Certified Information Systems Security Professional – CISSP – Question234

Which of the following is needed to securely distribute symmetric cryptographic keys?

A.
Officially approved Public-Key Infrastructure (PKI) Class 3 or Class 4 certificates
B. Officially approved and compliant key management technology and processes
C. An organizationally approved communication protection policy and key management plan
D. Hardware tokens that protect the user’s private key.

Correct Answer: C

Certified Information Systems Security Professional – CISSP – Question233

Which of the following is a document that identifies each item seized in an investigation, including date and time seized, full name and signature or initials of the person who seized the item, and a detailed description of the item?

A.
Property book
B. Chain of custody form
C. Search warrant return
D. Evidence tag

Correct Answer: D

Certified Information Systems Security Professional – CISSP – Question229

The PRIMARY outcome of a certification process is that it provides documented

A.
interconnected systems and their implemented security controls.
B. standards for security assessment, testing, and process evaluation.
C. system weakness for remediation.
D. security analyses needed to make a risk-based decision.

Correct Answer: D