Certified Information Systems Security Professional – CISSP – Question226

Which of the following is the PRIMARY reason to perform regular vulnerability scanning of an organization network?

A.
Provide vulnerability reports to management.
B. Validate vulnerability remediation activities.
C. Prevent attackers from discovering vulnerabilities.
D. Remediate known vulnerabilities.

Correct Answer: B

Certified Information Systems Security Professional – CISSP – Question224

Which of the following BEST describes a chosen plaintext attack?

A.
The cryptanalyst can generate ciphertext from arbitrary text.
B. The cryptanalyst examines the communication being sent back and forth.
C. The cryptanalyst can choose the key and algorithm to mount the attack.
D. The cryptanalyst is presented with the ciphertext from which the original message is determined.

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question223

Which one of the following activities would present a significant security risk to organizations when employing a Virtual Private Network (VPN) solution?

A.
VPN bandwidth
B. Simultaneous connection to other networks
C. Users with Internet Protocol (IP) addressing conflicts
D. Remote users with administrative rights

Correct Answer: B

Certified Information Systems Security Professional – CISSP – Question222

Which of the following is a strategy of grouping requirements in developing a Security Test and Evaluation (ST&E)?

A.
Tactical, strategic, and financial
B. Management, operational, and technical
C. Documentation, observation, and manual
D. Standards, policies, and procedures

Correct Answer: B

Certified Information Systems Security Professional – CISSP – Question221

Which of the following is the MOST important goal of information asset valuation?

A.
Developing a consistent and uniform method of controlling access on information assets
B. Developing appropriate access control policies and guidelines
C. Assigning a financial value to an organization’s information assets
D. Determining the appropriate level of protection

Correct Answer: D

Certified Information Systems Security Professional – CISSP – Question220

A database administrator is asked by a high-ranking member of management to perform specific changes to the accounting system database. The administrator is specifically instructed to not track or evidence the change in a ticket. Which of the following is the BEST course of action?

A.
Ignore the request and do not perform the change.
B. Perform the change as requested, and rely on the next audit to detect and report the situation.
C. Perform the change, but create a change ticket regardless to ensure there is complete traceability.
D. Inform the audit committee or internal audit directly using the corporate whistleblower process.

Correct Answer: D

Certified Information Systems Security Professional – CISSP – Question218

What is the MOST important element when considering the effectiveness of a training program for Business Continuity (BC) and Disaster Recovery (DR)?

A.
Management support
B. Consideration of organizational need
C. Technology used for delivery
D. Target audience

Correct Answer: B

Certified Information Systems Security Professional – CISSP – Question217

Which of the following are effective countermeasures against passive network-layer attacks?

A.
Federated security and authenticated access controls
B. Trusted software development and run time integrity controls
C. Encryption and security enabled applications
D. Enclave boundary protection and computing environment defense

Correct Answer: C