Free CISSP Exam Braindumps (page: 5)

Page 4 of 122

Which of the following is included in change management?

  1. Technical review by business owner
  2. User Acceptance Testing (UAT) before implementation
  3. Cost-benefit analysis (CBA) after implementation
  4. Business continuity testing

Answer(s): D



A company is enrolled in a hard drive reuse program where decommissioned equipment is sold back to the vendor when it is no longer needed. The vendor pays more money for functioning drives than equipment that is no longer operational. Which method of data sanitization would provide the most secure means of preventing unauthorized data loss, while also receiving the most money from the vendor?

  1. Pinning
  2. Single-pass wipe
  3. Multi-pass wipes
  4. Degaussing

Answer(s): C



When reviewing vendor certifications for handling and processing of company data, which of the following is the BEST Service Organization Controls (SOC) certification for the vendor to possess?

  1. SOC 1 Type 1
  2. SOC 2 Type 1
  3. SOC 2 Type 2
  4. SOC 3

Answer(s): C



Which application type is considered high risk and provides a common way for malware and viruses to enter a network?

  1. Instant messaging or chat applications
  2. Peer-to-Peer (P2P) file sharing applications
  3. E-mail applications
  4. End-to-end applications

Answer(s): B






Post your Comments and Discuss ISC CISSP exam with other Community members: