Free ISC2 CISSP Exam Braindumps (page: 23)

Which one of the following BEST protects vendor accounts that are used for emergency maintenance?

  1. Vendor access should be disabled until needed
  2. Frequent monitoring of vendor access
  3. Role-based access control (RBAC)
  4. Encryption of routing tables

Answer(s): C



Which event magnitude is defined as deadly, destructive, and disruptive when a hazard interacts with human vulnerability?

  1. Crisis
  2. Catastrophe
  3. Accident
  4. Disaster

Answer(s): B



Which of the following BEST describes the purpose of software forensics?

  1. To analyze possible malicious intent of malware
  2. To perform cyclic redundancy check (CRC) verification and detect changed applications
  3. To determine the author and behavior of the code
  4. To review program code to determine the existence of backdoors

Answer(s): C



A web developer is completing a new web application security checklist before releasing the application to production. The task of disabling unnecessary services is on the checklist. Which web application threat is being mitigated by this action?

  1. Session hijacking
  2. Security misconfiguration
  3. Broken access control
  4. Sensitive data exposure

Answer(s): B






Post your Comments and Discuss ISC2 CISSP exam prep with other Community members:

CISSP Exam Discussions & Posts