getcertified4sure.com

Secrets to cissp sybex




It is impossible to pass ISC2 cissp exam cram exam without any help in the short term. Come to Ucertify soon and find the most advanced, correct and guaranteed ISC2 cissp exam dates practice questions. You will get a surprising result by our Abreast of the times Certified Information Systems Security Professional (CISSP) practice guides.

Q21. HOTSPOT 

Which Web Services Security (WS-Security) specification.negotiates.how security tokens will be issued, renewed and validated? Click on the correct specification in the image below. 

Answer: 


Q22. Which of the following is the PRIMARY benefit of a formalized information classification program? 

A. It drives audit processes. 

B. It supports risk assessment. 

C. It reduces asset vulnerabilities. 

D. It minimizes system logging requirements. 

Answer:


Q23. Which of the following is the MOST crucial for a successful audit plan? 

A. Defining the scope of the audit to be performed 

B. Identifying the security controls to be implemented 

C. Working with the system owner on new controls 

D. Acquiring evidence of systems that are not compliant 

Answer:


Q24. Disaster Recovery Plan (DRP) training material should be 

A. consistent so that all audiences receive the same training. 

B. stored in a fire proof safe to ensure availability when needed. 

C. only delivered in paper format. 

D. presented in a professional looking manner. 

Answer:


Q25. DRAG DROP 

During the risk assessment phase of the project the CISO discovered that a college within the University is collecting Protected Health Information (PHI) data via an application that was developed in-house. The college collecting this data is fully aware of the regulations for Health Insurance Portability and Accountability Act (HIPAA) and is fully compliant. 

What is the best approach for the CISO? 

Below are the common phases to creating a Business Continuity/Disaster Recovery (BC/DR) plan. Drag the remaining BC\DR phases to the appropriate corresponding location. 

Answer: 


Q26. Which of the following is TRUE about Disaster Recovery Plan (DRP) testing? 

A. Operational networks are usually shut down during testing. 

B. Testing should continue even if components of the test fail. 

C. The company is fully prepared for a disaster if all tests pass. 

D. Testing should not be done until the entire disaster plan can be tested. 

Answer:


Q27. The stringency of an Information Technology (IT) security assessment will be determined by the 

A. system's past security record. 

B. size of the system's database. 

C. sensitivity of the system's data. 

D. age of the system. 

Answer:


Q28. Refer.to the information below to answer the question. 

Desktop computers in an organization were sanitized.for re-use.in an equivalent security environment. The data was destroyed in accordance with organizational policy and all marking and other external indications of the sensitivity of the data that was formerly stored on the magnetic drives were removed. 

Organizational policy requires the deletion of user data from Personal Digital Assistant (PDA) devices before disposal. It may not be possible to delete the user data if the device is malfunctioning. Which destruction method below provides the BEST assurance that the data has been removed? 

A. Knurling 

B. Grinding 

C. Shredding.

D. Degaussing 

Answer:


Q29. What is the PRIMARY goal for using Domain Name System.Security Extensions (DNSSEC) to sign records? 

A. Integrity 

B. Confidentiality 

C. Accountability 

D. Availability 

Answer:


Q30. Refer.to the information below to answer the question. 

A new employee is given a laptop computer with full administrator access. This employee does not have a personal computer at home and has a child that uses the computer to send and receive e-mail, search the web, and use instant messaging. The organization’s Information Technology (IT) department discovers that a peer-to-peer program has been installed on the computer using the employee's access. 

Which of the following solutions would have MOST likely detected the use of peer-to-peer programs when the computer was connected to the office network? 

A. Anti-virus software 

B. Intrusion Prevention System (IPS) 

C. Anti-spyware software 

D. Integrity checking software 

Answer: