Certified of cissp all in one rapidshare materials and interactive bootcamp for ISC2 certification for IT candidates, Real Success Guaranteed with Updated cissp passing score pdf dumps vce Materials. 100% PASS Certified Information Systems Security Professional (CISSP) exam Today!

Q177. During the procurement of a new information system, it was determined that some of the security requirements were not addressed in the system specification. Which of the following is the MOST likely reason for this? 

A. The procurement officer lacks technical knowledge. 

B. The security requirements have changed during the procurement process. 

C. There were no security professionals in the vendor's bidding team. 

D. The description of the security requirements was insufficient. 

Answer:


Q178. Refer.to the information below to answer the question. 

A security practitioner detects client-based attacks on the organization’s network. A plan will be necessary to address these concerns. 

What is the BEST reason for the organization to pursue a plan to mitigate client-based attacks? 

A. Client privilege administration is inherently weaker than server privilege administration. 

B. Client hardening and management is easier on clients than on servers. 

C. Client-based attacks are more common and easier to exploit than server and network based attacks. 

D. Client-based attacks have higher financial impact. 

Answer:


Q179. Which of the following BEST describes a rogue Access Point (AP)? 

A. An AP that is not protected by a firewall 

B. An.AP not configured to use Wired Equivalent Privacy (WEP) with Triple Data Encryption Algorithm (3DES) 

C. An.AP connected to the wired infrastructure but not under the management of authorized network administrators 

D. An.AP infected by any kind of Trojan or Malware 

Answer:


Q180. Refer.to the information below to answer the question.

.A large, multinational organization has decided to outsource a portion of their Information Technology (IT) organization to a third-party provider’s facility. This provider will be responsible for the design, development, testing, and support of several critical, customer-based applications used by the organization. 

The organization should ensure that the third party's physical security controls are in place so that they 

A. are more rigorous.than the original controls. 

B. are able to limit access to sensitive information. 

C. allow access by the organization staff at any time. 

D. cannot be accessed by subcontractors of the third party. 

Answer:


Q181. What is an effective practice when returning electronic storage media to third parties for repair? 

A. Ensuring the media is not labeled in any way that indicates the organization's name. 

B. Disassembling the media and removing parts that may contain sensitive data. 

C. Physically breaking parts of the media that may contain sensitive data. 

D. Establishing a contract with the third party regarding the secure handling of the media. 

Answer:


Q182. An auditor carrying out a compliance audit requests passwords that are encrypted in the system to verify that the passwords are compliant with policy. Which of the following is the BEST response to the auditor? 

A. Provide the encrypted passwords and analysis tools to the auditor for analysis. 

B. Analyze the encrypted passwords for the auditor and show them the results. 

C. Demonstrate that non-compliant passwords cannot be created in the system. 

D. Demonstrate that non-compliant passwords cannot be encrypted in the system. 

Answer:


Q183. Which of the following is the BEST mitigation from phishing attacks? 

A. Network activity monitoring 

B. Security awareness training 

C. Corporate policy and procedures 

D. Strong file and directory permissions 

Answer:


Q184. What is the GREATEST challenge to identifying data leaks? 

A. Available technical tools that enable user activity monitoring. 

B. Documented asset classification policy and clear labeling of assets. 

C. Senior management cooperation in investigating suspicious behavior. 

D. Law enforcement participation to apprehend and interrogate suspects. 

Answer: