Certified Information Systems Security Professional – CISSP – Question176

Which of the following is a web application control that should be put into place to prevent exploitation of Operating System (OS) bugs?

A.
Check arguments in function calls
B. Test for the security patch level of the environment
C. Include logging functions
D. Digitally sign each application module

Correct Answer: B

Certified Information Systems Security Professional – CISSP – Question175

What is the BEST approach to addressing security issues in legacy web applications?

A.
Debug the security issues
B. Migrate to newer, supported applications where possible
C. Conduct a security assessment
D. Protect the legacy application with a web application firewall

Correct Answer: D

Certified Information Systems Security Professional – CISSP – Question174

The configuration management and control task of the certification and accreditation process is incorporated in which phase of the System Development Life Cycle (SDLC)?

A.
System acquisition and development
B. System operations and maintenance
C. System initiation
D. System implementation

Certified Information Systems Security Professional – CISSP – Question173

Which of the following is the BEST method to prevent malware from being introduced into a production environment?

A.
Purchase software from a limited list of retailers
B. Verify the hash key or certificate key of all updates
C. Do not permit programs, patches, or updates from the Internet
D. Test all new software in a segregated environment

Correct Answer: D

Certified Information Systems Security Professional – CISSP – Question172

When in the Software Development Life Cycle (SDLC) MUST software security functional requirements be defined?

A.
After the system preliminary design has been developed and the data security categorization has been performed
B. After the vulnerability analysis has been performed and before the system detailed design begins
C. After the system preliminary design has been developed and before the data security categorization begins
D. After the business functional analysis and the data security categorization have been performed

Correct Answer: C

Certified Information Systems Security Professional – CISSP – Question171

Which of the following is the PRIMARY risk with using open source software in a commercial software construction?

A.
Lack of software documentation
B. License agreements requiring release of modified code
C. Expiration of the license agreement
D. Costs associated with support of the software

Correct Answer: D

Certified Information Systems Security Professional – CISSP – Question170

A Java program is being developed to read a file from computer A and write it to computer B, using a third computer C.The program is not working as expected. What is the MOST probable security feature of Java preventing the program from operating as intended?

A.
Least privilege
B. Privilege escalation
C. Defense in depth
D. Privilege bracketing

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question169

Which of the following is the MOST challenging issue in apprehending cyber criminals?

A.
They often use sophisticated method to commit a crime.
B. It is often hard to collect and maintain integrity of digital evidence.
C. The crime is often committed from a different jurisdiction.
D. There is often no physical evidence involved.

Correct Answer: C

Certified Information Systems Security Professional – CISSP – Question166

What is the MAIN purpose of a change management policy?

A.
To assure management that changes to the Information Technology (IT) infrastructure are necessary
B. To identify the changes that may be made to the Information Technology (IT) infrastructure
C. To verify that changes to the Information Technology (IT) infrastructure are approved
D. To determine the necessary for implementing modifications to the Information Technology (IT) infrastructure

Correct Answer: C