The security controls that are implemented to manage physical security are divided in various groups. Which of the following services are offered by the administrative physical security control group? Each correct answer represents a part of the solution. Choose all that apply.
#241
Answer: ABC✅ Correct❌ Incorrect
Which of the following life cycle modeling activities establishes service relationships and message exchange paths?
#242
Answer: A✅ Correct❌ Incorrect
Within a large organization, what business unit is BEST positioned to initiate provisioning and deprovisioning of user accounts?
#243
Answer: C✅ Correct❌ Incorrect
In the common criteria, which of the following is a formal document that expresses an implementation-independent set of security requirements?
#244
Answer: C✅ Correct❌ Incorrect
Which of the following is an example of a vulnerability of full-disk encryption (FDE)?
#245
Answer: D✅ Correct❌ Incorrect
What is the FIRST step in reducing the exposure of a network to Internet Control Message Protocol (ICMP) based attacks?
#246
Answer: A✅ Correct❌ Incorrect
A large organization's human resources and security teams are planning on implementing technology to eliminate manual user access reviews and improve compliance. Which of the following options is MOST likely to resolve the issues associated with user access?
#247
Answer: C✅ Correct❌ Incorrect
Which of the following are the countermeasures against a man-in-the-middle attack? Each correct answer represents a complete solution. Choose all that apply.
#248
Answer: ACD✅ Correct❌ Incorrect
In which of the following alternative processing sites is the backup facility maintained in a constant order, with a full complement of servers, workstations, and communication links ready to assume the primary operations responsibility?
#249
Answer: A✅ Correct❌ Incorrect
Which of the following should the administrator ensure during the test of a disaster recovery plan?
#250
Answer: AC✅ Correct❌ Incorrect
Which of the following is a method for transforming a message into a masked form, together with a way of undoing the transformation to recover the message?
#251
Answer: C✅ Correct❌ Incorrect
Kerberos is a computer network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner. Which of the following statements are true about the Kerberos authentication scheme? Each correct answer represents a complete solution.
Choose all that apply.
#252
Answer: AD✅ Correct❌ Incorrect
An organization is considering partnering with a third-party supplier of cloud services. The organization will only be providing the data and the third-party supplier will be providing the security controls. Which of the following BEST describes this service offering?
#253
Answer: D✅ Correct❌ Incorrect
Which of the following factors should be considered characteristics of Attribute Based Access Control (ABAC) in terms of the attributes used?
#254
Answer: D✅ Correct❌ Incorrect
Which of the following is the MOST significant key management problem due to the number of keys created?
#255
Answer: A✅ Correct❌ Incorrect
Systems Security Professional (CISSP) with identity and access management (IAM) responsibilities is asked by the Chief Information Security Officer (CISO) to perform a vulnerability assessment on a web application to pass a Payment Card Industry (PCI) audit. The CISSP has never performed this before. According to the (ISC)
Code of Professional Ethics, which of the following should the CISSP do?
#256
Answer: A✅ Correct❌ Incorrect
While performing a security review for a new product, an information security professional discovers that the organization's product development team is proposing to collect government-issued identification (ID) numbers from customers to use as unique customer identifiers. Which of the following recommendations should be made to the product development team?
#257
Answer: C✅ Correct❌ Incorrect
What term is commonly used to describe hardware and software assets that are stored in a configuration management database (CMDB)?
#258
Answer: A✅ Correct❌ Incorrect
A company is planning to implement a private cloud infrastructure. Which of the following recommendations will support the move to a cloud infrastructure?
#259
Answer: A✅ Correct❌ Incorrect
Which is MOST important when negotiating an Internet service provider (ISP) service-level agreement (SLA) by an organization that solely provides Voice over
Internet Protocol (VoIP) services?
#260
Answer: D✅ Correct❌ Incorrect
A company hired an external vendor to perform a penetration test of a new payroll system. The company's internal test team had already performed an in-depth application and security test of the system and determined that it met security requirements. However, the external vendor uncovered significant security weaknesses where sensitive personal data was being sent unencrypted to the tax processing systems. What is the MOST likely cause of the security issues?
#261
Answer: D✅ Correct❌ Incorrect
Which of the following is included in change management?
#262
Answer: B✅ Correct❌ Incorrect
Which of the following is the BEST approach to implement multiple servers on a virtual system?
#263
Answer: A✅ Correct❌ Incorrect
Which of the following is the MOST common cause of system or security failures?
#264
Answer: B✅ Correct❌ Incorrect
The Chief Information Officer (CIO) has decided that as part of business modernization efforts the organization will move towards a cloud architecture. All business-critical data will be migrated to either internal or external cloud services within the next two years. The CIO has a PRIMARY obligation to work with personnel in which role in order to ensure proper protection of data during and after the cloud migration?
#265
Answer: B✅ Correct❌ Incorrect
A developer is creating an application that requires secure logging of all user activity. What is the BEST permission the developer should assign to the log file to ensure requirements are met?
#266
Answer: D✅ Correct❌ Incorrect
When performing an investigation with the potential for legal action, what should be the analyst's FIRST consideration?
#267
Answer: B✅ Correct❌ Incorrect
Building blocks for software-defined networks (SDN) require which of the following?
#268
Answer: C✅ Correct❌ Incorrect
What is the MINIMUM standard for testing a disaster recovery plan (DRP)?
#269
Answer: B✅ Correct❌ Incorrect
Which security audit standard provides the BEST way for an organization to understand a vendor's Information Systems (IS) in relation to confidentiality, integrity, and availability?