ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 102

Question list
Search
Search

List of questions

Search

Which of the following encryption technologies has the ability to function as a stream cipher?

A.
Cipher Feedback (CFB)
A.
Cipher Feedback (CFB)
Answers
B.
Feistel cipher
B.
Feistel cipher
Answers
C.
Cipher Block Chaining (CBC) with error propagation
C.
Cipher Block Chaining (CBC) with error propagation
Answers
D.
Electronic Code Book (ECB)
D.
Electronic Code Book (ECB)
Answers
Suggested answer: A

An attack utilizing social engineering and a malicious Uniform Resource Locator (URL) link to take advantage of a victim's existing browser session with a web application is an example of which of the following types of attack?

A.
Cross-Site Scripting (XSS)
A.
Cross-Site Scripting (XSS)
Answers
B.
Cross-site request forgery (CSRF)
B.
Cross-site request forgery (CSRF)
Answers
C.
Injection
C.
Injection
Answers
D.
Click jacking
D.
Click jacking
Answers
Suggested answer: B

Which of the following is the BEST method to identify security controls that should be implemented for a web-based application while in development?

A.
Application threat modeling
A.
Application threat modeling
Answers
B.
Secure software development.
B.
Secure software development.
Answers
C.
Agile software development
C.
Agile software development
Answers
D.
Penetration testing
D.
Penetration testing
Answers
Suggested answer: A

A security professional has reviewed a recent site assessment and has noted that a server room on the second floor of a building has Heating, Ventilation, and Air Conditioning (HVAC) intakes on the ground level that have ultraviolet light filters installed, Aero-K Fire suppression in the server room, and pre-action fire suppression on floors above the server room. Which of the following changes can the security professional recommend to reduce risk associated with these conditions?

A.
Remove the ultraviolet light filters on the HVAC intake and replace the fire suppression system on the upper floors with a dry system
A.
Remove the ultraviolet light filters on the HVAC intake and replace the fire suppression system on the upper floors with a dry system
Answers
B.
Add additional ultraviolet light filters to the HVAC intake supply and return ducts and change server room fire suppression to FM-200
B.
Add additional ultraviolet light filters to the HVAC intake supply and return ducts and change server room fire suppression to FM-200
Answers
C.
Apply additional physical security around the HVAC intakes and update upper floor fire suppression to FM-200.
C.
Apply additional physical security around the HVAC intakes and update upper floor fire suppression to FM-200.
Answers
D.
Elevate the HVAC intake by constructing a plenum or external shaft over it and convert the server room fire suppression to a pre-action system
D.
Elevate the HVAC intake by constructing a plenum or external shaft over it and convert the server room fire suppression to a pre-action system
Answers
Suggested answer: C

An organization is setting a security assessment scope with the goal of developing a Security Management Program (SMP). The next step is to select an approach for conducting the risk assessment. Which of the following approaches is

MOST effective for the SMP?

A.
Data driven risk assessment with a focus on data
A.
Data driven risk assessment with a focus on data
Answers
B.
Security controls driven assessment that focuses on controls management
B.
Security controls driven assessment that focuses on controls management
Answers
C.
Business processes based risk assessment with a focus on business goals
C.
Business processes based risk assessment with a focus on business goals
Answers
D.
Asset driven risk assessment with a focus on the assets
D.
Asset driven risk assessment with a focus on the assets
Answers
Suggested answer: A

Which combination of cryptographic algorithms are compliant with Federal Information Processing Standard (FIPS) Publication 140-2 for non-legacy systems?

A.
Diffie-hellman (DH) key exchange: DH (>=2048 bits)Symmetric Key: Advanced Encryption Standard (AES) > 128 bitsDigital Signature: Rivest-Shamir-Adleman (RSA) (1024 bits)
A.
Diffie-hellman (DH) key exchange: DH (>=2048 bits)Symmetric Key: Advanced Encryption Standard (AES) > 128 bitsDigital Signature: Rivest-Shamir-Adleman (RSA) (1024 bits)
Answers
B.
Diffie-hellman (DH) key exchange: DH (>=2048 bits)Symmetric Key: Advanced Encryption Standard (AES) > 128 bitsDigital Signature: Digital Signature Algorithm (DSA) (>=2048 bits)
B.
Diffie-hellman (DH) key exchange: DH (>=2048 bits)Symmetric Key: Advanced Encryption Standard (AES) > 128 bitsDigital Signature: Digital Signature Algorithm (DSA) (>=2048 bits)
Answers
C.
Diffie-hellman (DH) key exchange: DH (<= 1024 bits)Symmetric Key: BlowfishDigital Signature: Rivest-Shamir-Adleman (RSA) (>=2048 bits)
C.
Diffie-hellman (DH) key exchange: DH (<= 1024 bits)Symmetric Key: BlowfishDigital Signature: Rivest-Shamir-Adleman (RSA) (>=2048 bits)
Answers
D.
Diffie-hellman (DH) key exchange: DH (>=2048 bits)Symmetric Key: Advanced Encryption Standard (AES) < 128 bitsDigital Signature: Elliptic Curve Digital Signature Algorithm (ECDSA) (>=256 bits)
D.
Diffie-hellman (DH) key exchange: DH (>=2048 bits)Symmetric Key: Advanced Encryption Standard (AES) < 128 bitsDigital Signature: Elliptic Curve Digital Signature Algorithm (ECDSA) (>=256 bits)
Answers
Suggested answer: C

An international trading organization that holds an International Organization for Standardization (ISO) 27001 certification is seeking to outsource their security monitoring to a managed security service provider (MSSP), The trading organization's security officer is tasked with drafting the requirements that need to be included in the outsourcing contract.

Which of the following MUST be included in the contract?

A.
A detailed overview of all equipment involved in the outsourcing contract
A.
A detailed overview of all equipment involved in the outsourcing contract
Answers
B.
The MSSP having an executive manager responsible for information security
B.
The MSSP having an executive manager responsible for information security
Answers
C.
The right to perform security compliance tests on the MSSP's equipment
C.
The right to perform security compliance tests on the MSSP's equipment
Answers
D.
The right to audit the MSSP's security process
D.
The right to audit the MSSP's security process
Answers
Suggested answer: C

Which of the following is the MOST effective measure for dealing with rootkit attacks?

A.
Turing off unauthorized services and rebooting the system
A.
Turing off unauthorized services and rebooting the system
Answers
B.
Finding and replacing the altered binaries with legitimate ones
B.
Finding and replacing the altered binaries with legitimate ones
Answers
C.
Restoring the system from the last backup
C.
Restoring the system from the last backup
Answers
D.
Reinstalling the system from trusted sources
D.
Reinstalling the system from trusted sources
Answers
Suggested answer: D

While classifying credit card data related to Payment Card Industry Data Security Standards (PCI-DSS), which of the following is a PRIMARY security requirement?

A.
Processor agreements with card holders
A.
Processor agreements with card holders
Answers
B.
Three-year retention of data
B.
Three-year retention of data
Answers
C.
Encryption of data
C.
Encryption of data
Answers
D.
Specific card disposal methodology
D.
Specific card disposal methodology
Answers
Suggested answer: C

Write Once, Read Many (WORM) data storage devices are designed to BEST support which of the following core security concepts?

A.
lntegrity
A.
lntegrity
Answers
B.
Scalability
B.
Scalability
Answers
C.
Availability
C.
Availability
Answers
D.
Confidentiality
D.
Confidentiality
Answers
Suggested answer: A
Total 1.482 questions
Go to page: of 149