The "vulnerability of a facility" to damage or attack may be assessed by all of the following except:

The "vulnerability of a facility" to damage or attack may be assessed by all of the following except:A .  InspectionB .  History of lossesC .  Security controlsD .  security budgetView AnswerAnswer: D Explanation: Source: The CISSP Examination Textbook- Volume 2: Practice by S. Rao Vallabhaneni.

March 21, 2019 No Comments READ MORE +

One of the following assertions is NOT a characteristic of Internet Protocol Security (IPsec)

One of the following assertions is NOT a characteristic of Internet Protocol Security (IPsec)A .  Data cannot be read by unauthorized partiesB .  The identity of all IPsec endpoints are confirmed by other endpointsC .  Data is delivered in the exact order in which it is sentD .  The number...

March 20, 2019 No Comments READ MORE +

Which of the following would assist the most in Host Based intrusion detection?

Which of the following would assist the most in Host Based intrusion detection?A .  audit trails.B .  access control lists.C .  security clearances.D .  host-based authentication.View AnswerAnswer: A Explanation: To assist in Intrusion Detection you would review audit logs for access violations. The following answers are incorrect: access control lists. This...

March 20, 2019 No Comments READ MORE +

A security evaluation report and an accreditation statement are produced in which of the following phases of the system development life cycle?

A security evaluation report and an accreditation statement are produced in which of the following phases of the system development life cycle?A .  project initiation and planning phaseB .  system design specification phaseC .  development & documentation phaseD .  acceptance phaseView AnswerAnswer: D Explanation: The Answer "acceptance phase". Note the...

March 19, 2019 No Comments READ MORE +

Controls to keep password sniffing attacks from compromising computer systems include which of the following?

Controls to keep password sniffing attacks from compromising computer systems include which of the following?A .  static and recurring passwords.B .  encryption and recurring passwords.C .  one-time passwords and encryption.D .  static and one-time passwords.View AnswerAnswer: C Explanation: To minimize the chance of passwords being captured one-time passwords would prevent...

March 19, 2019 No Comments READ MORE +

Which of the following phases of a software development life cycle normally incorporates the security specifications, determines access controls, and evaluates encryption options?

Which of the following phases of a software development life cycle normally incorporates the security specifications, determines access controls, and evaluates encryption options?A .  Detailed designB .  ImplementationC .  Product designD .  Software plans and requirementsView AnswerAnswer: C

March 19, 2019 No Comments READ MORE +

Which property ensures that only the intended recipient can access the data and nobody else?

Which property ensures that only the intended recipient can access the data and nobody else?A .  ConfidentialityB .  CapabilityC .  IntegrityD .  AvailabilityView AnswerAnswer: A Explanation: Confidentiality is defined as the property that ensures that only the intended recipient can access the data and nobody else. It is usually achieve using...

March 18, 2019 No Comments READ MORE +

Which of the following is the FIRST step in protecting data's confidentiality?

Which of the following is the FIRST step in protecting data's confidentiality?A .  Install a firewallB .  Implement encryptionC .  Identify which information is sensitiveD .  Review all user access rightsView AnswerAnswer: C Explanation: In order to protect the confidentiality of the data. The following answers are incorrect because : Install...

March 18, 2019 No Comments READ MORE +

What refers to legitimate users accessing networked services that would normally be restricted to them?

What refers to legitimate users accessing networked services that would normally be restricted to them?A .  SpoofingB .  PiggybackingC .  EavesdroppingD .  Logon abuseView AnswerAnswer: D Explanation: Unauthorized access of restricted network services by the circumvention of security access controls is known as logon abuse. This type of abuse refers...

March 18, 2019 No Comments READ MORE +

Which of the following access control techniques best gives the security officers the ability to specify and enforce enterprise-specific security policies in a way that maps naturally to an organization's structure?

Which of the following access control techniques best gives the security officers the ability to specify and enforce enterprise-specific security policies in a way that maps naturally to an organization's structure?A .  Access control listsB .  Discretionary access controlC .  Role-based access controlD .  Non-mandatory access controlView AnswerAnswer: C Explanation:...

March 18, 2019 No Comments READ MORE +