Certified Information Systems Security Professional – CISSP – Question254

A company has decided that they need to begin maintaining assets deployed in the enterprise. What approach should be followed to determine and maintain ownership information to bring the company into compliance?

A.
Enterprise asset management framework
B. Asset baseline using commercial off the shelf software
C. Asset ownership database using domain login records
D. A script to report active user logins on assets

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question253

Which of the following adds end-to-end security inside a Layer 2 Tunneling Protocol (L2TP) Internet Protocol Security (IPSec) connection?

A.
Temporal Key Integrity Protocol (TKIP)
B. Secure Hash Algorithm (SHA)
C. Secure Shell (SSH)
D. Transport Layer Security (TLS)

Correct Answer: B

Certified Information Systems Security Professional – CISSP – Question251

Which of the following countermeasures is the MOST effective in defending against a social engineering attack?

A.
Mandating security policy acceptance
B. Changing individual behavior
C. Evaluating security awareness training
D. Filtering malicious e-mail content

Correct Answer: C

Certified Information Systems Security Professional – CISSP – Question248

Which of the following is the PRIMARY reason for employing physical security personnel at entry points in facilities where card access is in operation?

A.
To verify that only employees have access to the facility.
B. To identify present hazards requiring remediation.
C. To monitor staff movement throughout the facility.
D. To provide a safe environment for employees.

Correct Answer: D

Certified Information Systems Security Professional – CISSP – Question247

Network-based logging has which advantage over host-based logging when reviewing malicious activity about a victim machine?

A.
Addresses and protocols of network-based logs are analyzed.
B. Host-based system logging has files stored in multiple locations.
C. Properly handled network-based logs may be more reliable and valid.
D. Network-based systems cannot capture users logging into the console.

Correct Answer: A