Certified Information Systems Security Professional – CISSP – Question246

In general, servers that are facing the Internet should be placed in a demilitarized zone (DMZ). What is MAIN purpose of the DMZ?

A.
Reduced risk to internal systems.
B. Prepare the server for potential attacks.
C. Mitigate the risk associated with the exposed server.
D. Bypass the need for a firewall.

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question244

Which of the following is a characteristic of the initialization vector when using Data Encryption Standard (DES)?

A.
It must be known to both sender and receiver.
B. It can be transmitted in the clear as a random number.
C. It must be retained until the last block is transmitted.
D. It can be used to encrypt and decrypt information.

Correct Answer: B

Certified Information Systems Security Professional – CISSP – Question242

What balance MUST be considered when web application developers determine how informative application error messages should be constructed?

A.
Risk versus benefit
B. Availability versus auditability
C. Confidentiality versus integrity
D. Performance versus user satisfaction

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question241

What is the difference between media marking and media labeling?

A.
Media marking refers to the use of human-readable security attributes, while media labeling refers to the use of security attributes in internal data structures.
B. Media labeling refers to the use of human-readable security attributes, while media marking refers to the use of security attributes in internal data structures.
C. Media labeling refers to security attributes required by public policy/law, while media marking refers to security required by internal organizational policy.
D. Media marking refers to security attributes required by public policy/law, while media labeling refers to security attributes required by internal organizational policy.

Correct Answer: D

Certified Information Systems Security Professional – CISSP – Question240

A company was ranked as high in the following National Institute of Standards and Technology (NIST) functions: Protect, Detect, Respond and Recover. However, a low maturity grade was attributed to the Identify function. In which of the following the controls categories does this company need to improve when analyzing its processes individually?

A.
Asset Management, Business Environment, Governance and Risk Assessment
B. Access Control, Awareness and Training, Data Security and Maintenance
C. Anomalies and Events, Security Continuous Monitoring and Detection Processes
D. Recovery Planning, Improvements and Communications

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question239

An organization regularly conducts its own penetration tests. Which of the following scenarios MUST be covered for the test to be effective?

A.
Third-party vendor with access to the system
B. System administrator access compromised
C. Internal attacker with access to the system
D. Internal user accidentally accessing data

Correct Answer: C