access Point (WAP) that provides contractors access to the Internet and authorized enterprise services?

CISSP Question 136

Options:
ISC CISSP Premium Access
Questions 137

The goal of a Business Impact Analysis (BIA) is to determine which of the following?

Options:
A.

Cost effectiveness of business recovery

B.

Cost effectiveness of installing software security patches

C.

Resource priorities for recovery and Maximum Tolerable Downtime (MTD)

D.

Which security measures should be implemented

Questions 138

Which of the following is the MOST effective method of mitigating data theft from an active user workstation?

Options:
A.

Implement full-disk encryption

B.

Enable multifactor authentication

C.

Deploy file integrity checkers

D.

Disable use of portable devices

Questions 139

The application of a security patch to a product previously validate at Common Criteria (CC) Evaluation Assurance Level (EAL) 4 would

Options:
A.

require an update of the Protection Profile (PP).

B.

require recertification.

C.

retain its current EAL rating.

D.

reduce the product to EAL 3.

Questions 140

The MAIN reason an organization conducts a security authorization process is to

Options:
A.

force the organization to make conscious risk decisions.

B.

assure the effectiveness of security controls.

C.

assure the correct security organization exists.

D.

force the organization to enlist management support.

Questions 141

Which of the following provides the MOST protection against data theft of sensitive information when a laptop is stolen?

Options:
A.

Set up a BIOS and operating system password

B.

Encrypt the virtual drive where confidential files can be stored

C.

Implement a mandatory policy in which sensitive data cannot be stored on laptops, but only on the corporate network

D.

Encrypt the entire disk and delete contents after a set number of failed access attempts

Questions 142

Identify the component that MOST likely lacks digital accountability related to information access.

Click on the correct device in the image below.

CISSP Question 142

Options:
Questions 143

Refer to the information below to answer the question.

A security practitioner detects client-based attacks on the organization’s network. A plan will be necessary to address these concerns.

In addition to web browsers, what PRIMARY areas need to be addressed concerning mobile code used for malicious purposes?

Options:
A.

Text editors, database, and Internet phone applications

B.

Email, presentation, and database applications

C.

Image libraries, presentation and spreadsheet applications

D.

Email, media players, and instant messaging applications

Questions 144

Which of the following is an example of two-factor authentication?

Options:
A.

Retina scan and a palm print

B.

Fingerprint and a smart card

C.

Magnetic stripe card and an ID badge

D.

Password and Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA)

Questions 145

What physical characteristic does a retinal scan biometric device measure?

Options:
A.

The amount of light reflected by the retina

B.

The size, curvature, and shape of the retina

C.

The pattern of blood vessels at the back of the eye

D.

The pattern of light receptors at the back of the eye

Questions 146

Which of the following describes the concept of a Single Sign -On (SSO) system?

Options:
A.

Users are authenticated to one system at a time.

B.

Users are identified to multiple systems with several credentials.

C.

Users are authenticated to multiple systems with one login.

D.

Only one user is using the system at a time.

Questions 147

An organization's data policy MUST include a data retention period which is based on

Options:
A.

application dismissal.

B.

business procedures.

C.

digital certificates expiration.

D.

regulatory compliance.

Questions 148

Refer to the information below to answer the question.

A new employee is given a laptop computer with full administrator access. This employee does not have a personal computer at home and has a child that uses the computer to send and receive e-mail, search the web, and use instant messaging. The organization’s Information Technology (IT) department discovers that a peer-to-peer program has been installed on the computer using the employee's access.

Which of the following could have MOST likely prevented the Peer-to-Peer (P2P) program from being installed on the computer?

Options:
A.

Removing employee's full access to the computer

B.

Supervising their child's use of the computer

C.

Limiting computer's access to only the employee

D.

Ensuring employee understands their business conduct guidelines

Questions 149

According to best practice, which of the following groups is the MOST effective in performing an information security compliance audit?

Options:
A.

In-house security administrators

B.

In-house Network Team

C.

Disaster Recovery (DR) Team

D.

External consultants

Questions 150

Refer to the information below to answer the question.

A large organization uses unique identifiers and requires them at the start of every system session. Application access is based on job classification. The organization is subject to periodic independent reviews of access controls and violations. The organization uses wired and wireless networks and remote access. The organization also uses secure connections to branch offices and secure backup and recovery strategies for selected information and processes.

Following best practice, where should the permitted access for each department and job classification combination be specified?

Options:
A.

Security procedures

B.

Security standards

C.

Human resource policy

D.

Human resource standards