Certified Information Systems Security Professional – CISSP – Question337

Physical assets defined in an organization’s Business Impact Analysis (BIA) could include which of the following?

A.
Personal belongings of organizational staff members
B. Supplies kept off-site at a remote facility
C. Cloud-based applications
D. Disaster Recovery (DR) line-item revenues

Correct Answer: B

Certified Information Systems Security Professional – CISSP – Question336

In order for application developers to detect potential vulnerabilities earlier during the Software Development Life Cycle (SDLC), which of the following safeguards should be implemented FIRST as part of a comprehensive testing framework?

A.
Source code review
B. Acceptance testing
C. Threat modeling
D. Automated testing

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question335

Which of the following Service Organization Control (SOC) report types should an organization request if they require a period of time report covering security and availability for a particular system?

A.
SOC 1 Type 1
B. SOC 1 Type 2
C. SOC 2 Type 1
D. SOC 2 Type 2

Certified Information Systems Security Professional – CISSP – Question334

Vulnerability scanners may allow for the administrator to assign which of the following in order to assist in prioritizing remediation activities?

A.
Definitions for each exposure type
B. Vulnerability attack vectors
C. Asset values for networks
D. Exploit code metrics

Correct Answer: C

Certified Information Systems Security Professional – CISSP – Question333

Why is planning the MOST critical phase of a Role Based Access Control (RBAC) implementation?

A.
The criteria for measuring risk is defined.
B. User populations to be assigned to each role is determined.
C. Role mining to define common access patterns is performed.
D. The foundational criteria are defined.

Correct Answer: B

Certified Information Systems Security Professional – CISSP – Question332

What access control scheme uses fine-grained rules to specify the conditions under which access to each data item or applications is granted?

A.
Mandatory Access Control (MAC)
B. Discretionary Access Control (DAC)
C. Role Based Access Control (RBAC)
D. Attribute Based Access Control (ABAC)

Correct Answer: D

Explanation:

Certified Information Systems Security Professional – CISSP – Question329

A development operations team would like to start building new applications delegating the cybersecurity responsibility as much as possible to the service provider. Which of the following environments BEST fits their need?

A.
Cloud Virtual Machines (VM)
B. Cloud application container within a Virtual Machine (VM)
C. On premises Virtual Machine (VM)
D. Self-hosted Virtual Machine (VM)

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question328

Which of the following processes has the PRIMARY purpose of identifying outdated software versions, missing patches, and lapsed system updates?

A.
Penetration testing
B. Vulnerability management
C. Software Development Life Cycle (SDLC)
D. Life cycle management