Certified Information Systems Security Professional – CISSP – Question277

Which of the following are important criteria when designing procedures and acceptance criteria for acquired software?

A.
Code quality, security, and origin
B. Architecture, hardware, and firmware
C. Data quality, provenance, and scaling
D. Distributed, agile, and bench testing

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question276

Which of the following statements is TRUE regarding state-based analysis as a functional software testing technique?

A.
It is characterized by the stateless behavior of a process implemented in a function
B. Test inputs are obtained from the derived boundaries of the given functional specifications
C. An entire partition can be covered by considering only one representative value from that partition
D. It is useful for testing communications protocols and graphical user interfaces

Correct Answer: D

Certified Information Systems Security Professional – CISSP – Question275

Which of the following is a benefit in implementing an enterprise Identity and Access Management (IAM) solution?

A.
Password requirements are simplified.
B. Risk associated with orphan accounts is reduced.
C. Segregation of duties is automatically enforced.
D. Data confidentiality is increased.

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question274

Which of the following is the BEST reason for the use of security metrics?

A.
They ensure that the organization meets its security objectives.
B. They provide an appropriate framework for Information Technology (IT) governance.
C. They speed up the process of quantitative risk assessment.
D. They quantify the effectiveness of security processes.

Correct Answer: B

Certified Information Systems Security Professional – CISSP – Question269

Which of the following is the MOST important part of an awareness and training plan to prepare employees for emergency situations?

A.
Having emergency contacts established for the general employee population to get information
B. Conducting business continuity and disaster recovery training for those who have a direct role in the recovery
C. Designing business continuity and disaster recovery training programs for different audiences
D. Publishing a corporate business continuity and disaster recovery plan on the corporate website

Correct Answer: C

Certified Information Systems Security Professional – CISSP – Question268

Which of the following is the MOST effective practice in managing user accounts when an employee is terminated?

A.
Implement processes for automated removal of access for terminated employees.
B. Delete employee network and system IDs upon termination.
C. Manually remove terminated employee user-access to all systems and applications.
D. Disable terminated employee network ID to remove all access.

Correct Answer: B