Certified Information Systems Security Professional – CISSP – Question196

How does a Host Based Intrusion Detection System (HIDS) identify a potential attack?

A.
Examines log messages or other indications on the system.
B. Monitors alarms sent to the system administrator
C. Matches traffic patterns to virus signature files
D. Examines the Access Control List (ACL)

Correct Answer: C

Certified Information Systems Security Professional – CISSP – Question195

What is a characteristic of Secure Sockets Layer (SSL) and Transport Layer Security (TLS)?

A.
SSL and TLS provide a generic channel security mechanism on top of Transmission Control Protocol (TCP).
B. SSL and TLS provide nonrepudiation by default.
C. SSL and TLS do not provide security for most routed protocols.
D. SSL and TLS provide header encapsulation over HyperText Transfer Protocol (HTTP).

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question194

What does the Maximum Tolerable Downtime (MTD) determine?

A.
The estimated period of time a business critical database can remain down before customers are affected.
B. The fixed length of time a company can endure a disaster without any Disaster Recovery (DR) planning
C. The estimated period of time a business can remain interrupted beyond which it risks never recovering
D. The fixed length of time in a DR process before redundant systems are engaged

Correct Answer: C

Certified Information Systems Security Professional – CISSP – Question192

The goal of a Business Impact Analysis (BIA) is to determine which of the following?

A.
Cost effectiveness of business recovery
B. Cost effectiveness of installing software security patches
C. Resource priorities for recovery and Maximum Tolerable Downtime (MTD)
D. Which security measures should be implemented

Correct Answer: C

Certified Information Systems Security Professional – CISSP – Question191

An employee of a retail company has been granted an extended leave of absence by Human Resources (HR). This information has been formally communicated to the access provisioning team. Which of the following is the BEST action to take?

A.
Revoke access temporarily.
B. Block user access and delete user account after six months.
C. Block access to the offices immediately.
D. Monitor account usage temporarily.

Correct Answer: D

Certified Information Systems Security Professional – CISSP – Question190

When evaluating third-party applications, which of the following is the GREATEST responsibility of Information Security?

A.
Accept the risk on behalf of the organization.
B. Report findings to the business to determine security gaps.
C. Quantify the risk to the business for product selection.
D. Approve the application that best meets security requirements.

Correct Answer: C

Certified Information Systems Security Professional – CISSP – Question189

During the Security Assessment and Authorization process, what is the PRIMARY purpose for conducting a hardware and software inventory?

A.
Calculate the value of assets being accredited.
B. Create a list to include in the Security Assessment and Authorization package.
C. Identify obsolete hardware and software.
D. Define the boundaries of the information system.

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question187

An application developer is deciding on the amount of idle session time that the application allows before a timeout. The BEST reason for determining the session timeout requirement is

A.
organization policy.
B. industry best practices.
C. industry laws and regulations.
D. management feedback.

Correct Answer: A