Go Back on CISSP Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

CISSP Practice Test


Page 10 out of 298 Pages

Topic 7: . Security Operations

A continuous information security monitoring program can BEST reduce risk through which of the following?


A.

Collecting security events and correlating them to identify anomalies


B.

Facilitating system-wide visibility into the activities of critical user accounts


C.

Encompassing people, process, and technology


D.

Logging both scheduled and unscheduled system changes





B.
  

Facilitating system-wide visibility into the activities of critical user accounts



An organization is found lacking the ability to properly establish performance indicators for its Web hosting solution during an audit. What would be the MOST probable cause?


A.

Absence of a Business Intelligence (BI) solution


B.

Inadequate cost modeling


C.

Improper deployment of the Service-Oriented Architecture (SOA)


D.

Insufficient Service Level Agreement (SLA)





B.
  

Inadequate cost modeling



An organization is found lacking the ability to properly establish performance indicators for
its Web hosting solution during an audit. What would be the MOST probable cause?


A.

Absence of a Business Intelligence (BI) solution


B.

Inadequate cost modeling


C.

proper deployment of the Service-Oriented Architecture (SOA)


D.

Insufficient Service Level Agreement (SLA)





D.
  

Insufficient Service Level Agreement (SLA)



Which of the following is a PRIMARY advantage of using a third-party identity service?



A.

Consolidation of multiple providers


B.

Directory synchronization


C.

Web based logon


D.

Automated account management





B.
  

Directory synchronization



What is the MOST important step during forensic analysis when trying to learn the purpose
of an unknown application?


A.

Disable all unnecessary services


B.

Ensure chain of custody


C.

Prepare another backup of the system


D.

 Isolate the system from the network





D.
  

 Isolate the system from the network




Page 10 out of 298 Pages
Previous