ExamGecko
Home Home / ISC / CISSP
Ask QuestionAsk Question

ISC CISSP Practice Test - Questions Answers, Page 10

Question list
Search
Search

Question 91

Report
Export
Collapse

The birthday attack is MOST effective against which one of the following cipher technologies?

A.
Chaining block encryption
A.
Chaining block encryption
Answers
B.
Asymmetric cryptography
B.
Asymmetric cryptography
Answers
C.
Cryptographic hash
C.
Cryptographic hash
Answers
D.
Streaming cryptography
D.
Streaming cryptography
Answers
Suggested answer: C
asked 18/09/2024
HASEEB IMTIAZ
33 questions

Question 92

Report
Export
Collapse

An advantage of link encryption in a communications network is that it

A.
makes key management and distribution easier.
A.
makes key management and distribution easier.
Answers
B.
protects data from start to finish through the entire network.
B.
protects data from start to finish through the entire network.
Answers
C.
improves the efficiency of the transmission.
C.
improves the efficiency of the transmission.
Answers
D.
encrypts all information, including headers and routing information.
D.
encrypts all information, including headers and routing information.
Answers
Suggested answer: D
asked 18/09/2024
gokulakrishna S B
37 questions

Question 93

Report
Export
Collapse

Which one of the following is the MOST important in designing a biometric access system if it is essential that no one other than authorized individuals are admitted?

A.
False Acceptance Rate (FAR)
A.
False Acceptance Rate (FAR)
Answers
B.
False Rejection Rate (FRR)
B.
False Rejection Rate (FRR)
Answers
C.
Crossover Error Rate (CER)
C.
Crossover Error Rate (CER)
Answers
D.
Rejection Error Rate
D.
Rejection Error Rate
Answers
Suggested answer: A
asked 18/09/2024
Jerome Fortin
34 questions

Question 94

Report
Export
Collapse

What is the term commonly used to refer to a technique of authenticating one machine to another by forging packets from a trusted source?

A.
Man-in-the-Middle (MITM) attack
A.
Man-in-the-Middle (MITM) attack
Answers
B.
Smurfing
B.
Smurfing
Answers
C.
Session redirect
C.
Session redirect
Answers
D.
Spoofing
D.
Spoofing
Answers
Suggested answer: D
asked 18/09/2024
Fakhruddin Abbas
32 questions

Question 95

Report
Export
Collapse

The PRIMARY purpose of a security awareness program is to

A.
ensure that everyone understands the organization's policies and procedures.
A.
ensure that everyone understands the organization's policies and procedures.
Answers
B.
communicate that access to information will be granted on a need-to-know basis.
B.
communicate that access to information will be granted on a need-to-know basis.
Answers
C.
warn all users that access to all systems will be monitored on a daily basis.
C.
warn all users that access to all systems will be monitored on a daily basis.
Answers
D.
comply with regulations related to data and information protection.
D.
comply with regulations related to data and information protection.
Answers
Suggested answer: A
asked 18/09/2024
giancarlo bagnetti srl
42 questions

Question 96

Report
Export
Collapse

As one component of a physical security system, an Electronic Access Control (EAC) token is BEST known for its ability to

A.
overcome the problems of key assignments.
A.
overcome the problems of key assignments.
Answers
B.
monitor the opening of windows and doors.
B.
monitor the opening of windows and doors.
Answers
C.
trigger alarms when intruders are detected.
C.
trigger alarms when intruders are detected.
Answers
D.
lock down a facility during an emergency.
D.
lock down a facility during an emergency.
Answers
Suggested answer: A
asked 18/09/2024
Dinu Jose Varghese
38 questions

Question 97

Report
Export
Collapse

Which one of the following is a fundamental objective in handling an incident?

A.
To restore control of the affected systems
A.
To restore control of the affected systems
Answers
B.
To confiscate the suspect's computers
B.
To confiscate the suspect's computers
Answers
C.
To prosecute the attacker
C.
To prosecute the attacker
Answers
D.
To perform full backups of the system
D.
To perform full backups of the system
Answers
Suggested answer: A
asked 18/09/2024
Unai M
39 questions

Question 98

Report
Export
Collapse

In the area of disaster planning and recovery, what strategy entails the presentation of information about the plan?

A.
Communication
A.
Communication
Answers
B.
Planning
B.
Planning
Answers
C.
Recovery
C.
Recovery
Answers
D.
Escalation
D.
Escalation
Answers
Suggested answer: A
asked 18/09/2024
Derek Steven Schulte
41 questions

Question 99

Report
Export
Collapse

The process of mutual authentication involves a computer system authenticating a user and authenticating the

A.
user to the audit process.
A.
user to the audit process.
Answers
B.
computer system to the user.
B.
computer system to the user.
Answers
C.
user's access to all authorized objects.
C.
user's access to all authorized objects.
Answers
D.
computer system to the audit process.
D.
computer system to the audit process.
Answers
Suggested answer: B
asked 18/09/2024
Debaparna Bandyopadhyay
39 questions

Question 100

Report
Export
Collapse

What maintenance activity is responsible for defining, implementing, and testing updates to application systems?

A.
Program change control
A.
Program change control
Answers
B.
Regression testing
B.
Regression testing
Answers
C.
Export exception control
C.
Export exception control
Answers
D.
User acceptance testing
D.
User acceptance testing
Answers
Suggested answer: A
asked 18/09/2024
Md Hossain
39 questions
Total 1.482 questions
Go to page: of 149