Free CISSP-ISSMP Exam Braindumps (page: 9)

Page 8 of 55

Which of the following security controls will you use for the deployment phase of the SDLC to build secure software? Each correct answer represents a complete solution. Choose all that apply.

  1. Vulnerability Assessment and Penetration Testing
  2. Security Certification and Accreditation (C&A)
  3. Change and Configuration Control
  4. Risk Adjustments

Answer(s): A,B,D



Which of the following can be prevented by an organization using job rotation and separation of duties policies?

  1. Collusion
  2. Eavesdropping
  3. Buffer overflow
  4. Phishing

Answer(s): A



Peter works as a Computer Hacking Forensic Investigator. He has been called by an organization to conduct a seminar to give necessary information related to sexual harassment within the workplace. Peter started with the definition and types of sexual harassment. He then wants to convey that it is important that records of the sexual harassment incidents should be maintained, which helps in further legal prosecution. Which of the following data should be recorded in this documentation? Each correct answer represents a complete solution. Choose all that apply.

  1. Names of the victims
  2. Location of each incident
  3. Nature of harassment
  4. Date and time of incident

Answer(s): A,B,D



Which of the following types of evidence is considered as the best evidence?

  1. A copy of the original document
  2. Information gathered through the witness's senses
  3. The original document
  4. A computer-generated record

Answer(s): C






Post your Comments and Discuss ISC CISSP-ISSMP exam with other Community members:

CISSP-ISSMP Discussions & Posts