Users Online

· Guests Online: 143

· Members Online: 0

· Total Members: 188
· Newest Member: meenachowdary055

Forum Threads

Newest Threads
No Threads created
Hottest Threads
No Threads created

Latest Articles

Articles Hierarchy

CISSP Exam Dumps

CISSP Exam Dumps

 

 

Question ID 21558

All of the following are basic components of a security policy EXCEPT the

Option A

definition of the issue and statement of relevant terms.

Option B

statement of roles and responsibilities

Option C

statement of applicability and compliance requirements.

Option D

statement of performance of characteristics and requirements.

Correct Answer D
Description 
Update Date and Time 2018-03-10 07:15:05

 

Question ID 21559

A security policy would include all of the following EXCEPT

Option A

Background

Option B

Scope statement

Option C

Audit requirements

Option D

Enforcement

Correct Answer B
Description 
Update Date and Time 2018-03-10 07:15:45

Question ID 21560

Which one of the following is an important characteristic of an information security policy?

Option A

Identifies major functional areas of information.

Option B

Quantifies the effect of the loss of the information.

Option C

Requires the identification of information owners.

Option D

Lists applications that support the business function.

Correct Answer A
Description 
Update Date and Time 2018-03-10 07:16:22

 

Question ID 21561

Ensuring the integrity of business information is the PRIMARY concern of

Option A

Encryption Security

Option B

Procedural Security.

Option C

Logical Security

Option D

On-line Security

Correct Answer B
Description 
Update Date and Time 2018-03-10 07:18:16

Question ID 21562

Which of the following would be the first step in establishing an information security program?

Option A

Adoption of a corporate information security policy statement

Option B

Development and implementation of an information security standards manual

Option C

Development of a security awareness-training program

Option D

Purchase of security access control software

Correct Answer A
Description 
Update Date and Time 2018-03-10 07:18:49

 

Question ID 21563

Which of the following department managers would be best suited to oversee the development of an
information security policy?

Option A

Information Systems

Option B

Human Resources

Option C

Business operations

Option D

Security administration

Correct Answer C

Description 
Update Date and Time 2018-03-10 07:19:22

 

 

Question ID 21564

What is the function of a corporate information security policy?

Option A

Issue corporate standard to be used when addressing specific security problems.

Option B

Issue guidelines in selecting equipment, configuration, design, and secure operations.

Option C

Define the specific assets to be protected and identify the specific tasks which must be completed to
secure them.

Option D

Define the main security objectives which must be achieved and the security framework to meet business
objectives.

Correct Answer D
Description 
Update Date and Time 2018-03-10 07:20:02

 

Question ID 21565

Why must senior management endorse a security policy?

Option A

So that they will accept ownership for security within the organization.

Option B

So that employees will follow the policy directives.

Option C

So that external bodies will recognize the organizations commitment to security.

Option D

So that they can be held legally accountable.

Correct Answer A
Description 
Update Date and Time 2018-03-10 07:20:36

Question ID 21566

In which one of the following documents is the assignment of individual roles and responsibilities MOST
appropriately defined?

Option A

Security policy

Option B

Enforcement guidelines

Option C

Acceptable use policy

Option D

Program manual

Correct Answer C
Description 
Update Date and Time 2018-03-10 07:21:11

 

Question ID 21567

Which of the following defines the intent of a system security policy?

Option A

A definition of the particular settings that have been determined to provide optimum security.

Option B

A brief, high-level statement defining what is and is not permitted during the operation of the system.

Option C

A definition of those items that must be excluded on the system.

Option D

A listing of tools and applications that will be used to protect the system.

Correct Answer A
Description 
Update Date and Time 2018-03-10 07:21:50

Question ID 21568

When developing an information security policy, what is the FIRST step that should be taken?

Option A

Obtain copies of mandatory regulations.

Option B

Gain management approval.

Option C

Seek acceptance from other departments.

Option D

Ensure policy is compliant with current working practices.

Correct Answer B
Description 
Update Date and Time 2018-03-10 07:22:54

 

Question ID 21569

Which one of the following should NOT be contained within a computer policy?

Option A

Definition of management expectations.

Option B

Responsibilities of individuals and groups for protected information.

Option C

Statement of senior executive support.

Option D

Definition of legal and regulatory controls.

Correct Answer B
Description 
Update Date and Time 2018-03-10 07:23:29

Question ID 21570

Which one of the following is NOT a fundamental component of a Regulatory Security Policy?

Option A

What is to be done.

Option B

When it is to be done.

Option C

Who is to do it.

Option D

Why is it to be done

Correct Answer C
Description 
Update Date and Time 2018-03-10 07:24:01

 

Question ID 21571

Which one of the following statements describes management controls that are instituted to implement a
security policy?

Option A

They prevent users from accessing any control function.

Option B

They eliminate the need for most auditing functions.

Option C

They may be administrative, procedural, or technical.

Option D

They are generally inexpensive to implement.

Correct Answer C
Description 
Update Date and Time 2018-03-10 07:24:33


 

Question ID 21572

Which must bear the primary responsibility for determining the level of protection needed for information
systems resources?

Option A

IS security specialists

Option B

Senior Management

Option C

Seniors security analysts

Option D

system auditors

Correct Answer B
Description 
Update Date and Time 2018-03-10 07:25:07

 

Question ID 21573

Which of the following choices is NOT part of a security policy?

Option A

definition of overall steps of information security and the importance of security

Option B

statement of management intend, supporting the goals and principles of information security

Option C

definition of general and specific responsibilities for information security management

Option D

description of specific technologies used in the field of information security

Correct Answer D
Description 
Update Date and Time 2018-03-10 07:25:41

Question ID 21574

In an organization, an Information Technology security function should:

Option A

Be a function within the information systems functions of an organization

Option B

Report directly to a specialized business unit such as legal, corporate security or insurance

Option C

Be lead by a Chief Security Officer and report directly to the CEO

Option D

Be independent but report to the Information Systems function

Correct Answer C
Description 
Update Date and Time 2018-03-10 07:26:53

 

Question ID 21575

Which of the following embodies all the detailed actions that personnel are required to follow?

Option A

Standards

Option B

Guidelines

Option C

Procedures

Option D

Baselines

Correct Answer C
Description 
Update Date and Time 2018-03-10 07:27:27

Question ID 21576

A significant action has a state that enables actions on an ADP system to be traced to individuals who may
then be held responsible. The action does NOT include:

Option A

Violations of security policy.

Option B

Attempted violations of security policy.

Option C

Non-violations of security policy.

Option D

Attempted violations of allowed actions.

Correct Answer D
Description 
Update Date and Time 2018-03-10 07:27:59

 

Question ID 21577

Network Security is a

Option A

Product

Option B

protocols

Option C

ever evolving process

Option D

quick-fix solution

Correct Answer C
Description 
Update Date and Time 2018-03-10 07:28:30 

Question ID 21578

Security is a process that is:

Option A

Continuous

Option B

Indicative

Option C

Examined

Option D

Abnormal

Correct Answer A
Description 
Update Date and Time 2018-03-10 07:28:59

 

Question ID 21579

What are the three fundamental principles of security?

Option A

Accountability, confidentiality, and integrity

Option B

Confidentiality, integrity, and availability

Option C

Integrity, availability, and accountability

Option D

Availability, accountability, and confidentiality

Correct Answer B

Description 
Update Date and Time 2018-03-10 07:29:35

 

 

Question ID 21580

Which of the following prevents, detects, and corrects errors so that the integrity, availability, and confidentiality
of transactions over networks may be maintained?

Option A

Communications security management and techniques

Option B

Networks security management and techniques

Option C

Clients security management and techniques

Option D

Servers security management and techniques

Correct Answer A
Description 
Update Date and Time 2018-03-10 07:30:47

 

Question ID 21581

Which of the following prevents, detects, and corrects errors so that the integrity, availability, and confidentiality
of transactions over networks may be maintained?

Option A

Communications security management and techniques

Option B

Networks security management and techniques

Option C

Clients security management and techniques

Option D

Servers security management and techniques

Correct Answer A

Description 
Update Date and Time 2018-03-10 07:30:47 

 

 

Question ID 21582

Making sure that the data is accessible when and where it is needed is which of the following?

Option A

Confidentiality

Option B

integrity

Option C

acceptability

Option D

availability

Correct Answer D
Description 
Update Date and Time 2018-03-10 07:31:29

 

Question ID 21583

Which of the following describes elements that create reliability and stability in networks and systems and
which assures that connectivity is accessible when needed?

Option A

Availability

Option B

Acceptability

Option C

Confidentiality

Option D

Integrity

Correct Answer A

Description 
Update Date and Time 2018-03-10 07:32:03

 

 

Question ID 21584

Most computer attacks result in violation of which of the following security properties?

Option A

Availability

Option B

Confidentiality

Option C

Integrity and control

Option D

All of the choices.

Correct Answer D
Description 
Update Date and Time 2018-03-10 07:32:37

 

Question ID 21585

Which of the following are objectives of an information systems security program?

Option A

Threats, vulnerabilities, and risks

Option B

Security, information value, and threats

Option C

Integrity, confidentiality, and availability.

Option D

Authenticity, vulnerabilities, and costs.

Correct Answer C

Description 
Update Date and Time 2018-03-10 07:33:10

 

 


 

Question ID 21586

An area of the Telecommunications and Network Security domain that directly affects the Information Systems
Security tenet of Availability can be defined as:

Option A

Netware availability

Option B

Network availability

Option C

Network acceptability

Option D

Network accountability

Correct Answer B
Description 
Update Date and Time 2018-03-10 07:33:50

 

Question ID 21587

The Structures, transmission methods, transport formats, and security measures that are used to provide
integrity, availability, and authentication, and confidentiality for transmissions over private and public
communications networks and media includes:

Option A

The Telecommunications and Network Security domain

Option B

The Telecommunications and Netware Security domain

Option C

The Technical communications and Network Security domain

Option D

The Telnet and Security domain

Correct Answer A
Description 
Update Date and Time 2018-03-10 07:34:26

Question ID 21588

Which one of the following is the MOST crucial link in the computer security chain?

Option A

Access controls

Option B

People

Option C

Management

Option D

Awareness programs

Correct Answer C
Description 
Update Date and Time 2018-03-10 07:35:48

 

Question ID 21589

The security planning process must define how security will be managed, who will be responsible, and

Option A

Who practices are reasonable and prudent for the enterprise.

Option B

Who will work in the security department.

Option C

What impact security will have on the intrinsic value of data.

Option D

How security measures will be tested for effectiveness.

Correct Answer D
Description 
Update Date and Time 2018-03-10 07:36:23

 

 

Question ID 21590

Information security is the protection of data. Information will be protected mainly based on:

Option A

Its sensitivity to the company.

Option B

Its confidentiality.

Option C

Its value.

Option D

All of the choices.

Correct Answer D
Description 
Update Date and Time 2018-03-10 07:36:55

 

Question ID 21591

Organizations develop change control procedures to ensure that

Option A

All changes are authorized, tested, and recorded.

Option B

Changes are controlled by the Policy Control Board (PCB).

Option C

All changes are requested, scheduled, and completed on time.

Option D

Management is advised of changes made to systems.

Correct Answer A
Description 
Update Date and Time 2018-03-10 07:37:34

 

Question ID 21592

Within the organizational environment, the security function should report to an organizational level that

Option A

Has information technology oversight.

Option B

Has autonomy from other levels.

Option C

Is an external operation.

Option D

Provides the internal audit function.

Correct Answer B
Description 
Update Date and Time 2018-03-10 07:38:47

 

Question ID 21593

What is the MAIN purpose of a change control/management system?

Option A

Notify all interested parties of the completion of the change.

Option B

Ensure that the change meets user specifications.

Option C

Document the change for audit and management review.

Option D

Ensure the orderly processing of a change request.

Correct Answer C
Description 
Update Date and Time 2018-03-10 07:39:25

Question ID 21594

Which of the following is most relevant to determining the maximum effective cost of access control?

Option A

the value of information that is protected

Option B

management's perceptions regarding data importance

Option C

budget planning related to base versus incremental spending.

Option D

the cost to replace lost data

Correct Answer A
Description 
Update Date and Time 2018-03-10 07:39:58

 

Question ID 21595

Which one of the following is the MAIN goal of a security awareness program when addressing senior
management?

Option A

Provide a vehicle for communicating security procedures.

Option B

Provide a clear understanding of potential risk and exposure.

Option C

Provide a forum for disclosing exposure and risk analysis.

Option D

Provide a forum to communicate user responsibilities.

Correct Answer B
Description 
Update Date and Time 2018-03-10 07:40:34

Question ID 21596

In developing a security awareness program, it is MOST important to

Option A

Understand the corporate culture and how it will affect security.

Option B

Understand employees preferences for information security.

Option C

Know what security awareness products are available.

Option D

Identify weakness in line management support.

Correct Answer A
Description 
Update Date and Time 2018-03-10 07:41:27

 

Question ID 21597

Which of the following would be best suited to provide information during a review of the controls over the
process of defining IT service levels?

Option A

Systems programmer

Option B

Legal stuff

Option C

Business unit manager

Option D

Programmer

Correct Answer C

Description 
Update Date and Time 2018-03-10 07:42:05

 

 

Question ID 21598

Which of the following would be best suited to provide information during a review of the controls over the
process of defining IT service levels?

Option A

Systems programmer

Option B

Legal stuff

Option C

Business unit manager

Option D

Programmer

Correct Answer C
Description 
Update Date and Time 2018-03-10 07:42:06

 

Question ID 21599

Which of the following best explains why computerized information systems frequently fail to meet the needs of
users?

Option A

Inadequate quality assurance (QA) tools

Option B

Constantly changing user needs

Option C

Inadequate user participation in defining the system's requirements

Option D

Inadequate project management.

Correct Answer C
Description 
Update Date and Time 2018-03-10 07:42:37

Question ID 21600

Which of the following is not a compensating measure for access violations?

Option A

Backups

Option B

Business continuity planning

Option C

Insurance

Option D

Security awareness

Correct Answer D
Description 
Update Date and Time 2018-03-10 07:43:37

 

Question ID 21601

Risk analysis is MOST useful when applied during which phase of the system development process?

Option A

Project identification

Option B

Requirements definition

Option C

System construction

Option D

Implementation planning

Correct Answer A
Description 
Update Date and Time 2018-03-10 07:44:15

Question ID 21602

Which one of the following is not one of the outcomes of a vulnerability analysis?

Option A

Quantative loss assessment

Option B

Qualitative loss assessment

Option C

Formal approval of BCP scope and initiation document

Option D

Defining critical support areas

Correct Answer C
Description 
Update Date and Time 2018-03-10 07:44:49

 

Question ID 21603

Which of the following is not a part of risk analysis?

Option A

Identify risks

Option B

Quantify the impact of potential threats

Option C

Provide an economic balance between the impact of the risk and the cost of the associated
countermeasures

Option D

Choose the best countermeasure

Correct Answer D
Description 
Update Date and Time 2018-03-10 07:45:56

Question ID 21604

A new worm has been released on the Internet. After investigation, you have not been able to determine if you
are at risk of exposure. Management is concerned as they have heard that a number of their counterparts are
being affected by the worm. How could you determine if you are at risk?

Option A

Evaluate evolving environment.

Option B

Contact your anti-virus vendor.

Option C

Discuss threat with a peer in another organization.

Option D

Wait for notification from an anti-virus vendor.

Correct Answer B
Description 
Update Date and Time 2018-03-10 07:47:05

 

Question ID 21605

When conducting a risk assessment, which one of the following is NOT an acceptable social engineering
practice?

Option A

Shoulder surfing

Option B

Misrepresentation

Option C

Subversion

Option D

Dumpster diving

Correct Answer A
Description 
Update Date and Time 2018-03-10 07:47:38

Question ID 21606

Which one of the following risk analysis terms characterizes the absence or weakness of a risk-reducing safegaurd?

Option A

Threat

Option B

Probability

Option C

Vulnerability

Option D

Loss expectancy

Correct Answer C
Description 
Update Date and Time 2018-03-10 07:48:20

 

Question ID 21607

Risk is commonly expressed as a function of the

Option A

Systems vulnerabilities and the cost to mitigate.

Option B

Types of countermeasures needed and the system's vulnerabilities.

Option C

Likelihood that the harm will occur and its potential impact.

Option D

Computer system-related assets and their costs.

Correct Answer C
Description 
Update Date and Time 2018-03-10 07:48:53

Question ID 21608

How should a risk be handled when the cost of the countermeasures outweighs the cost of the risk?

Option A

Reject the risk

Option B

Perform another risk analysis

Option C

Accept the risk

Option D

Reduce the risk

Correct Answer C
Description 
Update Date and Time 2018-03-10 07:49:26

 

Question ID 21609

Which of the following is an advantage of a qualitative over quantitative risk analysis?

Option A

It prioritizes the risks and identifies areas for immediate improvement in addressing the vulnerabilities.

Option B

It provides specific quantifiable measurements of the magnitude of the impacts

Option C

It makes cost-benefit analysis of recommended controls easier

Correct Answer A
Description 
Update Date and Time 2018-03-10 07:49:59

Comments

No Comments have been Posted.

Post Comment

Please Login to Post a Comment.

Ratings

Rating is available to Members only.

Please login or register to vote.

No Ratings have been Posted.
Render time: 1.44 seconds
10,817,362 unique visits