Uploaded by xet50030

ISC-CISSP

advertisement
ISC
CISSP
Certified Information Systems Security
Professional (CISSP)
Web: www.exactinside.com
Version: Demo
Email: support@exactinside.com
[ Total Questions: 10]
IMPORTANT NOTICE
Feedback
We have developed quality product and state-of-art service to ensure our customers interest. If you have any
suggestions, please feel free to contact us at feedback@exactinside.com
Support
If you have any questions about our product, please provide the following items:
exam code
screenshot of the question
login id/email
please contact us at support@exactinside.com and our technical experts will provide support within 24 hours.
Copyright
The product of each order has its own encryption code, so you should use it independently. Any unauthorized
changes will inflict legal punishment. We reserve the right of final explanation for this statement.
Exact Questions
ISC - CISSP
Exam Topic Breakdown
Exam Topic
Number of Questions
Topic 12 : NEW QUESTIONS A
2
Topic 7 : . Security Operations
2
Topic 11 : Exam Set C
2
Topic 1 : Security and Risk Management
2
Topic 9 : Exam Set A
2
Topic 13 : New Questions B
0
Topic 4 : . Communication and Network Security
0
Topic 5 : . Identity and Access Management (IAM)
0
Topic 6 : . Security Assessment and Testing
0
Topic 3 : . Security Architecture and Engineering
0
Topic 10 : Exam Set B
0
Topic 14 : NEW Questions C
0
Topic 8 : . Software Development Security
0
Topic 2 : . Asset Security
0
TOTAL
10
Find Everything , Exactly in your Exam
1 of 16
Exact Questions
ISC - CISSP
Topic 12, NEW QUESTIONS A
Question #:1 - (Exam Topic 12)
Knowing the language in which an encrypted message was originally produced might help a cryptanalyst to
perform a
A. clear-text attack.
B. known cipher attack.
C. frequency analysis.
D. stochastic assessment.
Answer: C
Question #:2 - (Exam Topic 12)
A proxy firewall operates at what layer of the Open System Interconnection (OSI) model?
A. Transport
B. Data link
C. Network
D. Application
Answer: D
Find Everything , Exactly in your Exam
2 of 16
Exact Questions
ISC - CISSP
Topic 7, . Security Operations
Question #:3 - (Exam Topic 7)
A continuous information security monitoring program can BEST reduce risk through which of the following?
A. Collecting security events and correlating them to identify anomalies
B. Facilitating system-wide visibility into the activities of critical user accounts
C. Encompassing people, process, and technology
D. Logging both scheduled and unscheduled system changes
Answer: B
Question #:4 - (Exam Topic 7)
Which of the following is a PRIMARY advantage of using a third-party identity service?
A. Consolidation of multiple providers
B. Directory synchronization
C. Web based logon
D. Automated account management
Answer: D
Find Everything , Exactly in your Exam
3 of 16
Exact Questions
ISC - CISSP
Topic 11, Exam Set C
Question #:5 - (Exam Topic 11)
Order the below steps to create an effective vulnerability management process.
Answer:
Explanation
Find Everything , Exactly in your Exam
4 of 16
Exact Questions
ISC - CISSP
Question #:6 - (Exam Topic 11)
Which of the following disaster recovery test plans will be MOST effective while providing minimal risk?
A. Read-through
B. Parallel
C. Full interruption
D. Simulation
Answer: D
Find Everything , Exactly in your Exam
5 of 16
Exact Questions
ISC - CISSP
Topic 1, Security and Risk Management
Question #:7 - (Exam Topic 1)
A company whose Information Technology (IT) services are being delivered from a Tier 4 data center, is
preparing a companywide Business Continuity Planning (BCP). Which of the following failures should the IT
manager be concerned with?
A. Application
B. Storage
C. Power
D. Network
Answer: C
Explanation
References:
Question #:8 - (Exam Topic 1)
Intellectual property rights are PRIMARY concerned with which of the following?
A. Owner’s ability to realize financial gain
B. Owner’s ability to maintain copyright
C. Right of the owner to enjoy their creation
D. Right of the owner to control delivery method
Answer: D
Find Everything , Exactly in your Exam
6 of 16
Exact Questions
ISC - CISSP
Topic 9, Exam Set A
Question #:9 - (Exam Topic 9)
Two companies wish to share electronic inventory and purchase orders in a supplier and client relationship.
What is the BEST security solution for them?
A. Write a Service Level Agreement (SLA) for the two companies.
B. Set up a Virtual Private Network (VPN) between the two companies.
C. Configure a firewall at the perimeter of each of the two companies.
D. Establish a File Transfer Protocol (FTP) connection between the two companies.
Answer: B
Question #:10 - (Exam Topic 9)
A system has been scanned for vulnerabilities and has been found to contain a number of communication ports
that have been opened without authority. To which of the following might this system have been subjected?
A. Trojan horse
B. Denial of Service (DoS)
C. Spoofing
D. Man-in-the-Middle (MITM)
Answer: A
Find Everything , Exactly in your Exam
7 of 16
Exact Questions
ISC - CISSP
Topic 13, New Questions B
Find Everything , Exactly in your Exam
8 of 16
Exact Questions
ISC - CISSP
Topic 4, . Communication and Network Security
Find Everything , Exactly in your Exam
9 of 16
Exact Questions
ISC - CISSP
Topic 5, . Identity and Access Management (IAM)
Find Everything , Exactly in your Exam
10 of 16
Exact Questions
ISC - CISSP
Topic 6, . Security Assessment and Testing
Find Everything , Exactly in your Exam
11 of 16
Exact Questions
ISC - CISSP
Topic 3, . Security Architecture and Engineering
Find Everything , Exactly in your Exam
12 of 16
Exact Questions
ISC - CISSP
Topic 10, Exam Set B
Find Everything , Exactly in your Exam
13 of 16
Exact Questions
ISC - CISSP
Topic 14, NEW Questions C
Find Everything , Exactly in your Exam
14 of 16
Exact Questions
ISC - CISSP
Topic 8, . Software Development Security
Find Everything , Exactly in your Exam
15 of 16
Exact Questions
ISC - CISSP
Topic 2, . Asset Security
Find Everything , Exactly in your Exam
16 of 16
About exactinside.com
exactinside.com was founded in 2007. We provide latest & high quality IT / Business Certification Training Exam
Questions, Study Guides, Practice Tests.
We help you pass any IT / Business Certification Exams with 100% Pass Guaranteed or Full Refund. Especially
Cisco, CompTIA, Citrix, EMC, HP, Oracle, VMware, Juniper, Check Point, LPI, Nortel, EXIN and so on.
View list of all certification exams: All vendors
We prepare state-of-the art practice tests for certification exams. You can reach us at any of the email addresses listed
below.
Sales: sales@exactinside.com
Feedback: feedback@exactinside.com
Support: support@exactinside.com
Any problems about IT certification or our products, You can write us back and we will get back to you within 24
hours.
Download