Free CISSP Exam Braindumps (page: 13)

Page 12 of 122

A colleague who recently left the organization asked a security professional for a copy of the organization's confidential incident management policy. Which of the following is the BEST response to this request?

  1. Access the policy on a company-issued device and let the former colleague view the screen.
  2. E-mail the policy to the colleague as they were already part of the organization and familiar with it.
  3. Do not acknowledge receiving the request from the former colleague and ignore them.
  4. Submit the request using company official channels to ensure the policy is okay to distribute.

Answer(s): C



Which of the following BEST describes when an organization should conduct a black box security audit on a new software protect?

  1. When the organization wishes to check for non-functional compliance
  2. When the organization wants to enumerate known security vulnerabilities across their infrastructure
  3. When the organization is confident the final source code is complete
  4. When the organization has experienced a security incident

Answer(s): C



In software development, which of the following entities normally signs the code to protect the code integrity?

  1. The organization developing the code
  2. The quality control group
  3. The developer
  4. The data owner

Answer(s): A



Which of the following technologies can be used to monitor and dynamically respond to potential threats on web applications?

  1. Field-level tokenization
  2. Web application vulnerability scanners
  3. Runtime application self-protection (RASP)
  4. Security Assertion Markup Language (SAML)

Answer(s): C






Post your Comments and Discuss ISC CISSP exam with other Community members: