Certified Information Systems Security Professional – CISSP – Question043

Which component of the Security Content Automation Protocol (SCAP) specification contains the data required to estimate the severity of vulnerabilities identified automated vulnerability assessments?

A.
Common Vulnerabilities and Exposures (CVE)
B. Common Vulnerability Scoring System (CVSS)
C. Asset Reporting Format (ARF)
D. Open Vulnerability and Assessment Language (OVAL)

Correct Answer: B

Certified Information Systems Security Professional – CISSP – Question040

Which of the following mobile code security models relies only on trust?

A.
Code signing
B. Class authentication
C. Sandboxing
D. Type safety

Correct Answer: A

Explanation:

Certified Information Systems Security Professional – CISSP – Question038

A user has infected a computer with malware by connecting a Universal Serial Bus (USB) storage device. Which of the following is MOST effective to mitigate future infections?

A.
Develop a written organizational policy prohibiting unauthorized USB devices
B. Train users on the dangers of transferring data in USB devices
C. Implement centralized technical control of USB port connections
D. Encrypt removable USB devices containing data at rest

Correct Answer: C