Free ISC2 CISSP Exam Braindumps (page: 22)

The security team is notified that a device on the network is infected with malware. Which of the following is MOST effective in enabling the device to be quickly located and remediated?

  1. Data loss protection (DLP)
  2. Intrusion detection
  3. Vulnerability scanner
  4. Information Technology Asset Management (ITAM)

Answer(s): D



Which of the following threats would be MOST likely mitigated by monitoring assets containing open source libraries for vulnerabilities?

  1. Distributed denial-of-service (DDoS) attack
  2. Advanced persistent threat (APT) attempt
  3. Zero-day attack
  4. Phishing attempt

Answer(s): B



As a design principle, which one of the following actors is responsible for identifying and approving data security requirement in a cloud ecosystem?

  1. Cloud auditor
  2. Cloud broker
  3. Cloud provider
  4. Cloud consumer

Answer(s): D



Which of the following is the MOST effective way to ensure the endpoint devices used by remote users are compliant with an organization's approved policies before being allowed on the network?

  1. Network Access Control (NAC)
  2. Privileged Access Management (PAM)
  3. Group Policy Object (GPO)
  4. Mobile Device Management (MDM)

Answer(s): A






Post your Comments and Discuss ISC2 CISSP exam prep with other Community members:

CISSP Exam Discussions & Posts