Question 85

- (Exam Topic 12)
Which of the following is a document that identifies each item seized in an investigation, including date and time seized, full name and signature or initials of the person who seized the item, and a detailed description of the item?

Correct Answer:D

Question 86

- (Exam Topic 10)
Refer to the information below to answer the question.
An organization experiencing a negative financial impact is forced to reduce budgets and the number of Information Technology (IT) operations staff performing basic logical access security administration functions. Security processes have been tightly integrated into normal IT operations and are not separate and distinct roles.
When determining appropriate resource allocation, which of the following is MOST important to monitor?

Correct Answer:B

Question 87

- (Exam Topic 11)
What is the GREATEST challenge to identifying data leaks?

Correct Answer:B

Question 88

- (Exam Topic 12)
As a best practice, the Security Assessment Report (SAR) should include which of the following sections?

Correct Answer:B

Question 89

- (Exam Topic 3)
Which technique can be used to make an encryption scheme more resistant to a known plaintext attack?

Correct Answer:A

Question 90

- (Exam Topic 9)
Which of the following is the BEST way to verify the integrity of a software patch?

Correct Answer:A

START CISSP EXAM