10 minute read

EnsurePass ISC CISSP Exam Real Dumps Certified Information Systems Security Professional

ISC CISSP Exam | EnsurePass.com

ISC CISSP Certification Exam

Advertisement

Vendor: ISC

Exam Code: CISSP

Exam Name: Certified Information Systems Security Professional

Version: 13.01

Q & As: 2137

Contact Us: support@ensurepass.com. Copyright © 2014 by EnsurePass.com. All rights reserved.

Why do you choose EnsurePass.com for your exam Preparation:

1. Real Exam Questions and Answers with PDF and VCE Files. 2. Free VCE Software 3. We do provide Personal Consulting Services. 4. Money Back Guarantee.

How to buy:

CISSP Exam Questions & Answershttp://www.ensurepass.com/CISSP.html

ISC CISSP Exam | EnsurePass.com

QUESTION 1All of the following are basic components of a security policy EXCEPT the

A. definition of the issue and statement of relevant terms B. statement of roles and responsibilities C. statement of applicability and compliance requirements D. statement of performance of characteristics and requirements

Correct Answer: D

QUESTION 2A security policy would include all of the following EXCEPT

A. Background B. Scope statement C. Audit requirements D. Enforcement

Correct Answer: B

QUESTION 3Which one of the following is an important characteristic of an information security policy?

A. Identifies major functional areas of information. B. Quantifies the effect of the loss of the information. C. Requires the identification of information owners. D. Lists applications that support the business function.

Correct Answer: A

QUESTION 4Ensuring the integrity of business information is the PRIMARY concern of

A. Encryption Security B. Procedural Security C. Logical Security D. On-line Security

Correct Answer: B

Contact Us: support@ensurepass.com. Copyright © 2014 by EnsurePass.com. All rights reserved.

ISC CISSP Exam | EnsurePass.com

QUESTION 5Which of the following would be the first step in establishing an information security program?

A. Adoption of a corporate information security policy statement. B. Development and implementation of an information security standards manual. C. Development of a security awareness-training program. D. Purchase of security access control software.

Correct Answer: A

QUESTION 6Which of the following department managers would be best suited to oversee the development ofan information security policy?

A. Information Systems B. Human Resources C. Business operations D. Security administration

Correct Answer: C

QUESTION 7What is the function of a corporate information security policy?

A. Issue corporate standard to be used when addressing specific security problems. B. Issue guidelines in selecting equipment, configuration, design, and secure operations. C. Define the specific assets to be protected and identify the specific tasks which must be completed to secure them. D. Define the main security objectives which must be achieved and the security framework to meet business objectives.

Correct Answer: D

QUESTION 8Why must senior management endorse a security policy?

A. So that they will accept ownership for security within the organization. B. So that employees will follow the policy directives. C. So that external bodies will recognize the organizations commitment to security. D. So that they can be held legally accountable.

Contact Us: support@ensurepass.com. Copyright © 2014 by EnsurePass.com. All rights reserved.

ISC CISSP Exam | EnsurePass.com

Correct Answer: A

QUESTION 9In which one of the following documents is the assignment of individual roles and responsibilitiesMOST appropriately defined?

A. Security policy B. Enforcement guidelines C. Acceptable use policy D. Program manual

Correct Answer: C

QUESTION 10Which of the following defines the intent of a system security policy?

A. A definition of the particular settings that have been determined to provide optimum security.

B. A brief, high-level statement defining what is and is not permitted during the operation of the system. C. A definition of those items that must be excluded on the system. D. A listing of tools and applications that will be used to protect the system.

Correct Answer: A

QUESTION 11When developing an information security policy, what is the FIRST step that should be taken?

A. Obtain copies of mandatory regulations. B. Gain management approval. C. Seek acceptance from other departments. D. Ensure policy is compliant with current working practices.

Correct Answer: B

QUESTION 12Which one of the following should NOT be contained within a computer policy?

A. Definition of management expectations.B. Responsibilities of individuals and groups for protected information.

Contact Us: support@ensurepass.com. Copyright © 2014 by EnsurePass.com. All rights reserved.

ISC CISSP Exam | EnsurePass.com

C. Statement of senior executive support.D. Definition of legal and regulatory controls.

Correct Answer: B

QUESTION 13Which one of the following is NOT a fundamental component of a Regulatory Security Policy?

A. What is to be done? B. When it is to be done? C. Who is to do it? D. Why is it to be done?

Correct Answer: C

QUESTION 14Which one of the following statements describes management controls that are instituted toimplement a security policy?

A. They prevent users from accessing any control function. B. They eliminate the need for most auditing functions. C. They may be administrative, procedural, or technical. D. They are generally inexpensive to implement.

Correct Answer: C

QUESTION 15Which must bear the primary responsibility for determining the level of protection needed forinformation systems resources?

A. IS security specialists B. Senior Management C. Seniors security analysts D. system auditors

Correct Answer: B

Contact Us: support@ensurepass.com. Copyright © 2014 by EnsurePass.com. All rights reserved.

ISC CISSP Exam | EnsurePass.com

QUESTION 16Which of the following choices is NOT part of a security policy?

A. definition of overall steps of information security and the importance of security B. statement of management intend, supporting the goals and principles of information security C. definition of general and specific responsibilities for information security management D. description of specific technologies used in the field of information security

Correct Answer: D

QUESTION 17In an organization, an Information Technology security function should:

A. Be a function within the information systems functions of an organization. B. Report directly to a specialized business unit such as legal, corporate security or insurance. C. Be lead by a Chief Security Officer and report directly to the CEO. D. Be independent but report to the Information Systems function.

Correct Answer: C

QUESTION 18Which of the following embodies all the detailed actions that personnel are required to follow?

A. Standards B. Guidelines C. Procedures D. Baselines

Correct Answer: C

QUESTION 19A significant action has a state that enables actions on an ADP system to be traced to individualswho may then be held responsible. The action does NOT include:

A. Violations of security policy. B. Attempted violations of security policy. C. Non-violations of security policy. D. Attempted violations of allowed actions.

Correct Answer: C

Contact Us: support@ensurepass.com. Copyright © 2014 by EnsurePass.com. All rights reserved.

ISC CISSP Exam | EnsurePass.com

QUESTION 20Network Security is a

A. Product B. protocols C. ever evolving process D. quick-fix solution

Correct Answer: C

QUESTION 21Security is a process that is:

A. Continuous B. Indicative C. Examined D. Abnormal

Correct Answer: A

QUESTION 22What are the three fundamental principles of security?

A. Accountability, confidentiality, and integrity. B. Confidentiality, integrity, and availability. C. Integrity, availability, and accountability. D. Availability, accountability, and confidentiality.

Correct Answer: B

QUESTION 23Which of the following prevents, detects, and corrects errors so that the integrity, availability, andconfidentiality of transactions over networks may be maintained?

A. Communications security management and techniques. B. Networks security management and techniques. C. Clients security management and techniques. D. Servers security management and techniques.

Correct Answer: A

Contact Us: support@ensurepass.com. Copyright © 2014 by EnsurePass.com. All rights reserved.

ISC CISSP Exam | EnsurePass.com

QUESTION 24Making sure that the data is accessible when and where it is needed is which of the following?

A. confidentiality B. integrity C. acceptability D. availability

Correct Answer: D

QUESTION 25Which of the following describes elements that create reliability and stability in networks andsystems and which assures that connectivity is accessible when needed?

A. Availability B. Acceptability C. Confidentiality D. Integrity

Correct Answer: A

QUESTION 26Most computer attacks result in violation of which of the following security properties?

A. Availability B. Confidentiality C. Integrity and control D. All of the choices

Correct Answer: D

QUESTION 27Which of the following are objectives of an information systems security program?

A. Threats, vulnerabilities, and risks. B. Security, information value, and threats. C. Integrity, confidentiality, and availability. D. Authenticity, vulnerabilities, and costs.

Correct Answer: C

Contact Us: support@ensurepass.com. Copyright © 2014 by EnsurePass.com. All rights reserved.

ISC CISSP Exam | EnsurePass.com

QUESTION 28An area of the Telecommunications and Network Security domain that directly affects theInformation Systems Security tenet of Availability can be defined as:

A. Netware availability B. Network availability C. Network acceptability D. Network accountability

Correct Answer: B

QUESTION 29 The Structures, transmission methods, transport formats, and security measures that are used to provide integrity, availability, and authentication, and confidentiality for transmissions over private and public communications networks and media includes:

A. The Telecommunications and Network Security domain. B. The Telecommunications and Netware Security domain. C. The Technical communications and Network Security domain. D. The Telnet and Security domain.

Correct Answer: A

QUESTION 30Which one of the following is the MOST crucial link in the computer security chain?

A. Access controls B. People C. Management D. Awareness programs

Correct Answer: C

QUESTION 31The security planning process must define how security will be managed, who will be responsible,and

A. Who practices are reasonable and prudent for the enterprise? B. Who will work in the security department? C. What impact security will have on the intrinsic value of data? D. How security measures will be tested for effectiveness?

Contact Us: support@ensurepass.com. Copyright © 2014 by EnsurePass.com. All rights reserved.

ISC CISSP Exam | EnsurePass.com

Correct Answer: D

QUESTION 32Information security is the protection of data. Information will be protected mainly based on:

A. Its sensitivity to the company. B. Its confidentiality. C. Its value. D. All of the choices.

Correct Answer: D

QUESTION 33Organizations develop change control procedures to ensure that

A. All changes are authorized, tested, and recorded. B. Changes are controlled by the Policy Control Board (PCB). C. All changes are requested, scheduled, and completed on time. D. Management is advised of changes made to systems.

Correct Answer: A

QUESTION 34Within the organizational environment, the security function should report to an organizationallevel that

A. Has information technology oversight. B. Has autonomy from other levels. C. Is an external operation. D. Provides the internal audit function.

Correct Answer: B

QUESTION 35What is the MAIN purpose of a change control/management system?

A. Notify all interested parties of the completion of the change. B. Ensure that the change meets user specifications. C. Document the change for audit and management review. D. Ensure the orderly processing of a change request.

Contact Us: support@ensurepass.com. Copyright © 2014 by EnsurePass.com. All rights reserved.

ISC CISSP Exam | EnsurePass.com

Correct Answer: C

QUESTION 36Which of the following is most relevant to determining the maximum effective cost of accesscontrol?

A. the value of information that is protected B. management’s perceptions regarding data importance C. budget planning related to base versus incremental spending D. the cost to replace lost data

Correct Answer: A

QUESTION 37Which one of the following is the MAIN goal of a security awareness program when addressingsenior management?

A. Provide a vehicle for communicating security procedures. B. Provide a clear understanding of potential risk and exposure. C. Provide a forum for disclosing exposure and risk analysis. D. Provide a forum to communicate user responsibilities.

Correct Answer: B

QUESTION 38In developing a security awareness program, it is MOST important to

A. Understand the corporate culture and how it will affect security. B. Understand employees preferences for information security. C. Know what security awareness products are available. D. Identify weakness in line management support.

Correct Answer: A

QUESTION 39Which of the following would be best suited to provide information during a review of the controlsover the process of defining IT service levels?

A. Systems programmerB. Legal stuff

Contact Us: support@ensurepass.com. Copyright © 2014 by EnsurePass.com. All rights reserved.

EnsurePass.com Members Features:

1.

Verified Answers researched by industry experts.

2.

Q&As are downloadable in PDF and VCE format.

3.

98% success Guarantee and Money Back Guarantee.

4.

Free updates for 180 Days.

5.

Instant Access to download the Items

View list of All Exam provided: http://www.ensurepass.com/certfications?index=ATo purchase Lifetime Full Access Membership click here: http://www.ensurepass.com/user/register

Valid Discount Code 20% OFF for 2019: MMJ4-IGD8-X3QW

To purchase the HOT Exams:

Vendors

Hot Exams

Download

Cisco

100-105

http://www.ensurepass.com/100-105.html

Cisco

200-105

http://www.ensurepass.com/200-105.html

Cisco

200-125

http://www.ensurepass.com/200-125.html

Cisco

200-310

http://www.ensurepass.com/200-310.html

Cisco

200-355

http://www.ensurepass.com/200-355.html

Cisco

300-101

http://www.ensurepass.com/300-101.html

Cisco

300-115

http://www.ensurepass.com/300-115.html

Cisco

300-135

http://www.ensurepass.com/300-135.html

Cisco

300-320

http://www.ensurepass.com/300-320.html

Cisco

400-101

http://www.ensurepass.com/400-101.html

CompTIA

220-1001

http://www.ensurepass.com/220-1001.html

CompTIA

220-1002

http://www.ensurepass.com/220-1002.html

CompTIA

220-901

http://www.ensurepass.com/220-901.html

CompTIA

220-902

http://www.ensurepass.com/220-902.html

CompTIA

CAS-003

http://www.ensurepass.com/CAS-003.html

CompTIA

LX0-103

http://www.ensurepass.com/LX0-103.html

CompTIA

LX0-104

http://www.ensurepass.com/LX0-104.html

CompTIA

N10-007

http://www.ensurepass.com/N10-007.html

CompTIA

PK0-004

http://www.ensurepass.com/PK0-004.html

CompTIA

SK0-004

http://www.ensurepass.com/SK0-004.html

CompTIA

SY0-501

http://www.ensurepass.com/SY0-501.html

Microsoft

70-410

http://www.ensurepass.com/70-410.html

Microsoft

70-411

http://www.ensurepass.com/70-411.html

Microsoft

70-412

http://www.ensurepass.com/70-412.html

Microsoft

70-740

http://www.ensurepass.com/70-740.html

Microsoft

70-741

http://www.ensurepass.com/70-741.html

Microsoft

70-742

http://www.ensurepass.com/70-742.html

Microsoft

70-761

http://www.ensurepass.com/70-761.html

Microsoft

70-762

http://www.ensurepass.com/70-762.html

ISC

CISSP

http://www.ensurepass.com/CISSP.html

Cisco Exam Dumps

CCDA

200-310

CCIE Security

300-701 400-251

CCDE

352-001

CCIE Service Provider

300-501 400-201

CCDP

300-101 300-115 300-320

CCIE Wireless

400-351

CCENT

100-105

CCNA

200-301

CCIE Collaboration

300-801 400-051

CCNA Cloud

210-451 210-455

CCIE Data Center

300-601 400-151

CCNA Collaboration

210-060 210-065

CCIE Enterprise Infrastructure

300-401

CCNA Cyber Ops

210-250 210-255

CCIE Enterprise Wireless

300-401

CCNA Data Center

200-150 200-155

CCIE Routing and Switching

400-101

CCNA Industrial

200-601

CCNA Routing & Switching

100-105 200-105

CCNP Routing & Switching

300-101 300-115

200-125300-135

CCNA Security

210-260

CCT Data Center

010-151

CCNA Service Provider

640-875 640-878

CCT Routing & Switching

640-692

CCNA Wireless

200-355

Cisco Certified DevNet Associate

200-901

CCNP Cloud

300-460 300-465

300-470 300-475

Cisco Network Programmability Design and

Implementation Specialist

300-550

CCNP Collaboration

300-070 300-075

300-080

300-085 300-801

300-810

300-815 300-820

300-835

CCNP Enterprise

300-401 300-410 300-415

300-420 300-425 300-430

300-435

CCNP Data Center

300-160 300-165

300-170

300-175 300-180

300-601

300-610 300-615

300-620

300-625

300-635

CCNP Security

300-206 300-208 300-209

300-210 300-701 300-710

300-715 300-720 300-725

300-730 300-735

CCNP Service Provider

300-501 300-510 300-515

642-883 642-885 642-887

642-889 300-535

CCNP Wireless

300-360 300-365

300-370 300-375

Cisco Certified DevNet Professional

300-435 300-535

300-635

300-735 300-835

300-901

300-910 300-915

300-920

Cisco Certified DevNet Specialist

300-435 300-535 300-635

300-735 300-835 300-901

300-910 300-915 300-920

Cisco Network Programmability Developer

Specialist

300-560

Role-based Exams Dumps

Azure Security Engineer Associate

AZ-500

Microsoft 365 Certified Fundamentals

MS-900

Dynamics 365 Fundamentals

MB-900

Messaging Administrator Associate

MS-200 MS-201 MS-202

Dynamics 365 for Marketing FunctionalModern Desktop Administrator Associate

Consultant AssociateMD-100

MD-101

MB-200

MB-220

Dynamics 365 for Field Service Functional

Consultant Associate

Security Administrator Associate

MS-500

MB-200

MB-240

Dynamics 365 for Finance and Operations,

Financials Functional Consultant Associate

Teamwork Administrator Associate

MS-300 MS-301 MS-302

MB-300

MB-310

Dynamics 365 for Finance and Operations,

Manufacturing Functional Consultant

Azure Administrator Associate

AZ-103

Associate

MB-300

MB-320

Dynamics 365 for Finance and Operations,

Supply Chain Management Functional

Azure AI Engineer Associate

AI-100

Consultant Associate

MB-300MB-330

Azure Data Engineer AssociateMicrosoft Certified Azure Fundamentals

DP-200DP-201

AZ-900

Azure Data Scientist AssociateAzure Solutions Architect Expert

DP-100AZ-300

AZ-301

Azure Developer Associate

AZ-203

Dynamics 365 for Customer Service

Functional Consultant Associate

MB-200MB-230

Azure DevOps Engineer Expert

AZ-400

Dynamics 365 for Sales Functional Consultant

Associate

MB-200MB-210

MCSA Exams Dumps

BI Reporting

70-778

70-779

SQL Server 2012/2014

70-461

70-462

70-463

Microsoft Dynamics 365 for Operations

70-764

70-765

Universal Windows Platform

70-483

70-357

MB6-894

SQL 2016 BI Development

70-767

70-768

Web Applications

70-480

70-483

70-486

SQL 2016 Database Administration

70-764

70-765

Windows Server 2012

70-410

70-411

70-412

SQL 2016 Database Development

70-761

70-762

Windows Server 2016

70-740

70-741

70-742

MCSE Exams Dumps

Business Applications

MB2-716

MB2-718

MB2-719

MB6-895

MB6-896

MB6-897

MB6-898

Data Management and Analytics

70-464

70-465

70-466

70-467

70-762

70-767

70-768

70-777

Core Infrastructure

70-744

70-745

70-413

70-414

MCSE Productivity Solutions Expert

70-345

70-339

70-333

70-334

70-537

MCSD Exams Dumps

70-357 70-486 70-487

MTA Exams Dumps

Exam 98-349

Exam 98-361

Exam 98-364

Exam 98-365

Exam 98-366

Exam 98-367

Exam 98-368

Exam 98-369

Exam 98-375

Exam 98-380

Exam 98-381

Exam 98-382

Exam 98-383

Exam 98-388

CompTIA Exam Dumps

CompTIA A+ 2019

CompTIA A+ 2019

CompTIA A+ 2019

CompTIA A+ 2019

CompTIA Advanced Security Practitioner

CompTIA Cloud Essentials

CompTIA Cloud Essentials

CompTIA CySA+

CompTIA Cloud+

CompTIA IT Fundamentals

CompTIA IT Fundamentals

CompTIA Linux+

CompTIA Linux+

CompTIA Network+

CompTIA Project+

CompTIA PenTest+

CompTIA Security+

CompTIA CTT+

CompTIA CTT+

CompTIA CTT+

CompTIA Linux+

220-1001

220-1002

220-901

220-902

CAS-003

CLO-001

CLO-002

CS0-001

CV0-002

FC0-U51

FC0-U61

LX0-103

LX0-104

N10-007

PK0-004

PT0-001

SY0-501

TK0-201

TK0-202

TK0-203

XK0-004

This article is from: