Certified Information Systems Security Professional – CISSP – Question134

An international medical organization with headquarters in the United States (US) and branches in France wants to test a drug in both countries. What is the organization allowed to do with the test subject’s data?

A.
Aggregate it into one database in the US
B. Process it in the US, but store the information in France
C. Share it with a third party
D. Anonymize it and process it in the US

Correct Answer: C

Certified Information Systems Security Professional – CISSP – Question133

Which of the following would BEST support effective testing of patch compatibility when patches are applied to an organization’s systems?

A.
Standardized configurations for devices
B. Standardized patch testing equipment
C. Automated system patching
D. Management support for patching

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question131

What is the MAIN reason for testing a Disaster Recovery Plan (DRP)?

A.
To ensure Information Technology (IT) staff knows and performs roles assigned to each of them
B. To validate backup sites’ effectiveness
C. To find out what does not work and fix it
D. To create a high level DRP awareness among Information Technology (IT) staff

Correct Answer: B

Certified Information Systems Security Professional – CISSP – Question128

Which of the following is a PRIMARY benefit of using a formalized security testing report format and structure?

A.
Executive audiences will understand the outcomes of testing and most appropriate next steps for corrective actions to be taken
B. Technical teams will understand the testing objectives, testing strategies applied, and business risk associated with each vulnerability
C. Management teams will understand the testing objectives and reputational risk to the organization
D. Technical and management teams will better understand the testing objectives, results of each test phase, and potential impact levels

Correct Answer: D

Certified Information Systems Security Professional – CISSP – Question127

A Virtual Machine (VM) environment has five guest Operating Systems (OS) and provides strong isolation. What MUST an administrator review to audit a user’s access to data files?

A.
Host VM monitor audit logs
B. Guest OS access controls
C. Host VM access controls
D. Guest OS audit logs

Correct Answer: A