Certified Information Systems Security Professional – CISSP – Question064

In a change-controlled environment, which of the following is MOST likely to lead to unauthorized changes to production programs?

A.
Modifying source code without approval
B. Promoting programs to production without approval
C. Developers checking out source code without approval
D. Developers using Rapid Application Development (RAD) methodologies without approval

Correct Answer: B

Certified Information Systems Security Professional – CISSP – Question063

Which of the following is part of a Trusted Platform Module (TPM)?

A.
A non-volatile tamper-resistant storage for storing both data and signing keys in a secure fashion
B. A protected Pre-Basic Input/Output System (BIOS) which specifies a method or a metric for “measuring” the state of a computing platform
C. A secure processor targeted at managing digital keys and accelerating digital signing
D. A platform-independent software interface for accessing computer functions

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question062

Which of the following MUST be part of a contract to support electronic discovery of data stored in a cloud environment?

A.
identification of data location
B. integration with organizational directory services for authentication
C. accommodation of hybrid deployment models
D. tokenization of data

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question060

Which of the following is a common characteristic of privacy?

A.
Provision for maintaining an audit trail of access to the private data
B. Notice to the subject of the existence of a database containing relevant credit card data
C. Process for the subject to inspect and correct personal data on-site
D. Database requirements for integration of privacy data

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question059

Which security access policy contains fixed security attributes that are used by the system to determine a user’s access to a file or object?

A.
Mandatory Access Control (MAC)
B. Access Control List (ACL)
C. Discretionary Access Control (DAC)
D. Authorized user control

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question057

The organization would like to deploy an authorization mechanism for an Information Technology (IT) infrastructure project with high employee turnover. Which access control mechanism would be preferred?

A.
Attribute Based Access Control (ABAC)
B. Discretionary Access Control (DAC)
C. Mandatory Access Control (MAC)
D. Role-Based Access Control (RBAC)

Correct Answer: D