Free ISC2 CISSP Exam Braindumps (page: 54)

International bodies established a regulatory scheme that defines how weapons are exchanged between the signatories. It also addresses cyber weapons, including malicious software, Command and Control (C2) software, and internet surveillance software. This is a description of which of the following?

  1. International Traffic in Arms Regulations (ITAR)
  2. Palermo convention
  3. Wassenaar arrangement
  4. General Data Protection Regulation (GDPR)

Answer(s): C



An organization has implemented a protection strategy to secure the network from unauthorized external access. The new Chief Information Security Officer
(CISO) wants to increase security by better protecting the network from unauthorized internal access. Which Network Access Control (NAC) capability BEST meets this objective?

  1. Port security
  2. Two-factor authentication (2FA)
  3. Strong passwords
  4. Application firewall

Answer(s): A



Which section of the assessment report addresses separate vulnerabilities, weaknesses, and gaps?

  1. Findings definition section
  2. Risk review section
  3. Executive summary with full details
  4. Key findings section

Answer(s): D



Why is data classification control important to an organization?

  1. To enable data discovery
  2. To ensure security controls align with organizational risk appetite
  3. To ensure its integrity, confidentiality and availability
  4. To control data retention in alignment with organizational policies and regulation

Answer(s): B






Post your Comments and Discuss ISC2 CISSP exam prep with other Community members:

CISSP Exam Discussions & Posts