getcertified4sure.com

Shortcuts To CISSP(151 to 160)




We offer free updated ISC2 ISC2 practice questions and answers after paying. In the event that there is a few changes in the actual ISC2 exam real exam, all of us will upgrade the ISC2 CISSP braindumps in period. Examcollection.com is the quickest and easiest way to get by means of ISC2 CISSP exam. We give you the latest CISSP studying supplies which covers each of the ISC2 knowledge factors. We have the actual abundant resources to the ISC2 CISSP real exam. End up being ready to the CISSP exam with the high-quality exam products. 100% Money Back Promise included!

2021 Apr CISSP pdf exam

Q151. In Disaster Recovery (DR) and business continuity training, which BEST describes a functional drill? 

A. A full-scale simulation of an emergency and the subsequent response functions 

B. A specific test by response teams of individual emergency response functions 

C. A functional evacuation of personnel 

D. An activation of the backup site 

Answer:


Q152. DRAG DROP 

During the risk assessment phase of the project the CISO discovered that a college within the University is collecting Protected Health Information (PHI) data via an application that was developed in-house. The college collecting this data is fully aware of the regulations for Health Insurance Portability and Accountability Act (HIPAA) and is fully compliant. 

What is the best approach for the CISO? 

Below are the common phases to creating a Business Continuity/Disaster Recovery (BC/DR) plan. Drag the remaining BC\DR phases to the appropriate corresponding location. 

Answer: 


Q153. Refer.to the information below to answer the question. 

A security practitioner detects client-based attacks on the organization’s network. A plan will be necessary to address these concerns. 

In the plan, what is the BEST approach to mitigate future internal client-based attacks? 

A. Block all client side web exploits at the perimeter. 

B. Remove all non-essential client-side web services from the network. 

C. Screen for harmful exploits of client-side services before implementation. 

D. Harden the client image before deployment. 

Answer:


Q154. Which of the following is the BEST approach to take in order to effectively incorporate the concepts of business continuity into the organization? 

A. Ensure end users are aware of the planning activities 

B. Validate all regulatory requirements are known and fully documented 

C. Develop training and awareness programs that involve all stakeholders 

D. Ensure plans do not violate the organization's cultural objectives and goals 

Answer:


Q155. The application of which of the following standards would BEST reduce the potential for data breaches? 

A. ISO 9000 

B. ISO 20121 

C. ISO 26000 

D. ISO 27001 

Answer:


Up to the minute CISSP exam guide:

Q156. Which of the following is an effective method for avoiding magnetic media data 

remanence? 

A. Degaussing 

B. Encryption 

C. Data Loss Prevention (DLP) 

D. Authentication 

Answer:


Q157. Sensitive customer data is going to be added to a database. What is the MOST effective implementation for ensuring data privacy? 

A. Discretionary Access Control (DAC) procedures 

B. Mandatory Access Control (MAC) procedures 

C. Data link encryption 

D. Segregation of duties 

Answer:


Q158. How can lessons learned from business continuity training and actual recovery incidents BEST be used? 

A. As a means for improvement 

B. As alternative options for awareness and training 

C. As indicators of a need for policy 

D. As business function gap indicators 

Answer:


Q159. A vulnerability test on an Information System (IS) is conducted to 

A. exploit security weaknesses in the IS. 

B. measure system performance on systems with weak security controls. 

C. evaluate the effectiveness of security controls. 

D. prepare for Disaster Recovery (DR) planning. 

Answer:


Q160. Which of the following is the BEST countermeasure to brute force login attacks? 

A. Changing all canonical passwords 

B. Decreasing the number of concurrent user sessions 

C. Restricting initial password delivery only in person 

D. Introducing a delay after failed system access attempts 

Answer: