Certified Information Systems Security Professional – CISSP – Question145

What is the PRIMARY reason for implementing change management?

A.
Certify and approve releases to the environment
B. Provide version rollbacks for system changes
C. Ensure that all applications are approved
D. Ensure accountability for changes to the environment

Correct Answer: D

Certified Information Systems Security Professional – CISSP – Question144

Which of the following types of business continuity tests includes assessment of resilience to internal and external risks without endangering live operations?

A.
Walkthrough
B. Simulation
C. Parallel
D. White box

Certified Information Systems Security Professional – CISSP – Question143

An organization is found lacking the ability to properly establish performance indicators for its Web hosting solution during an audit. What would be the MOST probable cause?

A.
Absence of a Business Intelligence (BI) solution
B. Inadequate cost modeling
C. Improper deployment of the Service-Oriented Architecture (SOA)
D. Insufficient Service Level Agreement (SLA)

Correct Answer: D

Certified Information Systems Security Professional – CISSP – Question142

Which of the following is a responsibility of the information owner?

A.
Ensure that users and personnel complete the required security training to access the Information System (IS)
B. Defining proper access to the Information System (IS), including privileges or access rights
C. Managing identification, implementation, and assessment of common security controls
D. Ensuring the Information System (IS) is operated according to agreed upon security requirements

Correct Answer: C

Certified Information Systems Security Professional – CISSP – Question141

A vulnerability assessment report has been submitted to a client. The client indicates that one third of the hosts that were in scope are missing from the report. In which phase of the assessment was this error MOST likely made?

A.
Enumeration
B. Reporting
C. Detection
D. Discovery

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question140

What MUST each information owner do when a system contains data from multiple information owners?

A.
Provide input to the Information System (IS) owner regarding the security requirements of the data
B. Review the Security Assessment report (SAR) for the Information System (IS) and authorize the IS to operate.
C. Develop and maintain the System Security Plan (SSP) for the Information System (IS) containing the data
D. Move the data to an Information System (IS) that does not contain data owned by other information owners

Correct Answer: C

Certified Information Systems Security Professional – CISSP – Question138

After following the processes defined within the change management plan, a super user has upgraded a device within an Information system. What step would be taken to ensure that the upgrade did NOT affect the network security posture?

A.
Conduct an Assessment and Authorization (A&A)
B. Conduct a security impact analysis
C. Review the results of the most recent vulnerability scan
D. Conduct a gap analysis with the baseline configuration

Correct Answer: B

Certified Information Systems Security Professional – CISSP – Question136

Assessing a third party’s risk by counting bugs in the code may not be the best measure of an attack surface within the supply chain. Which of the following is LEAST associated with the attack surface?

A.
Input protocols
B. Target processes
C. Error messages
D. Access rights

Correct Answer: C