Free CISSP Exam Braindumps (page: 14)

Page 13 of 122

A security architect is developing an information system for a client. One of the requirements is to deliver a platform that mitigates against common vulnerabilities and attacks. What is the MOST efficient option used to prevent buffer overflow attacks?

  1. Access control mechanisms
  2. Process isolation
  3. Address Space Layout Randomization (ASLR)
  4. Processor states

Answer(s): C



In a quarterly system access review, an active privileged account was discovered that did not exist in the prior review on the production system. The account was created one hour after the previous access review. Which of the following is the BEST option to reduce overall risk in addition to quarterly access reviews?

  1. Implement bi-annual reviews.
  2. Create policies for system access.
  3. Implement and review risk-based alerts.
  4. Increase logging levels.

Answer(s): C



A corporation does not have a formal data destruction policy. During which phase of a criminal legal proceeding will this have the MOST impact?

  1. Sentencing
  2. Trial
  3. Discovery
  4. Arraignment

Answer(s): C



What is considered the BEST explanation when determining whether to provide remote network access to a third-party security service?

  1. Contract negotiation
  2. Supplier request
  3. Business need
  4. Vendor demonstration

Answer(s): C






Post your Comments and Discuss ISC CISSP exam with other Community members: