Decide Fast & Get 50% Flat Discount | Limited Time Offer - Ends In 0d 00h 00m 00s Coupon code: SAVE50

Master ISC2 CSSLP Exam with Reliable Practice Questions

Page: 1 out of Viewing questions 1-5 out of 357 questions
Last exam update: Nov 08,2024
Upgrade to Premium
Question 1

You are responsible for network and information security at a metropolitan police station. The most important concern is that unauthorized parties are not able to access data. What is this called?


Correct : A

The CIA (Confidentiality, Integrity, and Availability) triangle is concerned with three facets of security. Confidentiality is the concern that data

be secure from unauthorized access.

Answer B and C are incorrect. The CIA (Confidentiality, Integrity, and Availability) triangle is concerned with three facets of security.

Integrity is the concern that data not be altered without it being traceable. Availability is the concern that the data, while being secured, is

readily accessible.

Answer D is incorrect. Confidentiality may be implemented with encryption but encryption is just a technique to obtain confidentiality.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 2

Certification and Accreditation (C&A or CnA) is a process for implementing information security. Which of the following is the correct order of C&A phases in a DITSCAP assessment?


Correct : C

C&A consists of four phases in a DITSCAP assessment. These phases are the same as NIACAP phases. The order of these phases is as

follows:

1.Definition: The definition phase is focused on understanding the IS business case, the mission, environment, and architecture. This

phase determines the security requirements and level of effort necessary to achieve Certification & Accreditation (C&A).

2.Verification: The second phase confirms the evolving or modified system's compliance with the information. The verification phase

ensures that the fully integrated system will be ready for certification testing.

3.Validation: The third phase confirms abidance of the fully integrated system with the security policy. This phase follows the

requirements slated in the SSAA. The objective of the validation phase is to show the required evidence to support the DAA in

accreditation process.

4.Post Accreditation: The Post Accreditation is the final phase of DITSCAP assessment and it starts after the system has been certified

and accredited for operations. This phase ensures secure system management, operation, and maintenance to save an acceptable

level of residual risk.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 3

Which of the following is NOT a responsibility of a data owner?


Correct : D

It is not a responsibility of a data owner. The data custodian (information custodian) is responsible for maintaining and protecting the data.

Answer B, A, and C are incorrect. All of these are responsibilities of a data owner.

The roles and responsibilities of a data owner are as follows:

The data owner (information owner) is usually a member of management, in charge of a specific business unit, and is ultimately

responsible for the protection and use of a specific subset of information.

The data owner decides upon the classification of the data that he is responsible for and alters that classification if the business needs

arise.

This person is also responsible for ensuring that the necessary security controls are in place, ensuring that proper access rights are

being used, defining security requirements per classification and backup requirements, approving any disclosure activities, and defining

user access criteria.

The data owner approves access requests or may choose to delegate this function to business unit managers. And it is the data owner

who will deal with security violations pertaining to the data he is responsible for protecting.

The data owner, who obviously has enough on his plate, delegates responsibility of the day-to-day maintenance of the data protection

mechanisms to the data custodian.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 4

ISO 27003 is an information security standard published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). Which of the following elements does this standard contain? Each correct answer represents a complete solution. Choose all that apply.


Correct : A, C, E, F

ISO 27003 is an information security standard published by the International Organization for Standardization (ISO) and the International

Electrotechnical Commission (IEC). It is entitled as 'Information Technology - Security techniques - Information security management system

implementation guidance'. The ISO 27003 standard provides guidelines for implementing an ISMS (Information Security Management System).

It mainly focuses upon the PDCA method along with establishing, implementing, reviewing, and improving the ISMS itself.

The ISO 27003 standard contains the following elements:

Introduction

Scope

Terms and Definitions

CSFs (Critical success factors)

Guidance on process approach

Guidance on using PDCA

Guidance on Plan Processes

Guidance on Do Processes

Guidance on Check Processes

Guidance on Act Processes

Inter-Organization Co-operation

Answer B is incorrect. This element is included in the ISO 27005 standard.

Answer D is incorrect. This element is included in the ISO 27006 standard.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 5

John works as a security manager for SoftTech Inc. He is working with his team on the disaster recovery management plan. One of his team members has a doubt related to the most cost effective DRP testing plan. According to you, which of the following disaster recovery testing plans is the most cost-effective and efficient way to identify areas of overlap in the plan before conducting more demanding training exercises?


Correct : C

The structured walk-through test is also known as the table-top exercise. In structured walk-through test, the team members walkthrough

the plan to identify and correct weaknesses and how they will respond to the emergency scenarios by stepping in the course of the plan. It is

the most effective and competent way to identify the areas of overlap in the plan before conducting more challenging training exercises.

Answer A is incorrect. In full-scale exercise, the critical systems run at an alternate site.

Answer B is incorrect. The emergency management group and response teams actually perform their emergency response functions by

walking through the test, without actually initiating recovery procedures. But it is not much cost effective.

Answer D is incorrect. It is a test performed when personnel walks through the evacuation route to a designated area where

procedures for accounting for the personnel are tested.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500