New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Pass CISSP Exam Guide

Page: 29 / 45
Total 1486 questions

Certified Information Systems Security Professional (CISSP) Questions and Answers

Question 113

Which of the following is used to ensure that data mining activities Will NOT reveal sensitive data?

Options:

A.

Implement two-factor authentication on the underlying infrastructure.

B.

Encrypt data at the field level and tightly control encryption keys.

C.

Preprocess the databases to see if inn …… can be disclosed from the learned patterns.

D.

Implement the principle of least privilege on data elements so a reduced number of users can access the database.

Question 114

What is the BEST method if an investigator wishes to analyze a hard drive which may be used as evidence?

Options:

A.

Leave the hard drive in place and use only verified and authenticated Operating Systems (OS) utilities ...

B.

Log into the system and immediately make a copy of all relevant files to a Write Once, Read Many ...

C.

Remove the hard drive from the system and make a copy of the hard drive's contents using imaging hardware.

D.

Use a separate bootable device to make a copy of the hard drive before booting the system and analyzing the hard drive.

Question 115

Which of the following is the PRIMARY issue when analyzing detailed log information?

Options:

A.

Logs may be unavailable when required

B.

Timely review of the data is potentially difficult

C.

Most systems and applications do not support logging

D.

Logs do not provide sufficient details of system and individual activities

Question 116

Which of the following minimizes damage to information technology (IT) equipment stored in a data center when a false fire alarm event occurs?

Options:

A.

A pre-action system is installed.

B.

An open system is installed.

C.

A dry system is installed.

D.

A wet system is installed.

Page: 29 / 45
Total 1486 questions