Certified Information Systems Security Professional – CISSP – Question074

When developing a business case for updating a security program, the security program owner MUST do which of the following?

A.
Identify relevant metrics
B. Prepare performance test reports
C. Obtain resources for the security program
D. Interview executive management

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question072

Sensitive customer data is going to be added to a database. What is the MOST effective implementation for ensuring data privacy?

A.
Mandatory Access Control (MAC) procedures
B. Discretionary Access Control (DAC) procedures
C. Segregation of duties
D. Data link encryption

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question071

What is the MAIN goal of information security awareness and training?

A.
To inform users of the latest malware threats
B. To inform users of information assurance responsibilities
C. To comply with the organization information security policy
D. To prepare students for certification

Correct Answer: B

Certified Information Systems Security Professional – CISSP – Question070

Which security approach will BEST minimize Personally Identifiable Information (PII) loss from a data breach?

A.
End-to-end data encryption for data in transit
B. Continuous monitoring of potential vulnerabilities
C. A strong breach notification process
D. Limited collection of individuals’ confidential data

Correct Answer: D

Certified Information Systems Security Professional – CISSP – Question069

Which of the following is a responsibility of a data steward?

A.
Ensure alignment of the data governance effort to the organization.
B. Conduct data governance interviews with the organization.
C. Document data governance requirements.
D. Ensure that data decisions and impacts are communicated to the organization.

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question068

Which of the following is a characteristic of an internal audit?

A.
An internal audit is typically shorter in duration than an external audit.
B. The internal audit schedule is published to the organization well in advance.
C. The internal auditor reports to the Information Technology (IT) department
D. Management is responsible for reading and acting upon the internal audit results

Correct Answer: D

Certified Information Systems Security Professional – CISSP – Question067

A security compliance manager of a large enterprise wants to reduce the time it takes to perform network, system, and application security compliance audits while increasing quality and effectiveness of the results. What should be implemented to BEST achieve the desired results?

A.
Configuration Management Database (CMDB)
B. Source code repository
C. Configuration Management Plan (CMP)
D. System performance monitoring application

Correct Answer: C

Certified Information Systems Security Professional – CISSP – Question066

Which of the following could be considered the MOST significant security challenge when adopting DevOps practices compared to a more traditional control framework?

A.
Achieving Service Level Agreements (SLA) on how quickly patches will be released when a security flaw is found.
B. Maintaining segregation of duties.
C. Standardized configurations for logging, alerting, and security metrics.
D. Availability of security teams at the end of design process to perform last-minute manual audits and reviews.

Correct Answer: B

Certified Information Systems Security Professional – CISSP – Question065

Which of the following combinations would MOST negatively affect availability?

A.
Denial of Service (DoS) attacks and outdated hardware
B. Unauthorized transactions and outdated hardware
C. Fire and accidental changes to data
D. Unauthorized transactions and denial of service attacks

Correct Answer: A