Certified Information Systems Security Professional – CISSP – Question346

Why might a network administrator choose distributed virtual switches instead of stand-alone switches for network segmentation?

A.
To standardize on a single vendor
B. To ensure isolation of management traffic
C. To maximize data plane efficiency
D. To reduce the risk of configuration errors

Correct Answer: C

Certified Information Systems Security Professional – CISSP – Question344

Which of the following offers the BEST security functionality for transmitting authentication tokens?

A.
JavaScript Object Notation (JSON)
B. Terminal Access Controller Access Control System (TACACS)
C. Security Assertion Markup Language (SAML)
D. Remote Authentication Dial-In User Service (RADIUS)

Correct Answer: C

Certified Information Systems Security Professional – CISSP – Question342

An employee receives a promotion that entities them to access higher-level functions on the company’s accounting system, as well as keeping their access to the previous system that is no longer needed or applicable. What is the name of the process that tries to remove this excess privilege?

A.
Access provisioning
B. Segregation of Duties (SoD)
C. Access certification
D. Access aggregation

Correct Answer: B

Certified Information Systems Security Professional – CISSP – Question341

A financial company has decided to move its main business application to the Cloud. The legal department objects, arguing that the move of the platform should comply with several regulatory obligations such as the General Data Protection (GDPR) and ensure data confidentiality. The Chief Information Security Officer (CISO) says that the cloud provider has met all regulations requirements and even provides its own encryption solution with internally-managed encryption keys to address data confidentiality. Did the CISO address all the legal requirements in this situation?

A.
No, because the encryption solution is internal to the cloud provider.
B. Yes, because the cloud provider meets all regulations requirements.
C. Yes, because the cloud provider is GDPR compliant.
D. No, because the cloud provider is not certified to host government data.

Correct Answer: B

Certified Information Systems Security Professional – CISSP – Question340

Compared with hardware cryptography, software cryptography is generally

A.
less expensive and slower.
B. more expensive and faster.
C. more expensive and slower.
D. less expensive and faster.