100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CISSP - Jerad 1 Exam Questions And Answers (A+ Graded) $9.99   Add to cart

Exam (elaborations)

CISSP - Jerad 1 Exam Questions And Answers (A+ Graded)

 3 views  0 purchase
  • Course
  • CISSP - Jerad 1
  • Institution
  • CISSP - Jerad 1

CISSP - Jerad 1 Exam Questions And Answers (A+ Graded)...

Preview 4 out of 35  pages

  • November 1, 2024
  • 35
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • cissp jerad 1
  • CISSP - Jerad 1
  • CISSP - Jerad 1
avatar-seller
Easton
CISSP - Jerad 1 Exam Questions And Answers
(A+ Graded)


A - Answer Which one of the following is the MOST effective way to decrease the
security vulnerabilities associated with building entrances?



(A) Reduce the number of entrances

(B) Use solid metal doors and frames

(C) Provide very bright illumination for the entrances

(D) Install tamperproof hinges and glass



D - Answer Why is projection lighting installed at the same height as the barbed wire
topping of a fence?



(A) This allows the view of an intruder's climb over the fence.

(B) It extends the field of view of the observers of the scene.

(C) It decreases the height and cost of observation towers.

(D) It blinds the scene view from the approaching intruder.

A - Correct Answer ISO 27002 standard published by International Organization for
Standardization provides guides for vendor compliance by addressing

(A) Guidelines and practices for security controls.

(B) financial soundness and business viability metrics.

(C) standard best practice for procurement policy.

(D) contract agreement writing standards.



C - Question The PRIMARY benefit of an application gateway is :

,(A) Change control procedures are applied to the applications

(B) It allows applications to enter production

(C) Logging and controlling of application incoming and outgoing traffic

(D) Audit and approval of changes made to applications



D - Answer Which of the following backup processing alternatives describes a
computing U facility with telecommunications equipment, some systems, but minimal
data?



(A) Company-owned hot site

(B) Commercial hot site

(C) Cold site

(D) Warm site



A - Answer Important documents that have been soaked in water during fire
suppression efforts should be restored by



(A) document recovery specialists.

(B) Human Resources personnel.

(C) document library personnel.

(D) fire department specialists.



D - Question In a discretionary mode, who has delegation authority to grant access to
information?

-A) User

-B) Security officer

-C) Group leader

-D) Owner

,-B) Answer Which of the following is an industry specific standard that PRIMARILY
addresses privacy matters?

-A) Control Objectives for Information and Related Technology (CUBIT)

-B) European Union Principles

-C) International Organization for Standardization (ISO) 9001:2000

-D) The Wassenaar Agreement



B - Answers What is the purpose of the Encapsulating Security Payload (ESP) in the
Internet Protocol (IP) Security Architecture for the Internet Protocol Security (IPSec)?

(A) To provide non-repudiation and confidentiality for IP transmissions

(B) To provide integrity and confidentiality for IP transmissions

(C) To provide integrity and authentication for IP transmissions

(D) To provide key management and key distribution for IP transmissions



C - Answer The good practice to avoid logging clutter in application security is to



(A) Log an exception when the exception is wrapped with another exception and
propagate

(B) Catch and log at every level in the software

(C) Catch and log only at points at which exceptions are actually handled.

(D) Disable debug level logging in a production environment.



D - What biological characteristics does a retinal scan biometric device measure?

(A) the quantity of light that enters the retina

(B) the quantity of light reflected by the retina

(C) size, curvature, and shape of the retina

(D) pattern of blood vessels on the retina

B - Which of the following defines the intent of a system security policy?

, (A) definition of the environments which offer the greatest security (B) high-level
statement in brief that defines what is allowed and what is not allowed for the operation
of the system (C) identification of those things that should be denied on the system (D)
listing of utilities and programs to be used in securing the system



B - Answer To support legacy applications reliant upon vulnerable protocols such as
(e.g., plaintext passwords) which of the following can be put in place to reduce the
associated risks on a corporate network?

A) Utilize strong centrally-generated password to control use of the vulnerable
applications

B) Utilize a Virtual Private Network (VPN) which has restrictions regarding workstations
that join the VPN

(C) Implement physical access controls to provide access to workstations only for
authorized trained users

(D) Ensure audit logging is enabled on all hosts and applications, along with periodic log
reviews



D - The correct answer: How often should a system recovery plan be tested in a stable
data processing environment?

(A) Once to prove the plan

(B) When applications have been changed

(C) Before every audit

(D) Quarterly or semiannually



C - Answer When considering the respective performance of a variety of new devices,
the security professional should expect that a biometric device becomes more sensitive
when



(A) both the FAR and FRR 'increases.

(B) the FAR 'increases while the FRR decreases.

(C) the FAR 'decreases while the FRR 'increases.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Easton. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $9.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

82871 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$9.99
  • (0)
  Add to cart