Certified Information Systems Security Professional – CISSP – Question127

A Virtual Machine (VM) environment has five guest Operating Systems (OS) and provides strong isolation. What MUST an administrator review to audit a user’s access to data files?

A.
Host VM monitor audit logs
B. Guest OS access controls
C. Host VM access controls
D. Guest OS audit logs

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question123

An organization’s security policy delegates to the data owner the ability to assign which user roles have access to a particular resource. What type of authorization mechanism is being used?

A.
Discretionary Access Control (DAC)
B. Role Based Access Control (RBAC)
C. Media Access Control (MAC)
D. Mandatory Access Control (MAC)

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question122

Which of the following is a common feature of an Identity as a Service (IDaaS) solution?

A.
Single Sign-On (SSO) authentication support
B. Privileged user authentication support
C. Password reset service support
D. Terminal Access Controller Access Control System (TACACS) authentication support

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question121

Which of the following MUST be scalable to address security concerns raised by the integration of third-party identity services?

A.
Mandatory Access Controls (MAC)
B. Enterprise security architecture
C. Enterprise security procedures
D. Role Based Access Controls (RBAC)

Correct Answer: D

Certified Information Systems Security Professional – CISSP – Question119

In an organization where Network Access Control (NAC) has been deployed, a device trying to connect to the network is being placed into an isolated domain. What could be done on this device in order to obtain proper connectivity?

A.
Connect the device to another network jack
B. Apply remediation’s according to security requirements
C. Apply Operating System (OS) patches
D. Change the Message Authentication Code (MAC) address of the network interface

Correct Answer: B

Certified Information Systems Security Professional – CISSP – Question118

Which of the following is the BEST metric to obtain when gaining support for an Identify and Access Management (IAM) solution?

A.
Application connection successes resulting in data leakage
B. Administrative costs for restoring systems after connection failure
C. Employee system timeouts from implementing wrong limits
D. Help desk costs required to support password reset requests

Correct Answer: D