Certified Information Systems Security Professional – CISSP – Question215

Although code using a specific program language may not be susceptible to a buffer overflow attack,

A.
most calls to plug-in programs are susceptible.
B. most supporting application code is susceptible.
C. the graphical images used by the application could be susceptible.
D. the supporting virtual machine could be susceptible.

Correct Answer: C

Certified Information Systems Security Professional – CISSP – Question211

How should an organization determine the priority of its remediation efforts after a vulnerability assessment has been conducted?

A.
Use an impact-based approach.
B. Use a risk-based approach.
C. Use a criticality-based approach.
D. Use a threat-based approach.

Correct Answer: B

Certified Information Systems Security Professional – CISSP – Question210

A user sends an e-mail request asking for read-only access to files that are not considered sensitive. A Discretionary Access Control (DAC) methodology is in place. Which is the MOST suitable approach that the administrator should take?

A.
Administrator should request data owner approval to the user access
B. Administrator should request manager approval for the user access
C. Administrator should directly grant the access to the non-sensitive files
D. Administrator should assess the user access need and either grant or deny the access

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question209

Which of the following is MOST important when deploying digital certificates?

A.
Validate compliance with X.509 digital certificate standards
B. Establish a certificate life cycle management framework
C. Use a third-party Certificate Authority (CA)
D. Use no less than 256-bit strength encryption when creating a certificate

Correct Answer: B

Certified Information Systems Security Professional – CISSP – Question208

Which of the following is BEST suited for exchanging authentication and authorization messages in a multi-party decentralized environment?

A.
Lightweight Directory Access Protocol (LDAP)
B. Security Assertion Markup Language (SAML)
C. Internet Mail Access Protocol
D. Transport Layer Security (TLS)

Correct Answer: B