What is the MAIN reason for testing a Disaster Recovery Plan (DRP)?
The main reason for testing a DRP is to identify and correct any gaps, errors, or weaknesses in the plan before a real disaster occurs. Testing a DRP also helps to ensure that the plan is feasible, effective, and aligned with the organization's objectives and requirements. Testing a DRP can also help to train and familiarize the IT staff with their roles and responsibilities in the event of a disaster, but this is not the primary purpose of testing.Reference:CISSP All-in-One Exam Guide, Eighth Edition, Chapter 9: Business Continuity and Disaster Recovery Planning, page 1019;Official (ISC)2 Guide to the CISSP CBK, Fifth Edition, Chapter 8: Security Operations, page 1020.
A hospital's building controls system monitors and operates the environmental equipment to maintain a safe and comfortable environment. Which of the following could be used to minimize the risk of utility supply interruption?
The best option to minimize the risk of utility supply interruption for a hospital's building controls system is to use digital protection and control devices capable of minimizing the adverse impact to critical utility. Digital protection and control devices are devices that monitor and regulate the utility supply, such as electricity, water, or gas, and detect and respond to any faults, anomalies, or disruptions in the utility supply. Digital protection and control devices can minimize the adverse impact to critical utility by isolating the affected components, switching to alternative sources, adjusting the load or demand, or activating backup or emergency systems.Digital protection and control devices can help to ensure the continuity and reliability of the utility supply, and to prevent or mitigate any potential damage or harm to the hospital's building controls system, or to the patients and staff12.Reference:CISSP CBK, Fifth Edition, Chapter 4, page 383;CISSP Practice Exam -- FREE 20 Questions and Answers, Question 17.
Which of the following is a characteristic of a challenge/response authentication process?
A characteristic of a challenge/response authentication process is transmitting a hash based on the user's password. A challenge/response authentication process is a type of authentication method that involves the exchange of a challenge and a response between the authenticator and the authenticatee. The challenge is usually a random or unpredictable value, such as a nonce or a timestamp, that is sent by the authenticator to the authenticatee. The response is usually a value that is derived from the challenge and the user's password, such as a hash or a message authentication code (MAC), that is sent by the authenticatee to the authenticator. The authenticator then verifies the response by applying the same algorithm and password to the challenge, and comparing the results. If the response matches the expected value, the authentication is successful. Transmitting a hash based on the user's password can provide a secure and efficient way of proving the user's identity, without revealing the password in plaintext or requiring the storage of the password on the authenticator. Reference: CISSP All-in-One Exam Guide, Eighth Edition, Chapter 5: Identity and Access Management, page 208; [Official (ISC)2 CISSP CBK Reference, Fifth Edition, Chapter 5: Identity and Access Management, page 297]
Which of the following is considered the FIRST step when designing an internal security control assessment?
An internal security control assessment is a process of evaluating the effectiveness and compliance of the security controls implemented within an organization. The first step when designing an internal security control assessment is to create a plan based on a recognized framework of known controls, such as the NIST SP 800-53, ISO/IEC 27002, or COBIT. A framework of known controls provides a comprehensive and consistent set of security objectives, requirements, and best practices that can be used as a reference and a benchmark for the assessment. The other options are not considered the first step when designing an internal security control assessment, as they may not cover all the relevant aspects of security, may not be aligned with the organization's goals and risks, or may not be feasible or reliable.Reference:CISSP - Certified Information Systems Security Professional, Domain 1. Security and Risk Management, 1.4 Understand and apply risk management concepts, 1.4.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements, 1.4.5.1 Internal security assessments;CISSP Exam Outline, Domain 1. Security and Risk Management, 1.4 Understand and apply risk management concepts, 1.4.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements, 1.4.5.1 Internal security assessments
A colleague who recently left the organization asked a security professional for a copy of the organization's confidential incident management policy. Which of the following
is the BEST response to this request?
The best response to the request from a former colleague for a copy of the organization's confidential incident management policy is to submit the request using company official channels to ensure the policy is okay to distribute. The incident management policy is a policy that defines the roles, responsibilities, and procedures for the identification, response, and recovery of the security incidents that may affect the organization. The incident management policy is a confidential document that contains sensitive information and data, and that should be protected from unauthorized access, disclosure, or modification. Submitting the request using company official channels can help to ensure the policy is okay to distribute, as it can verify the legitimacy and validity of the request, and the authorization and clearance of the requester.Submitting the request using company official channels can also help to comply with the security policies and standards, and the legal, regulatory, or contractual requirements of the organization, and to prevent or mitigate any potential security risks or issues that may arise from the distribution of the policy34.Reference:CISSP CBK, Fifth Edition, Chapter 7, page 629;2024 Pass4itsure CISSP Dumps, Question 17.
Dorothy Harris
18 days agoCharles Hernandez
14 days agoBetty Roberts
15 days agoKimberly Smith
2 days agoParis
1 month agoCharlene
1 month agoDyan
2 months agoKirk
2 months agoRhea
2 months agoEveline
2 months agoJannette
3 months agoFelicidad
3 months agoCasandra
3 months agoJohnathon
3 months agoEdelmira
4 months agoQuentin
4 months agoAlaine
4 months agoTijuana
4 months agoCatarina
5 months agoErinn
5 months agoLynelle
5 months agoAlyssa
5 months agoSheldon
6 months agoJesusita
6 months agoIzetta
6 months agoRoyce
6 months agoRoxane
7 months agoRicki
7 months agoYuette
7 months agoMelita
7 months agoCaren
8 months agoJamal
8 months agoWei
8 months agoVi
10 months agoTracie
11 months agoGolda
1 year agoShawn
1 year agoPaz
1 year agoOsvaldo
1 year agoCherry
1 year agoDanilo
1 year agoFabiola
1 year agoSommer
1 year agoTammara
1 year agoMillie
1 year agoMel
1 year agoAzalee
1 year agoFranklyn
1 year agoShawna
1 year agoLashawn
1 year agoTimothy
1 year agoKate
1 year agoMarvel
1 year agoErin
1 year agoStevie
1 year agoValentin
2 years agoAdelina
2 years agoTiera
2 years agoLettie
2 years agoLavera
2 years agoCasie
2 years agoJunita
2 years agoRodolfo
2 years agoNicolette
2 years agoOlive
2 years agoSommer
2 years agoBonita
2 years agoKimbery
2 years agoRickie
2 years agoLina
2 years ago