ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 10

Question list
Search
Search

The birthday attack is MOST effective against which one of the following cipher technologies?

A.
Chaining block encryption
A.
Chaining block encryption
Answers
B.
Asymmetric cryptography
B.
Asymmetric cryptography
Answers
C.
Cryptographic hash
C.
Cryptographic hash
Answers
D.
Streaming cryptography
D.
Streaming cryptography
Answers
Suggested answer: C

An advantage of link encryption in a communications network is that it

A.
makes key management and distribution easier.
A.
makes key management and distribution easier.
Answers
B.
protects data from start to finish through the entire network.
B.
protects data from start to finish through the entire network.
Answers
C.
improves the efficiency of the transmission.
C.
improves the efficiency of the transmission.
Answers
D.
encrypts all information, including headers and routing information.
D.
encrypts all information, including headers and routing information.
Answers
Suggested answer: D

Which one of the following is the MOST important in designing a biometric access system if it is essential that no one other than authorized individuals are admitted?

A.
False Acceptance Rate (FAR)
A.
False Acceptance Rate (FAR)
Answers
B.
False Rejection Rate (FRR)
B.
False Rejection Rate (FRR)
Answers
C.
Crossover Error Rate (CER)
C.
Crossover Error Rate (CER)
Answers
D.
Rejection Error Rate
D.
Rejection Error Rate
Answers
Suggested answer: A

What is the term commonly used to refer to a technique of authenticating one machine to another by forging packets from a trusted source?

A.
Man-in-the-Middle (MITM) attack
A.
Man-in-the-Middle (MITM) attack
Answers
B.
Smurfing
B.
Smurfing
Answers
C.
Session redirect
C.
Session redirect
Answers
D.
Spoofing
D.
Spoofing
Answers
Suggested answer: D

The PRIMARY purpose of a security awareness program is to

A.
ensure that everyone understands the organization's policies and procedures.
A.
ensure that everyone understands the organization's policies and procedures.
Answers
B.
communicate that access to information will be granted on a need-to-know basis.
B.
communicate that access to information will be granted on a need-to-know basis.
Answers
C.
warn all users that access to all systems will be monitored on a daily basis.
C.
warn all users that access to all systems will be monitored on a daily basis.
Answers
D.
comply with regulations related to data and information protection.
D.
comply with regulations related to data and information protection.
Answers
Suggested answer: A

As one component of a physical security system, an Electronic Access Control (EAC) token is BEST known for its ability to

A.
overcome the problems of key assignments.
A.
overcome the problems of key assignments.
Answers
B.
monitor the opening of windows and doors.
B.
monitor the opening of windows and doors.
Answers
C.
trigger alarms when intruders are detected.
C.
trigger alarms when intruders are detected.
Answers
D.
lock down a facility during an emergency.
D.
lock down a facility during an emergency.
Answers
Suggested answer: A

Which one of the following is a fundamental objective in handling an incident?

A.
To restore control of the affected systems
A.
To restore control of the affected systems
Answers
B.
To confiscate the suspect's computers
B.
To confiscate the suspect's computers
Answers
C.
To prosecute the attacker
C.
To prosecute the attacker
Answers
D.
To perform full backups of the system
D.
To perform full backups of the system
Answers
Suggested answer: A

In the area of disaster planning and recovery, what strategy entails the presentation of information about the plan?

A.
Communication
A.
Communication
Answers
B.
Planning
B.
Planning
Answers
C.
Recovery
C.
Recovery
Answers
D.
Escalation
D.
Escalation
Answers
Suggested answer: A

The process of mutual authentication involves a computer system authenticating a user and authenticating the

A.
user to the audit process.
A.
user to the audit process.
Answers
B.
computer system to the user.
B.
computer system to the user.
Answers
C.
user's access to all authorized objects.
C.
user's access to all authorized objects.
Answers
D.
computer system to the audit process.
D.
computer system to the audit process.
Answers
Suggested answer: B

What maintenance activity is responsible for defining, implementing, and testing updates to application systems?

A.
Program change control
A.
Program change control
Answers
B.
Regression testing
B.
Regression testing
Answers
C.
Export exception control
C.
Export exception control
Answers
D.
User acceptance testing
D.
User acceptance testing
Answers
Suggested answer: A
Total 1.482 questions
Go to page: of 149