New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Complete CISSP ISC Materials

Page: 18 / 45
Total 1486 questions

Certified Information Systems Security Professional (CISSP) Questions and Answers

Question 69

Which of the following methods provides the MOST protection for user credentials?

Options:

A.

Forms-based authentication

B.

Digest authentication

C.

Basic authentication

D.

Self-registration

Question 70

Refer to the information below to answer the question.

A new employee is given a laptop computer with full administrator access. This employee does not have a personal computer at home and has a child that uses the computer to send and receive e-mail, search the web, and use instant messaging. The organization’s Information Technology (IT) department discovers that a peer-to-peer program has been installed on the computer using the employee's access.

Which of the following documents explains the proper use of the organization's assets?

Options:

A.

Human resources policy

B.

Acceptable use policy

C.

Code of ethics

D.

Access control policy

Question 71

Which of the following methods of suppressing a fire is environmentally friendly and the MOST appropriate for a data center?

Options:

A.

Inert gas fire suppression system

B.

Halon gas fire suppression system

C.

Dry-pipe sprinklers

D.

Wet-pipe sprinklers

Question 72

An organization adopts a new firewall hardening standard. How can the security professional verify that the technical staff correct implemented the new standard?

Options:

A.

Perform a compliance review

B.

Perform a penetration test

C.

Train the technical staff

D.

Survey the technical staff

Page: 18 / 45
Total 1486 questions