Certified Information Systems Security Professional – CISSP – Question067

A security compliance manager of a large enterprise wants to reduce the time it takes to perform network, system, and application security compliance audits while increasing quality and effectiveness of the results. What should be implemented to BEST achieve the desired results?

A.
Configuration Management Database (CMDB)
B. Source code repository
C. Configuration Management Plan (CMP)
D. System performance monitoring application

Correct Answer: C

Certified Information Systems Security Professional – CISSP – Question066

Which of the following could be considered the MOST significant security challenge when adopting DevOps practices compared to a more traditional control framework?

A.
Achieving Service Level Agreements (SLA) on how quickly patches will be released when a security flaw is found.
B. Maintaining segregation of duties.
C. Standardized configurations for logging, alerting, and security metrics.
D. Availability of security teams at the end of design process to perform last-minute manual audits and reviews.

Correct Answer: B

Certified Information Systems Security Professional – CISSP – Question065

Which of the following combinations would MOST negatively affect availability?

A.
Denial of Service (DoS) attacks and outdated hardware
B. Unauthorized transactions and outdated hardware
C. Fire and accidental changes to data
D. Unauthorized transactions and denial of service attacks

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question064

In a change-controlled environment, which of the following is MOST likely to lead to unauthorized changes to production programs?

A.
Modifying source code without approval
B. Promoting programs to production without approval
C. Developers checking out source code without approval
D. Developers using Rapid Application Development (RAD) methodologies without approval

Correct Answer: B

Certified Information Systems Security Professional – CISSP – Question063

Which of the following is part of a Trusted Platform Module (TPM)?

A.
A non-volatile tamper-resistant storage for storing both data and signing keys in a secure fashion
B. A protected Pre-Basic Input/Output System (BIOS) which specifies a method or a metric for “measuring” the state of a computing platform
C. A secure processor targeted at managing digital keys and accelerating digital signing
D. A platform-independent software interface for accessing computer functions

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question062

Which of the following MUST be part of a contract to support electronic discovery of data stored in a cloud environment?

A.
identification of data location
B. integration with organizational directory services for authentication
C. accommodation of hybrid deployment models
D. tokenization of data

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question060

Which of the following is a common characteristic of privacy?

A.
Provision for maintaining an audit trail of access to the private data
B. Notice to the subject of the existence of a database containing relevant credit card data
C. Process for the subject to inspect and correct personal data on-site
D. Database requirements for integration of privacy data

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question059

Which security access policy contains fixed security attributes that are used by the system to determine a user’s access to a file or object?

A.
Mandatory Access Control (MAC)
B. Access Control List (ACL)
C. Discretionary Access Control (DAC)
D. Authorized user control

Correct Answer: A