Certified Information Systems Security Professional – CISSP – Question307

Which of the following is mobile device remote fingerprinting?

A.
Installing an application to retrieve common characteristics of the device
B. Storing information about a remote device in a cookie file
C. Identifying a device based on common characteristics shared by all devices of a certain type
D. Retrieving the serial number of the mobile device

Correct Answer: C

Certified Information Systems Security Professional – CISSP – Question305

Which of the following is the PRIMARY reason a sniffer operating on a network is collecting packets only from its own host?

A.
An Intrusion Detection System (IDS) has dropped the packets.
B. The network is connected using switches.
C. The network is connected using hubs.
D. The network’s firewall does not allow sniffing.

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question304

Which of the following is a process in the access provisioning lifecycle that will MOST likely identify access aggregation issues?

A.
Test
B. Assessment
C. Review
D. Peer review

Certified Information Systems Security Professional – CISSP – Question303

Which of the following is the BEST definition of Cross-Site Request Forgery (CSRF)?

A.
An attack which forces an end user to execute unwanted actions on a web application in which they are currently authenticated
B. An attack that injects a script into a web page to execute a privileged command
C. An attack that makes an illegal request across security zones and thereby forges itself into the security database of the system
D. An attack that forges a false Structure Query Language (SQL) command across systems

Correct Answer: A

Explanation:

Certified Information Systems Security Professional – CISSP – Question302

Which of the following is held accountable for the risk to organizational systems and data that result from outsourcing Information Technology (IT) systems and services?

A.
The acquiring organization
B. The service provider
C. The risk executive (function)
D. The IT manager

Correct Answer: C

Certified Information Systems Security Professional – CISSP – Question301

An organization that has achieved a Capability Maturity Model Integration (CMMI) level of 4 has done which of the following?

A.
Achieved optimized process performance
B. Achieved predictable process performance
C. Addressed the causes of common process variance
D. Addressed continuous innovative process improvement

Certified Information Systems Security Professional – CISSP – Question300

A user downloads a file from the Internet, then applies the Secure Hash Algorithm 3 (SHA-3) to it. Which of the following is the MOST likely reason for doing so?

A.
It verifies the integrity of the file.
B. It checks the file for malware.
C. It ensures the entire file downloaded.
D. It encrypts the entire file.

Correct Answer: A

Explanation:

Certified Information Systems Security Professional – CISSP – Question299

What determines the level of security of a combination lock?

A.
Complexity of combination required to open the lock
B. Amount of time it takes to brute force the combination
C. The number of barrels associated with the internal mechanism
D. The hardness score of the metal lock material

Correct Answer: A

Explanation:

Reference: https://books.google.com.pk/books?id=RbihG-YALUkC&pg=PA976&lpg=PA97… +level+of+security+of+a+combination +lock&source=bl&ots=ld6arg_Pl9&sig=ACfU3U0kh_Trrg6mQ65NmAP5PnUCIPmD0Q&hl=en&sa=X&ved=2ahUKEwjg69zN4 KnpAhUJmRoKHR01B_MQ6AEwDHoECBUQAQ#v=onepage&q=combination%20lock&f=false

Certified Information Systems Security Professional – CISSP – Question298

A new Chief Information Officer (CIO) created a group to write a data retention policy based on applicable laws. Which of the following is the PRIMARY motivation for the policy?

A.
To back up data that is used on a daily basis
B. To dispose of data in order to limit liability
C. To reduce costs by reducing the amount of retained data
D. To classify data according to what it contains

Correct Answer: D