ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 103

Question list
Search
Search

List of questions

Search

What is the MOST important factor in establishing an effective Information Security Awareness Program?

A.
Obtain management buy-in.
A.
Obtain management buy-in.
Answers
B.
Conduct an annual security awareness event.
B.
Conduct an annual security awareness event.
Answers
C.
Mandate security training.
C.
Mandate security training.
Answers
D.
Hang information security posters on the walls,
D.
Hang information security posters on the walls,
Answers
Suggested answer: C

Which of the following events prompts a review of the disaster recovery plan (DRP)?

A.
New members added to the steering committee
A.
New members added to the steering committee
Answers
B.
Completion of the security policy review
B.
Completion of the security policy review
Answers
C.
Change in senior management
C.
Change in senior management
Answers
D.
Organizational merger
D.
Organizational merger
Answers
Suggested answer: D

An organization plans to acquire @ commercial off-the-shelf (COTS) system to replace their aging home-built reporting system. When should the organization's security team FIRST get involved in this acquisition's life cycle?

A.
When the system is being designed, purchased, programmed, developed, or otherwise constructed
A.
When the system is being designed, purchased, programmed, developed, or otherwise constructed
Answers
B.
When the system is verified and validated
B.
When the system is verified and validated
Answers
C.
When the system is deployed into production
C.
When the system is deployed into production
Answers
D.
When the need for a system is expressed and the purpose of the system Is documented
D.
When the need for a system is expressed and the purpose of the system Is documented
Answers
Suggested answer: D

A developer begins employment with an information technology (IT) organization. On the first day, the developer works through the list of assigned projects and finds that some files within those projects aren't accessible, Other developers working on the same project have no trouble locating and working on the. What is the MOST likely for the discrepancy in access?

A.
The IT administrator had failed to grant the developer privileged access to the servers.
A.
The IT administrator had failed to grant the developer privileged access to the servers.
Answers
B.
The project files were inadvertently deleted.
B.
The project files were inadvertently deleted.
Answers
C.
The new developer's computer had not been added to an access control list (ACL).
C.
The new developer's computer had not been added to an access control list (ACL).
Answers
D.
The new developer's user account was not associated with the right roles needed for the projects.
D.
The new developer's user account was not associated with the right roles needed for the projects.
Answers
Suggested answer: A

Which of the following measures serves as the BEST means for protecting data on computers, smartphones, and external storage devices when traveling to high-risk countries?

A.
Review applicable destination country laws, forensically clean devices prior to travel, and only download sensitive data over a virtual private network (VPN) upon arriving at the destination.
A.
Review applicable destination country laws, forensically clean devices prior to travel, and only download sensitive data over a virtual private network (VPN) upon arriving at the destination.
Answers
B.
Keep laptops, external storage devices, and smartphones in the hotel room when not in use.
B.
Keep laptops, external storage devices, and smartphones in the hotel room when not in use.
Answers
C.
Leverage a Secure Socket Layer (SSL) connection over a virtual private network (VPN) to download sensitive data upon arriving at the destination.
C.
Leverage a Secure Socket Layer (SSL) connection over a virtual private network (VPN) to download sensitive data upon arriving at the destination.
Answers
D.
Use multi-factor authentication (MFA) to gain access to data stored on laptops or external storage devices and biometric fingerprint access control isms to unlock smartphones.
D.
Use multi-factor authentication (MFA) to gain access to data stored on laptops or external storage devices and biometric fingerprint access control isms to unlock smartphones.
Answers
Suggested answer: D

Which of the following implementations will achieve high availability in a website?

A.
Multiple Domain Name System (DNS) entries resolving to the same web server and large amounts of bandwidth
A.
Multiple Domain Name System (DNS) entries resolving to the same web server and large amounts of bandwidth
Answers
B.
Disk mirroring of the web server with redundant disk drives in a hardened data center
B.
Disk mirroring of the web server with redundant disk drives in a hardened data center
Answers
C.
Disk striping of the web server hard drives and large amounts of bandwidth
C.
Disk striping of the web server hard drives and large amounts of bandwidth
Answers
D.
Multiple geographically dispersed web servers that are configured for failover
D.
Multiple geographically dispersed web servers that are configured for failover
Answers
Suggested answer: D

Which of the following phases in the software acquisition process does developing evaluation criteria take place?

A.
Follow-On
A.
Follow-On
Answers
B.
Planning
B.
Planning
Answers
C.
Contracting
C.
Contracting
Answers
D.
Monitoring and Acceptance
D.
Monitoring and Acceptance
Answers
Suggested answer: D

Security Software Development Life Cycle (SDLC) expects application code to be written In a consistent manner to allow ease of auditing and which of the following?

A.
Protecting
A.
Protecting
Answers
B.
Executing
B.
Executing
Answers
C.
Copying
C.
Copying
Answers
D.
Enhancing
D.
Enhancing
Answers
Suggested answer: A

In the common criteria, which of the following is a formal document that expresses an implementation-independent set of security requirements?

A.
Organizational Security Policy
A.
Organizational Security Policy
Answers
B.
Security Target (ST)
B.
Security Target (ST)
Answers
C.
Protection Profile (PP)
C.
Protection Profile (PP)
Answers
D.
Target of Evaluation (TOE)
D.
Target of Evaluation (TOE)
Answers
Suggested answer: C

Which of the following is considered the FIRST step when designing an internal security control assessment?

A.
Create a plan based on recent vulnerability scans of the systems in question.
A.
Create a plan based on recent vulnerability scans of the systems in question.
Answers
B.
Create a plan based on comprehensive knowledge of known breaches.
B.
Create a plan based on comprehensive knowledge of known breaches.
Answers
C.
Create a plan based on a recognized framework of known controls.
C.
Create a plan based on a recognized framework of known controls.
Answers
D.
Create a plan based on reconnaissance of the organization's infrastructure.
D.
Create a plan based on reconnaissance of the organization's infrastructure.
Answers
Suggested answer: D
Total 1.482 questions
Go to page: of 149