Free ISC2 CISSP Exam Braindumps (page: 19)

To monitor the security of buried data lines inside the perimeter of a facility, which of the following is the MOST effective control?

  1. Fencing around the facility with closed-circuit television (CCTV) cameras at all entry points
  2. Ground sensors installed and reporting to a security event management (SEM) system
  3. Regular sweeps of the perimeter, including manual inspection of the cable ingress points
  4. Steel casing around the facility ingress points

Answer(s): B



An enterprise is developing a baseline cybersecurity standard its suppliers must meet before being awarded a contract. Which of the following statements is TRUE about the baseline cybersecurity standard?

  1. It should be expressed as general requirements.
  2. It should be expressed as technical requirements.
  3. It should be expressed in business terminology.
  4. It should be expressed in legal terminology.

Answer(s): B



Which access control method is based on users issuing access requests on system resources, features assigned to those resources, the operational or situational context, and a set of policies specified in terms of those features and context?

  1. Mandatory Access Control (MAC)
  2. Attribute Based Access Control (ABAC)
  3. Role Based Access Control (RBAC)
  4. Discretionary Access Control (DAC)

Answer(s): B



What is a security concern when considering implementing software-defined networking (SDN)?

  1. It has a decentralized architecture.
  2. It increases the attack footprint.
  3. It uses open source protocols.
  4. It is cloud based.

Answer(s): B






Post your Comments and Discuss ISC2 CISSP exam prep with other Community members:

CISSP Exam Discussions & Posts