Free CSSLP Exam Braindumps

Pass your Certified Information Systems Security Professional exam with these free Questions and Answers

Page 14 of 70
QUESTION 61

You work as a security manager for BlueWell Inc. You are performing the external vulnerability testing, or penetration testing to get a better snapshot of your organization's security posture. Which of the following penetration testing techniques will you use for searching paper disposal areas for unshredded or otherwise improperly disposed-of
reports?

  1. A. Sniffing
  2. B. Scanning and probing
  3. C. Dumpster diving
  4. D. Demon dialing

Correct Answer: C
Dumpster diving technique is used for searching paper disposal areas for unshredded or otherwise improperly disposed-of reports. Answer B is incorrect. In scanning and probing technique, various scanners, like a port scanner, can reveal information about a network's infrastructure and enable an intruder to access the network's unsecured ports. Answer D is incorrect. Demon dialing technique automatically tests every phone line in an exchange to try to locate modems that are attached to the network. Answer A is incorrect. In sniffing technique, protocol analyzer can be used to capture data packets that are later decoded to collect information such as passwords or infrastructure configurations.

QUESTION 62

What are the differences between managed and unmanaged code technologies? Each correct answer represents a complete solution. Choose two.

  1. A. Managed code is referred to as Hex code, whereas unmanaged code is referred to as byte code.
  2. B. C and C++ are the examples of managed code, whereas Java EE and Microsoft.NET are the examples of unmanaged code.
  3. C. Managed code executes under management of a runtime environment, whereas unmanaged code is executed by the CPU of a computer system.
  4. D. Managed code is compiled into an intermediate code format, whereas unmanaged code is compiled into machine code.

Correct Answer: CD
Programming languages are categorized into two technologies: 1.Managed code: This computer program code is compiled into an intermediate code format. Managed code is referred to as byte code. It executes under the management of a runtime environment. Java EE and Microsoft.NET are the examples of managed code. 2.Unmanaged code: This computer code is compiled into machine code. Unmanaged code is executed by the CPU of a computer system. C and C++ are the examples of unmanaged code. Answer A is incorrect. Managed code is referred to as byte code. Answer B is incorrect. C and C++ are the examples of unmanaged code, whereas Java EE and Microsoft.NET are the examples of managed code.

QUESTION 63

Which of the following governance bodies directs and coordinates implementations of the information security program?

  1. A. Chief Information Security Officer
  2. B. Information Security Steering Committee
  3. C. Business Unit Manager
  4. D. Senior Management

Correct Answer: A
Chief Information Security Officer directs and coordinates implementations of the information security program. The governance roles and responsibilities are mentioned below in the table:
CSSLP dumps exhibit

QUESTION 64

What component of the change management system is responsible for evaluating, testing, and documenting changes created to the project scope?

  1. A. Project Management Information System
  2. B. Integrated Change Control
  3. C. Configuration Management System
  4. D. Scope Verification

Correct Answer: C
The change management system is comprised of several components that guide the change request through the process. When a change request is made that will affect the project scope. The Configuration Management System evaluates the change request and documents the features and functions of the change on the project scope.

QUESTION 65

Mark works as a Network Administrator for NetTech Inc. He wants users to access only those resources that are required for them. Which of the following access control models will he use?

  1. A. Discretionary Access Control
  2. B. Mandatory Access Control
  3. C. Policy Access Control
  4. D. Role-Based Access Control

Correct Answer: D
Role-based access control (RBAC) is an access control model. In this model, a user can access resources according to his role in the organization. For example, a backup administrator is responsible for taking backups of important data. Therefore, he is only authorized to access this data for backing it up. However, sometimes users with different roles need to access the same resources. This situation can also be handled using the RBAC model. Answer B is incorrect. Mandatory Access Control (MAC) is a model that uses a predefined set of access privileges for an object of the system. Access to an object is restricted on the basis of the sensitivity of the object and granted through authorization. Sensitivity of an object is defined by the label assigned to it. For example, if a user receives a copy of an object that is marked as "secret", he cannot grant permission to other users to see this object unless they have the appropriate permission. Answer A is incorrect. DAC is an access control model. In this model, the data owner has the right to decide who can access the data. This model is commonly used in PC environment. The basis of this model is the use of Access Control List (ACL). Answer B is incorrect. There is no such access control model as Policy Access Control.

Page 14 of 70

Post your Comments and Discuss ISC2 CSSLP exam with other Community members: