Certified Information Systems Security Professional – CISSP – Question057

The organization would like to deploy an authorization mechanism for an Information Technology (IT) infrastructure project with high employee turnover. Which access control mechanism would be preferred?

A.
Attribute Based Access Control (ABAC)
B. Discretionary Access Control (DAC)
C. Mandatory Access Control (MAC)
D. Role-Based Access Control (RBAC)

Correct Answer: D

Certified Information Systems Security Professional – CISSP – Question054

In Disaster Recovery (DR) and Business Continuity (DC) training, which BEST describes a functional drill?

A.
a functional evacuation of personnel
B. a specific test by response teams of individual emergency response functions
C. an activation of the backup site
D. a full-scale simulation of an emergency and the subsequent response functions.

Correct Answer: D

Certified Information Systems Security Professional – CISSP – Question050

What is the expected outcome of security awareness in support of a security awareness program?

A.
Awareness activities should be used to focus on security concerns and respond to those concerns accordingly
B. Awareness is not an activity or part of the training but rather a state of persistence to support the program
C. Awareness is training. The purpose of awareness presentations is to broaden attention of security.
D. Awareness is not training. The purpose of awareness presentation is simply to focus attention on security.

Correct Answer: C