Question 13

- (Exam Topic 12)
Which of the following approaches is the MOST effective way to dispose of data on multiple hard drives?

Correct Answer:D

Question 14

- (Exam Topic 13)
Who is accountable for the information within an Information System (IS)?

Correct Answer:B
Section: Security Operations

Question 15

- (Exam Topic 10)
An organization decides to implement a partial Public Key Infrastructure (PKI) with only the servers having digital certificates. What is the security benefit of this implementation?

Correct Answer:D

Question 16

- (Exam Topic 13)
A company receives an email threat informing of an Imminent Distributed Denial of Service (DDoS) attack
targeting its web application, unless ransom is paid. Which of the following techniques BEST addresses that threat?

Correct Answer:D

Question 17

- (Exam Topic 13)
When network management is outsourced to third parties, which of the following is the MOST effective method of protecting critical data assets?

Correct Answer:D

Question 18

- (Exam Topic 10)
What is the MAIN feature that onion routing networks offer?

Correct Answer:C

START CISSP EXAM