Certified Information Systems Security Professional – CISSP – Question206

When writing security assessment procedures, what is the MAIN purpose of the test outputs and reports?

A.
To force the software to fail and document the process
B. To find areas of compromise in confidentiality and integrity
C. To allow for objective pass or fail decisions
D. To identify malware or hidden code within the test results

Correct Answer: C

Certified Information Systems Security Professional – CISSP – Question204

The PRIMARY purpose of accreditation is to:

A.
comply with applicable laws and regulations.
B. allow senior management to make an informed decision regarding whether to accept the risk of operating the system.
C. protect an organization’s sensitive data.
D. verify that all security controls have been implemented properly and are operating in the correct manner.

Correct Answer: B

Certified Information Systems Security Professional – CISSP – Question201

Which of the following BEST describes Recovery Time Objective (RTO)?


A.
Time of application resumption after disaster
B. Time of application verification after disaster.
C. Time of data validation after disaster.
D. Time of data restoration from backup after disaster.

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question200

Which of the following approaches is the MOST effective way to dispose of data on multiple hard drives?

A.
Delete every file on each drive.
B. Destroy the partition table for each drive using the command line.
C. Degauss each drive individually.
D. Perform multiple passes on each drive using approved formatting methods.

Correct Answer: D

Certified Information Systems Security Professional – CISSP – Question198

Which of the following BEST represents the concept of least privilege?

A.
Access to an object is denied unless access is specifically allowed.
B. Access to an object is only available to the owner.
C. Access to an object is allowed unless it is protected by the information security policy.
D. Access to an object is only allowed to authenticated users via an Access Control List (ACL).

Correct Answer: A