we provide Actual ISC2 cissp certification test question which are the best for clearing cissp sybex test, and to get certified by ISC2 Certified Information Systems Security Professional (CISSP). The cissp exam dates Questions & Answers covers all the knowledge points of the real cissp exam fee exam. Crack your ISC2 cissp verification Exam with latest dumps, guaranteed!
Q141. Discretionary Access Control (DAC) restricts access according to
A. data classification labeling.
B. page views within an application.
C. authorizations granted to the user.
D. management accreditation.
Answer: C
Q142. What is an effective practice when returning electronic storage media to third parties for repair?
A. Ensuring the media is not labeled in any way that indicates the organization's name.
B. Disassembling the media and removing parts that may contain sensitive data.
C. Physically breaking parts of the media that may contain sensitive data.
D. Establishing a contract with the third party regarding the secure handling of the media.
Answer: D
Q143. Which of the following provides the MOST protection against data theft of sensitive information when a laptop is stolen?
A. Set up a BIOS and operating system password
B. Encrypt the virtual drive where confidential files can be stored
C. Implement a mandatory policy in which sensitive data cannot be stored on laptops, but only on the corporate network
D. Encrypt the entire disk and delete contents after a set number of failed access attempts
Answer: D
Q144. Which of the following is an effective method for avoiding magnetic media data
remanence?
A. Degaussing
B. Encryption
C. Data Loss Prevention (DLP)
D. Authentication
Answer: A
Q145. Refer.to the information below to answer the question.
An organization experiencing a negative financial impact is forced to reduce budgets and the number of Information Technology (IT) operations staff performing basic logical access security administration functions. Security processes have been tightly integrated into normal IT operations and are not separate and distinct roles.
Which of the following will indicate where the IT budget is BEST allocated during this time?
A. Policies
B. Frameworks
C. Metrics
D. Guidelines
Answer: C
Q146. HOTSPOT
Which.Web Services Security (WS-Security) specification.handles the management of security tokens and the underlying policies for granting access? Click on the correct specification in the image below.
Answer:
Q147. Which of the following MUST be done when promoting a security awareness program to senior management?
A. Show the need for security; identify the message and the audience
B. Ensure that the security presentation is designed to be all-inclusive
C. Notify them that their compliance is mandatory
D. Explain how hackers have enhanced information security
Answer: A
Q148. What do Capability Maturity Models (CMM) serve as a benchmark for in an organization?
A. Experience in the industry
B. Definition of security profiles
C. Human resource planning efforts
D. Procedures in systems development
Answer: D
Q149. Which of the following does Temporal Key Integrity Protocol (TKIP) support?
A. Multicast and broadcast messages
B. Coordination of IEEE 802.11 protocols
C. Wired Equivalent Privacy (WEP) systems
D. Synchronization of.multiple devices
Answer: C
Q150. The use of proximity card to gain access to a building is an example of what type of security control?
A. Legal
B. Logical
C. Physical
D. Procedural
Answer: C