★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW CISSP Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/CISSP-dumps.html


Q21. A disadvantage of an application filtering firewall is that it can lead to 

A. a crash of the network as a result of user activities. 

B. performance degradation due to the rules applied. 

C. loss of packets on the network due to insufficient bandwidth. 

D. Internet Protocol (IP) spoofing by hackers. 

Answer:


Q22. The.Hardware Abstraction Layer (HAL).is implemented in the 

A. system software. 

B. system hardware. 

C. application software. 

D. network hardware. 

Answer:


Q23. To prevent inadvertent disclosure of restricted information, which of the following would be the LEAST effective process for eliminating data prior to the media being discarded? 

A. Multiple-pass overwriting 

B. Degaussing 

C. High-level formatting 

D. Physical destruction 

Answer:


Q24. A vulnerability test on an Information System (IS) is conducted to 

A. exploit security weaknesses in the IS. 

B. measure system performance on systems with weak security controls. 

C. evaluate the effectiveness of security controls. 

D. prepare for Disaster Recovery (DR) planning. 

Answer:


Q25. While investigating a malicious event, only six days of audit logs from the last month were available. What policy should be updated to address this problem? 

A. Retention 

B. Reporting 

C. Recovery 

D. Remediation 

Answer:


Q26. Which of the following is a critical factor for implementing a successful data classification program? 

A. Executive sponsorship 

B. Information security sponsorship 

C. End-user acceptance 

D. Internal audit acceptance 

Answer:


Q27. Regarding asset security and appropriate retention,.which of the following INITIAL.top three areas are.important.to focus on? 

A. Security control baselines, access controls, employee awareness and training 

B. Human resources, asset management, production management 

C. Supply chain lead time, inventory control, encryption 

D. Polygraphs, crime statistics, forensics 

Answer:


Q28. What is the MOST important purpose of testing the Disaster Recovery Plan (DRP)? 

A. Evaluating the efficiency of the plan 

B. Identifying the benchmark required for restoration 

C. Validating the effectiveness of the plan 

D. Determining the Recovery Time Objective (RTO) 

Answer:


Q29. Which of the following assures that rules are followed in an identity management architecture? 

A. Policy database 

B. Digital signature 

C. Policy decision point 

D. Policy enforcement point 

Answer:


Q30. In order for a security policy to be effective within an organization, it MUST include 

A. strong statements that clearly define the problem. 

B. a list of all standards that apply to the policy. 

C. owner information and date of last revision. 

D. disciplinary measures for non compliance. 

Answer: