PrepAway - Latest Free Exam Questions & Answers

Tag: Exam CISSP (update December 25th,2016)

Exam CISSP: Certified Information Systems Security Professional (update December 25th,2016)

What is the BEST reason for the organization to pursue a plan to mitigate client-based attacks?

Refer to the information below to answer the question.
A security practitioner detects client-based attacks on the organization’s network. A plan will be
necessary to address these concerns.
What is the BEST reason for the organization to pursue a plan to mitigate client-based attacks?

Which of the following BEST describes the access control methodology used?

Refer to the information below to answer the question.
A large organization uses unique identifiers and requires them at the start of every system session.
Application access is based on job classification. The organization is subject to periodic independent
reviews of access controls and violations. The organization uses wired and wireless networks and
remote access. The organization also uses secure connections to branch offices and secure backup
and recovery strategies for selected information and processes.
Which of the following BEST describes the access control methodology used?

In addition to authentication at the start of the user session, best practice would require reauthentication

Refer to the information below to answer the question.
A large organization uses unique identifiers and requires them at the start of every system session.
Application access is based on job classification. The organization is subject to periodic independent
reviews of access controls and violations. The organization uses wired and wireless networks and
remote access. The organization also uses secure connections to branch offices and secure backup
and recovery strategies for selected information and processes.
In addition to authentication at the start of the user session, best practice would require reauthentication

where should the permitted access for each department and job classification combination be specified?

Refer to the information below to answer the question.
A large organization uses unique identifiers and requires them at the start of every system session.
Application access is based on job classification. The organization is subject to periodic independent
reviews of access controls and violations. The organization uses wired and wireless networks and
remote access. The organization also uses secure connections to branch offices and secure backup
and recovery strategies for selected information and processes.
Following best practice, where should the permitted access for each department and job
classification combination be specified?

What MUST the access control logs contain in addition to the identifier?

Refer to the information below to answer the question.
A large organization uses unique identifiers and requires them at the start of every system session.
Application access is based on job classification. The organization is subject to periodic independent
reviews of access controls and violations. The organization uses wired and wireless networks andremote access. The organization also uses secure connections to branch offices and secure backup
and recovery strategies for selected information and processes.
What MUST the access control logs contain in addition to the identifier?

Which of the following is considered the MOST important priority for the information security officer?

Refer to the information below to answer the question.
An organization has hired an information security officer to lead their security department. The
officer has adequate people resources but is lacking the other necessary components to have an
effective security program. There are numerous initiatives requiring security involvement.
Which of the following is considered the MOST important priority for the information security
officer?

The effectiveness of the security program can PRIMARILY be measured through

Refer to the information below to answer the question.
An organization has hired an information security officer to lead their security department. The
officer has adequate people resources but is lacking the other necessary components to have an
effective security program. There are numerous initiatives requiring security involvement.
The effectiveness of the security program can PRIMARILY be measured through

which of the following will MOST likely influence the selection of top initiatives?

Refer to the information below to answer the question.
An organization has hired an information security officer to lead their security department. The
officer has adequate people resources but is lacking the other necessary components to have an
effective security program. There are numerous initiatives requiring security involvement.
Given the number of priorities, which of the following will MOST likely influence the selection of top
initiatives?

The security program can be considered effective when

Refer to the information below to answer the question.
An organization has hired an information security officer to lead their security department. The
officer has adequate people resources but is lacking the other necessary components to have an
effective security program. There are numerous initiatives requiring security involvement.
The security program can be considered effective when


Page 21 of 38« First...10...1920212223...30...Last »