
10 minute read
EnsurePass ISC CISSP Exam Real Dumps Certified Information Systems Security Professional
ISC CISSP Exam | EnsurePass.com
ISC CISSP Certification Exam
Advertisement

Vendor: ISC
Exam Code: CISSP
Exam Name: Certified Information Systems Security Professional
Version: 13.01
Q & As: 2137
Contact Us: support@ensurepass.com. Copyright © 2014 by EnsurePass.com. All rights reserved.

Why do you choose EnsurePass.com for your exam Preparation:
1. Real Exam Questions and Answers with PDF and VCE Files. 2. Free VCE Software 3. We do provide Personal Consulting Services. 4. Money Back Guarantee.
How to buy:
CISSP Exam Questions & Answershttp://www.ensurepass.com/CISSP.html
ISC CISSP Exam | EnsurePass.com
QUESTION 1All of the following are basic components of a security policy EXCEPT the
A. definition of the issue and statement of relevant terms B. statement of roles and responsibilities C. statement of applicability and compliance requirements D. statement of performance of characteristics and requirements
Correct Answer: D
QUESTION 2A security policy would include all of the following EXCEPT
A. Background B. Scope statement C. Audit requirements D. Enforcement
Correct Answer: B
QUESTION 3Which one of the following is an important characteristic of an information security policy?
A. Identifies major functional areas of information. B. Quantifies the effect of the loss of the information. C. Requires the identification of information owners. D. Lists applications that support the business function.
Correct Answer: A
QUESTION 4Ensuring the integrity of business information is the PRIMARY concern of
A. Encryption Security B. Procedural Security C. Logical Security D. On-line Security
Correct Answer: B
Contact Us: support@ensurepass.com. Copyright © 2014 by EnsurePass.com. All rights reserved.
ISC CISSP Exam | EnsurePass.com
QUESTION 5Which of the following would be the first step in establishing an information security program?
A. Adoption of a corporate information security policy statement. B. Development and implementation of an information security standards manual. C. Development of a security awareness-training program. D. Purchase of security access control software.
Correct Answer: A
QUESTION 6Which of the following department managers would be best suited to oversee the development ofan information security policy?
A. Information Systems B. Human Resources C. Business operations D. Security administration
Correct Answer: C
QUESTION 7What is the function of a corporate information security policy?
A. Issue corporate standard to be used when addressing specific security problems. B. Issue guidelines in selecting equipment, configuration, design, and secure operations. C. Define the specific assets to be protected and identify the specific tasks which must be completed to secure them. D. Define the main security objectives which must be achieved and the security framework to meet business objectives.
Correct Answer: D
QUESTION 8Why must senior management endorse a security policy?
A. So that they will accept ownership for security within the organization. B. So that employees will follow the policy directives. C. So that external bodies will recognize the organizations commitment to security. D. So that they can be held legally accountable.
Contact Us: support@ensurepass.com. Copyright © 2014 by EnsurePass.com. All rights reserved.
ISC CISSP Exam | EnsurePass.com
Correct Answer: A
QUESTION 9In which one of the following documents is the assignment of individual roles and responsibilitiesMOST appropriately defined?
A. Security policy B. Enforcement guidelines C. Acceptable use policy D. Program manual
Correct Answer: C
QUESTION 10Which of the following defines the intent of a system security policy?
A. A definition of the particular settings that have been determined to provide optimum security.
B. A brief, high-level statement defining what is and is not permitted during the operation of the system. C. A definition of those items that must be excluded on the system. D. A listing of tools and applications that will be used to protect the system.
Correct Answer: A
QUESTION 11When developing an information security policy, what is the FIRST step that should be taken?
A. Obtain copies of mandatory regulations. B. Gain management approval. C. Seek acceptance from other departments. D. Ensure policy is compliant with current working practices.
Correct Answer: B
QUESTION 12Which one of the following should NOT be contained within a computer policy?
A. Definition of management expectations.B. Responsibilities of individuals and groups for protected information.
Contact Us: support@ensurepass.com. Copyright © 2014 by EnsurePass.com. All rights reserved.
ISC CISSP Exam | EnsurePass.com
C. Statement of senior executive support.D. Definition of legal and regulatory controls.
Correct Answer: B
QUESTION 13Which one of the following is NOT a fundamental component of a Regulatory Security Policy?
A. What is to be done? B. When it is to be done? C. Who is to do it? D. Why is it to be done?
Correct Answer: C
QUESTION 14Which one of the following statements describes management controls that are instituted toimplement a security policy?
A. They prevent users from accessing any control function. B. They eliminate the need for most auditing functions. C. They may be administrative, procedural, or technical. D. They are generally inexpensive to implement.
Correct Answer: C
QUESTION 15Which must bear the primary responsibility for determining the level of protection needed forinformation systems resources?
A. IS security specialists B. Senior Management C. Seniors security analysts D. system auditors
Correct Answer: B
Contact Us: support@ensurepass.com. Copyright © 2014 by EnsurePass.com. All rights reserved.
ISC CISSP Exam | EnsurePass.com
QUESTION 16Which of the following choices is NOT part of a security policy?
A. definition of overall steps of information security and the importance of security B. statement of management intend, supporting the goals and principles of information security C. definition of general and specific responsibilities for information security management D. description of specific technologies used in the field of information security
Correct Answer: D
QUESTION 17In an organization, an Information Technology security function should:
A. Be a function within the information systems functions of an organization. B. Report directly to a specialized business unit such as legal, corporate security or insurance. C. Be lead by a Chief Security Officer and report directly to the CEO. D. Be independent but report to the Information Systems function.
Correct Answer: C
QUESTION 18Which of the following embodies all the detailed actions that personnel are required to follow?
A. Standards B. Guidelines C. Procedures D. Baselines
Correct Answer: C
QUESTION 19A significant action has a state that enables actions on an ADP system to be traced to individualswho may then be held responsible. The action does NOT include:
A. Violations of security policy. B. Attempted violations of security policy. C. Non-violations of security policy. D. Attempted violations of allowed actions.
Correct Answer: C
Contact Us: support@ensurepass.com. Copyright © 2014 by EnsurePass.com. All rights reserved.
ISC CISSP Exam | EnsurePass.com
QUESTION 20Network Security is a
A. Product B. protocols C. ever evolving process D. quick-fix solution
Correct Answer: C
QUESTION 21Security is a process that is:
A. Continuous B. Indicative C. Examined D. Abnormal
Correct Answer: A
QUESTION 22What are the three fundamental principles of security?
A. Accountability, confidentiality, and integrity. B. Confidentiality, integrity, and availability. C. Integrity, availability, and accountability. D. Availability, accountability, and confidentiality.
Correct Answer: B
QUESTION 23Which of the following prevents, detects, and corrects errors so that the integrity, availability, andconfidentiality of transactions over networks may be maintained?
A. Communications security management and techniques. B. Networks security management and techniques. C. Clients security management and techniques. D. Servers security management and techniques.
Correct Answer: A
Contact Us: support@ensurepass.com. Copyright © 2014 by EnsurePass.com. All rights reserved.
ISC CISSP Exam | EnsurePass.com
QUESTION 24Making sure that the data is accessible when and where it is needed is which of the following?
A. confidentiality B. integrity C. acceptability D. availability
Correct Answer: D
QUESTION 25Which of the following describes elements that create reliability and stability in networks andsystems and which assures that connectivity is accessible when needed?
A. Availability B. Acceptability C. Confidentiality D. Integrity
Correct Answer: A
QUESTION 26Most computer attacks result in violation of which of the following security properties?
A. Availability B. Confidentiality C. Integrity and control D. All of the choices
Correct Answer: D
QUESTION 27Which of the following are objectives of an information systems security program?
A. Threats, vulnerabilities, and risks. B. Security, information value, and threats. C. Integrity, confidentiality, and availability. D. Authenticity, vulnerabilities, and costs.
Correct Answer: C
Contact Us: support@ensurepass.com. Copyright © 2014 by EnsurePass.com. All rights reserved.
ISC CISSP Exam | EnsurePass.com
QUESTION 28An area of the Telecommunications and Network Security domain that directly affects theInformation Systems Security tenet of Availability can be defined as:
A. Netware availability B. Network availability C. Network acceptability D. Network accountability
Correct Answer: B
QUESTION 29 The Structures, transmission methods, transport formats, and security measures that are used to provide integrity, availability, and authentication, and confidentiality for transmissions over private and public communications networks and media includes:
A. The Telecommunications and Network Security domain. B. The Telecommunications and Netware Security domain. C. The Technical communications and Network Security domain. D. The Telnet and Security domain.
Correct Answer: A
QUESTION 30Which one of the following is the MOST crucial link in the computer security chain?
A. Access controls B. People C. Management D. Awareness programs
Correct Answer: C
QUESTION 31The security planning process must define how security will be managed, who will be responsible,and
A. Who practices are reasonable and prudent for the enterprise? B. Who will work in the security department? C. What impact security will have on the intrinsic value of data? D. How security measures will be tested for effectiveness?
Contact Us: support@ensurepass.com. Copyright © 2014 by EnsurePass.com. All rights reserved.
ISC CISSP Exam | EnsurePass.com
Correct Answer: D
QUESTION 32Information security is the protection of data. Information will be protected mainly based on:
A. Its sensitivity to the company. B. Its confidentiality. C. Its value. D. All of the choices.
Correct Answer: D
QUESTION 33Organizations develop change control procedures to ensure that
A. All changes are authorized, tested, and recorded. B. Changes are controlled by the Policy Control Board (PCB). C. All changes are requested, scheduled, and completed on time. D. Management is advised of changes made to systems.
Correct Answer: A
QUESTION 34Within the organizational environment, the security function should report to an organizationallevel that
A. Has information technology oversight. B. Has autonomy from other levels. C. Is an external operation. D. Provides the internal audit function.
Correct Answer: B
QUESTION 35What is the MAIN purpose of a change control/management system?
A. Notify all interested parties of the completion of the change. B. Ensure that the change meets user specifications. C. Document the change for audit and management review. D. Ensure the orderly processing of a change request.
Contact Us: support@ensurepass.com. Copyright © 2014 by EnsurePass.com. All rights reserved.
ISC CISSP Exam | EnsurePass.com
Correct Answer: C
QUESTION 36Which of the following is most relevant to determining the maximum effective cost of accesscontrol?
A. the value of information that is protected B. management’s perceptions regarding data importance C. budget planning related to base versus incremental spending D. the cost to replace lost data
Correct Answer: A
QUESTION 37Which one of the following is the MAIN goal of a security awareness program when addressingsenior management?
A. Provide a vehicle for communicating security procedures. B. Provide a clear understanding of potential risk and exposure. C. Provide a forum for disclosing exposure and risk analysis. D. Provide a forum to communicate user responsibilities.
Correct Answer: B
QUESTION 38In developing a security awareness program, it is MOST important to
A. Understand the corporate culture and how it will affect security. B. Understand employees preferences for information security. C. Know what security awareness products are available. D. Identify weakness in line management support.
Correct Answer: A
QUESTION 39Which of the following would be best suited to provide information during a review of the controlsover the process of defining IT service levels?
A. Systems programmerB. Legal stuff
Contact Us: support@ensurepass.com. Copyright © 2014 by EnsurePass.com. All rights reserved.
EnsurePass.com Members Features:
1.
Verified Answers researched by industry experts.
2.
Q&As are downloadable in PDF and VCE format.
3.
98% success Guarantee and Money Back Guarantee.
4.
Free updates for 180 Days.
5.
Instant Access to download the Items
View list of All Exam provided: http://www.ensurepass.com/certfications?index=ATo purchase Lifetime Full Access Membership click here: http://www.ensurepass.com/user/register
Valid Discount Code 20% OFF for 2019: MMJ4-IGD8-X3QW
To purchase the HOT Exams:
Vendors
Hot Exams
Download
Cisco
100-105
http://www.ensurepass.com/100-105.html
Cisco
200-105
http://www.ensurepass.com/200-105.html
Cisco
200-125
http://www.ensurepass.com/200-125.html
Cisco
200-310
http://www.ensurepass.com/200-310.html
Cisco
200-355
http://www.ensurepass.com/200-355.html
Cisco
300-101
http://www.ensurepass.com/300-101.html
Cisco
300-115
http://www.ensurepass.com/300-115.html
Cisco
300-135
http://www.ensurepass.com/300-135.html
Cisco
300-320
http://www.ensurepass.com/300-320.html
Cisco
400-101
http://www.ensurepass.com/400-101.html
CompTIA
220-1001
http://www.ensurepass.com/220-1001.html
CompTIA
220-1002
http://www.ensurepass.com/220-1002.html
CompTIA
220-901
http://www.ensurepass.com/220-901.html
CompTIA
220-902
http://www.ensurepass.com/220-902.html
CompTIA
CAS-003
http://www.ensurepass.com/CAS-003.html
CompTIA
LX0-103
http://www.ensurepass.com/LX0-103.html
CompTIA
LX0-104
http://www.ensurepass.com/LX0-104.html
CompTIA
N10-007
http://www.ensurepass.com/N10-007.html
CompTIA
PK0-004
http://www.ensurepass.com/PK0-004.html
CompTIA
SK0-004
http://www.ensurepass.com/SK0-004.html
CompTIA
SY0-501
http://www.ensurepass.com/SY0-501.html
Microsoft
70-410
http://www.ensurepass.com/70-410.html
Microsoft
70-411
http://www.ensurepass.com/70-411.html
Microsoft
70-412
http://www.ensurepass.com/70-412.html
Microsoft
70-740
http://www.ensurepass.com/70-740.html
Microsoft
70-741
http://www.ensurepass.com/70-741.html
Microsoft
70-742
http://www.ensurepass.com/70-742.html
Microsoft
70-761
http://www.ensurepass.com/70-761.html
Microsoft
70-762
http://www.ensurepass.com/70-762.html
ISC
CISSP
http://www.ensurepass.com/CISSP.html
Cisco Exam Dumps
CCDA
200-310
CCIE Security
300-701 400-251
CCDE
352-001
CCIE Service Provider
300-501 400-201
CCDP
300-101 300-115 300-320
CCIE Wireless
400-351
CCENT
100-105
CCNA
200-301
CCIE Collaboration
300-801 400-051
CCNA Cloud
210-451 210-455
CCIE Data Center
300-601 400-151
CCNA Collaboration
210-060 210-065
CCIE Enterprise Infrastructure
300-401
CCNA Cyber Ops
210-250 210-255
CCIE Enterprise Wireless
300-401
CCNA Data Center
200-150 200-155
CCIE Routing and Switching
400-101
CCNA Industrial
200-601
CCNA Routing & Switching
100-105 200-105
CCNP Routing & Switching
300-101 300-115
200-125300-135
CCNA Security
210-260
CCT Data Center
010-151
CCNA Service Provider
640-875 640-878
CCT Routing & Switching
640-692
CCNA Wireless
200-355
Cisco Certified DevNet Associate
200-901
CCNP Cloud
300-460 300-465
300-470 300-475
Cisco Network Programmability Design and
Implementation Specialist
300-550
CCNP Collaboration
300-070 300-075
300-080
300-085 300-801
300-810
300-815 300-820
300-835
CCNP Enterprise
300-401 300-410 300-415
300-420 300-425 300-430
300-435
CCNP Data Center
300-160 300-165
300-170
300-175 300-180
300-601
300-610 300-615
300-620
300-625
300-635
CCNP Security
300-206 300-208 300-209
300-210 300-701 300-710
300-715 300-720 300-725
300-730 300-735
CCNP Service Provider
300-501 300-510 300-515
642-883 642-885 642-887
642-889 300-535
CCNP Wireless
300-360 300-365
300-370 300-375
Cisco Certified DevNet Professional
300-435 300-535
300-635
300-735 300-835
300-901
300-910 300-915
300-920
Cisco Certified DevNet Specialist
300-435 300-535 300-635
300-735 300-835 300-901
300-910 300-915 300-920
Cisco Network Programmability Developer
Specialist
300-560
Role-based Exams Dumps
Azure Security Engineer Associate
AZ-500
Microsoft 365 Certified Fundamentals
MS-900
Dynamics 365 Fundamentals
MB-900
Messaging Administrator Associate
MS-200 MS-201 MS-202
Dynamics 365 for Marketing FunctionalModern Desktop Administrator Associate
Consultant AssociateMD-100
MD-101
MB-200
MB-220
Dynamics 365 for Field Service Functional
Consultant Associate
Security Administrator Associate
MS-500
MB-200
MB-240
Dynamics 365 for Finance and Operations,
Financials Functional Consultant Associate
Teamwork Administrator Associate
MS-300 MS-301 MS-302
MB-300
MB-310
Dynamics 365 for Finance and Operations,
Manufacturing Functional Consultant
Azure Administrator Associate
AZ-103
Associate
MB-300
MB-320
Dynamics 365 for Finance and Operations,
Supply Chain Management Functional
Azure AI Engineer Associate
AI-100
Consultant Associate
MB-300MB-330
Azure Data Engineer AssociateMicrosoft Certified Azure Fundamentals
DP-200DP-201
AZ-900
Azure Data Scientist AssociateAzure Solutions Architect Expert
DP-100AZ-300
AZ-301
Azure Developer Associate
AZ-203
Dynamics 365 for Customer Service
Functional Consultant Associate
MB-200MB-230
Azure DevOps Engineer Expert
AZ-400
Dynamics 365 for Sales Functional Consultant
Associate
MB-200MB-210
MCSA Exams Dumps
BI Reporting
70-778
70-779
SQL Server 2012/2014
70-461
70-462
70-463
Microsoft Dynamics 365 for Operations
70-764
70-765
Universal Windows Platform
70-483
70-357
MB6-894
SQL 2016 BI Development
70-767
70-768
Web Applications
70-480
70-483
70-486
SQL 2016 Database Administration
70-764
70-765
Windows Server 2012
70-410
70-411
70-412
SQL 2016 Database Development
70-761
70-762
Windows Server 2016
70-740
70-741
70-742
MCSE Exams Dumps
Business Applications
MB2-716
MB2-718
MB2-719
MB6-895
MB6-896
MB6-897
MB6-898
Data Management and Analytics
70-464
70-465
70-466
70-467
70-762
70-767
70-768
70-777
Core Infrastructure
70-744
70-745
70-413
70-414
MCSE Productivity Solutions Expert
70-345
70-339
70-333
70-334
70-537
MCSD Exams Dumps
70-357 70-486 70-487
MTA Exams Dumps
Exam 98-349
Exam 98-361
Exam 98-364
Exam 98-365
Exam 98-366
Exam 98-367
Exam 98-368
Exam 98-369
Exam 98-375
Exam 98-380
Exam 98-381
Exam 98-382
Exam 98-383
Exam 98-388
CompTIA Exam Dumps
CompTIA A+ 2019
CompTIA A+ 2019
CompTIA A+ 2019
CompTIA A+ 2019
CompTIA Advanced Security Practitioner
CompTIA Cloud Essentials
CompTIA Cloud Essentials
CompTIA CySA+
CompTIA Cloud+
CompTIA IT Fundamentals
CompTIA IT Fundamentals
CompTIA Linux+
CompTIA Linux+
CompTIA Network+
CompTIA Project+
CompTIA PenTest+
CompTIA Security+
CompTIA CTT+
CompTIA CTT+
CompTIA CTT+
CompTIA Linux+
220-1001
220-1002
220-901
220-902
CAS-003
CLO-001
CLO-002
CS0-001
CV0-002
FC0-U51
FC0-U61
LX0-103
LX0-104
N10-007
PK0-004
PT0-001
SY0-501
TK0-201
TK0-202
TK0-203
XK0-004