Question 55

- (Exam Topic 10)
Refer to the information below to answer the question.
A new employee is given a laptop computer with full administrator access. This employee does not have a personal computer at home and has a child that uses the computer to send and receive e-mail, search the web, and use instant messaging. The organization’s Information Technology (IT) department discovers that a peer-to-peer program has been installed on the computer using the employee's access.
Which of the following could have MOST likely prevented the Peer-to-Peer (P2P) program from being installed on the computer?

Correct Answer:A

Question 56

- (Exam Topic 9)
How can a forensic specialist exclude from examination a large percentage of operating system files residing on a copy of the target system?

Correct Answer:B

Question 57

- (Exam Topic 10)
An organization publishes and periodically updates its employee policies in a file on their intranet. Which of the following is a PRIMARY security concern?

Correct Answer:C

Question 58

- (Exam Topic 12)
Which of the following is a strategy of grouping requirements in developing a Security Test and Evaluation (ST&E)?

Correct Answer:B

Question 59

- (Exam Topic 10)
What is the PRIMARY advantage of using automated application security testing tools?

Correct Answer:B

Question 60

- (Exam Topic 11)
Disaster Recovery Plan (DRP) training material should be

Correct Answer:A

START CISSP EXAM