ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 10

List of questions

Question 91

Report Export Collapse

The birthday attack is MOST effective against which one of the following cipher technologies?

Chaining block encryption
Chaining block encryption
Asymmetric cryptography
Asymmetric cryptography
Cryptographic hash
Cryptographic hash
Streaming cryptography
Streaming cryptography
Suggested answer: C
asked 18/09/2024
HASEEB IMTIAZ
37 questions

Question 92

Report Export Collapse

An advantage of link encryption in a communications network is that it

makes key management and distribution easier.
makes key management and distribution easier.
protects data from start to finish through the entire network.
protects data from start to finish through the entire network.
improves the efficiency of the transmission.
improves the efficiency of the transmission.
encrypts all information, including headers and routing information.
encrypts all information, including headers and routing information.
Suggested answer: D
asked 18/09/2024
gokulakrishna S B
40 questions

Question 93

Report Export Collapse

Which one of the following is the MOST important in designing a biometric access system if it is essential that no one other than authorized individuals are admitted?

False Acceptance Rate (FAR)
False Acceptance Rate (FAR)
False Rejection Rate (FRR)
False Rejection Rate (FRR)
Crossover Error Rate (CER)
Crossover Error Rate (CER)
Rejection Error Rate
Rejection Error Rate
Suggested answer: A
asked 18/09/2024
Jerome Fortin
40 questions

Question 94

Report Export Collapse

What is the term commonly used to refer to a technique of authenticating one machine to another by forging packets from a trusted source?

Man-in-the-Middle (MITM) attack
Man-in-the-Middle (MITM) attack
Smurfing
Smurfing
Session redirect
Session redirect
Spoofing
Spoofing
Suggested answer: D
asked 18/09/2024
Fakhruddin Abbas
35 questions

Question 95

Report Export Collapse

The PRIMARY purpose of a security awareness program is to

ensure that everyone understands the organization's policies and procedures.
ensure that everyone understands the organization's policies and procedures.
communicate that access to information will be granted on a need-to-know basis.
communicate that access to information will be granted on a need-to-know basis.
warn all users that access to all systems will be monitored on a daily basis.
warn all users that access to all systems will be monitored on a daily basis.
comply with regulations related to data and information protection.
comply with regulations related to data and information protection.
Suggested answer: A
asked 18/09/2024
giancarlo bagnetti srl
43 questions

Question 96

Report Export Collapse

As one component of a physical security system, an Electronic Access Control (EAC) token is BEST known for its ability to

overcome the problems of key assignments.
overcome the problems of key assignments.
monitor the opening of windows and doors.
monitor the opening of windows and doors.
trigger alarms when intruders are detected.
trigger alarms when intruders are detected.
lock down a facility during an emergency.
lock down a facility during an emergency.
Suggested answer: A
asked 18/09/2024
Dinu Jose Varghese
41 questions

Question 97

Report Export Collapse

Which one of the following is a fundamental objective in handling an incident?

To restore control of the affected systems
To restore control of the affected systems
To confiscate the suspect's computers
To confiscate the suspect's computers
To prosecute the attacker
To prosecute the attacker
To perform full backups of the system
To perform full backups of the system
Suggested answer: A
asked 18/09/2024
Unai M
45 questions

Question 98

Report Export Collapse

In the area of disaster planning and recovery, what strategy entails the presentation of information about the plan?

Communication
Communication
Planning
Planning
Recovery
Recovery
Escalation
Escalation
Suggested answer: A
asked 18/09/2024
Derek Steven Schulte
47 questions

Question 99

Report Export Collapse

The process of mutual authentication involves a computer system authenticating a user and authenticating the

user to the audit process.
user to the audit process.
computer system to the user.
computer system to the user.
user's access to all authorized objects.
user's access to all authorized objects.
computer system to the audit process.
computer system to the audit process.
Suggested answer: B
asked 18/09/2024
Debaparna Bandyopadhyay
45 questions

Question 100

Report Export Collapse

What maintenance activity is responsible for defining, implementing, and testing updates to application systems?

Program change control
Program change control
Regression testing
Regression testing
Export exception control
Export exception control
User acceptance testing
User acceptance testing
Suggested answer: A
asked 18/09/2024
Md Hossain
48 questions
Total 1.482 questions
Go to page: of 149