ISC2 ISC2 certification is regarded since one of the most extremely demanded certifications around the globe. From the field involving IT, ISC2 CISSP certification is actually something everybody is eager to have. When you try to get promotion as well as change career, you will have the advantage over additional workmates or candidates if you have a ISC2 ISC2 certification throughout hand.

2021 Mar CISSP exam answers

Q211. Which of the following roles has the obligation to ensure that a third party provider is capable of processing and handling data in a secure manner and meeting the standards set by the organization? 

A. Data Custodian 

B. Data Owner 

C. Data Creator 

D. Data User 

Answer:


Q212. During the procurement of a new information system, it was determined that some of the security requirements were not addressed in the system specification. Which of the following is the MOST likely reason for this? 

A. The procurement officer lacks technical knowledge. 

B. The security requirements have changed during the procurement process. 

C. There were no security professionals in the vendor's bidding team. 

D. The description of the security requirements was insufficient. 

Answer:


Q213. Which of the following problems is not addressed by using OAuth (Open Standard to Authorization) 2.0.to integrate a third-party identity provider for a service? 

A. Resource Servers are required to use passwords to authenticate end users. 

B. Revocation of access of some users of the third party instead of all the users from the third party. 

C. Compromise of the third party means compromise of all the users in the service. 

D. Guest users need to authenticate with the third party identity provider. 

Answer:


Q214. DRAG DROP 

A software security engineer is developing a black box-based test plan that will measure the system's reaction to incorrect or illegal inputs or unexpected operational errors and situations. Match the functional testing techniques on the left with the correct input parameters on.the right. 

Answer: 


Q215. An organization is selecting a service provider to assist in the consolidation of multiple computing sites including development, implementation and ongoing support of various computer systems. Which of the following MUST be verified by the Information Security Department? 

A. The service provider's policies are consistent with ISO/IEC27001 and there is evidence that the service provider is following those policies. 

B. The service provider will segregate the data within its systems and ensure that each region's policies are met. 

C. The service provider will impose controls and protections that meet or exceed the current systems controls and produce audit logs as verification. 

D. The service provider's policies can meet the requirements imposed by the new environment even if they differ from the organization's current policies. 

Answer:


Renew CISSP free practice exam:

Q216. Refer.to the information below to answer the question. 

An organization experiencing a negative financial impact is forced to reduce budgets and the number of Information Technology (IT) operations staff performing basic logical access security administration functions. Security processes have been tightly integrated into normal IT operations and are not separate and distinct roles. 

Which of the following will indicate where the IT budget is BEST allocated during this time? 

A. Policies 

B. Frameworks 

C. Metrics 

D. Guidelines 

Answer:


Q217. A health care provider is considering Internet access for their employees and patients. Which of the following is the organization's MOST secure solution for protection of data? 

A. Public Key Infrastructure (PKI) and digital signatures 

B. Trusted server certificates and passphrases 

C. User ID and password 

D. Asymmetric encryption and User ID 

Answer:


Q218. The BEST way to check for good security programming practices, as well as auditing for possible backdoors, is to conduct 

A. log auditing. 

B. code reviews. 

C. impact assessments. 

D. static analysis. 

Answer:


Q219. The PRIMARY security concern for handheld devices is the 

A. strength of the encryption algorithm. 

B. spread of malware during synchronization. 

C. ability to bypass the authentication mechanism. 

D. strength of the Personal Identification Number (PIN). 

Answer:


Q220. What is a common challenge when implementing Security Assertion Markup Language 

(SAML) for identity integration between on-premise environment and an external identity provider service? 

A. Some users are not provisioned into the service. 

B. SAML tokens are provided by the on-premise identity provider. 

C. Single users cannot be revoked from the service. 

D. SAML tokens contain user information. 

Answer: