Certified Information Systems Security Professional – CISSP – Question247

Network-based logging has which advantage over host-based logging when reviewing malicious activity about a victim machine?

A.
Addresses and protocols of network-based logs are analyzed.
B. Host-based system logging has files stored in multiple locations.
C. Properly handled network-based logs may be more reliable and valid.
D. Network-based systems cannot capture users logging into the console.

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question246

In general, servers that are facing the Internet should be placed in a demilitarized zone (DMZ). What is MAIN purpose of the DMZ?

A.
Reduced risk to internal systems.
B. Prepare the server for potential attacks.
C. Mitigate the risk associated with the exposed server.
D. Bypass the need for a firewall.

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question244

Which of the following is a characteristic of the initialization vector when using Data Encryption Standard (DES)?

A.
It must be known to both sender and receiver.
B. It can be transmitted in the clear as a random number.
C. It must be retained until the last block is transmitted.
D. It can be used to encrypt and decrypt information.

Correct Answer: B

Certified Information Systems Security Professional – CISSP – Question242

What balance MUST be considered when web application developers determine how informative application error messages should be constructed?

A.
Risk versus benefit
B. Availability versus auditability
C. Confidentiality versus integrity
D. Performance versus user satisfaction

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question241

What is the difference between media marking and media labeling?

A.
Media marking refers to the use of human-readable security attributes, while media labeling refers to the use of security attributes in internal data structures.
B. Media labeling refers to the use of human-readable security attributes, while media marking refers to the use of security attributes in internal data structures.
C. Media labeling refers to security attributes required by public policy/law, while media marking refers to security required by internal organizational policy.
D. Media marking refers to security attributes required by public policy/law, while media labeling refers to security attributes required by internal organizational policy.

Correct Answer: D

Certified Information Systems Security Professional – CISSP – Question240

A company was ranked as high in the following National Institute of Standards and Technology (NIST) functions: Protect, Detect, Respond and Recover. However, a low maturity grade was attributed to the Identify function. In which of the following the controls categories does this company need to improve when analyzing its processes individually?

A.
Asset Management, Business Environment, Governance and Risk Assessment
B. Access Control, Awareness and Training, Data Security and Maintenance
C. Anomalies and Events, Security Continuous Monitoring and Detection Processes
D. Recovery Planning, Improvements and Communications

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question239

An organization regularly conducts its own penetration tests. Which of the following scenarios MUST be covered for the test to be effective?

A.
Third-party vendor with access to the system
B. System administrator access compromised
C. Internal attacker with access to the system
D. Internal user accidentally accessing data

Correct Answer: C