Go Back on CISSP Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

CISSP Practice Test


Page 9 out of 298 Pages

Topic 6: . Security Assessment and Testing

A Virtual Machine (VM) environment has five guest Operating Systems (OS) and provides strong isolation. What MUST an administrator review to audit a user’s access to data files?


A.

Host VM monitor audit logs


B.

Guest OS access controls


C.

Host VM access controls


D.

Guest OS audit logs





A.
  

Host VM monitor audit logs



When is a Business Continuity Plan (BCP) considered to be valid?


A.

When it has been validated by the Business Continuity (BC) manager


B.

When it has been validated by the board of directors


C.

When it has been validated by all threat scenarios


D.

When it has been validated by realistic exercises





D.
  

When it has been validated by realistic exercises



A Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) will provide which of the following?


A.

Guaranteed recovery of all business functions


B.

Minimization of the need decision making during a crisis


C.

Insurance against litigation following a disaster


D.

Protection from loss of organization resources





D.
  

Protection from loss of organization resources



What is the PRIMARY reason for implementing change management?


A.

Certify and approve releases to the environment


B.

Provide version rollbacks for system changes


C.

Ensure that all applications are approved


D.

Ensure accountability for changes to the environment





D.
  

Ensure accountability for changes to the environment



What should be the FIRST action to protect the chain of evidence when a desktop
computer is involved?


A.

Take the computer to a forensic lab


B.

Make a copy of the hard drive


C.

Start documenting


D.

Turn off the computer





C.
  

Start documenting




Page 9 out of 298 Pages
Previous