Escolar Documentos
Profissional Documentos
Cultura Documentos
1. A corporation is considering a best authentication method for access control, which of the following method has the best authentication strength? (Access Control Domain) A. Multi-party B. Two factor C. Mandatory D. Discretionary 2. A security engineer is evaluating methods to store user passwords in an information system. What may be the best method for storing user passwords and meeting the confidentiality security objective? (Cryptography Domain) A. Password-protected file B. File restricted to one individual C. One-way encrypted file D. Two-way encrypted file 3. What is the minimum and customary practice that constitutes responsible protection of information assets that affects a community or societal norm? (Information Security & Risk Management Domain) A. Due diligence B. Risk mitigation C. Asset protection D. Due care 4. A timely review of system access records would be an example of what type of basic security function? (Operations Security Domain) A. Avoidance B. Deterrence C. Prevention D. Detection 5. What type of access control is implemented where a database administrator can grant Update privilege in a database to specific users or group? (Application Security Domain) A. Supplemental B. Discretionary CISSP CBK Review Page 1
Page 2
Page 6
Page 7
Page 8
Page 9
Page 10
Page 13
Page 14
Page 16
Page 17
Page 18
Page 20
Page 22