ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 104

Question list
Search
Search

List of questions

Search

The Chief Executive Officer (CEO) wants to implement an internal audit of the company's information security posture. The CEO wants to avoid any bias in the audit process; therefore, has assigned the Sales Director to conduct the audit.

After significant interaction over a period of weeks the audit concludes that the company's policies and procedures are sufficient, robust and well established. The CEO then moves on to engage an external penetration testing company in order to showcase the organization's robust information security stance. This exercise reveals significant failings in several critical security controls and shows that the incident response processes remain undocumented.

What is the MOST likely reason for this disparity in the results of the audit and the external penetration test?

A.
The external penetration testing company used custom zero-day attacks that could not have been predicted.
A.
The external penetration testing company used custom zero-day attacks that could not have been predicted.
Answers
B.
The information technology (IT) and governance teams have failed to disclose relevant information to the internal audit team leading to an incomplete assessment being formulated.
B.
The information technology (IT) and governance teams have failed to disclose relevant information to the internal audit team leading to an incomplete assessment being formulated.
Answers
C.
The scope of the penetration test exercise and the internal audit were significantly different.
C.
The scope of the penetration test exercise and the internal audit were significantly different.
Answers
D.
The audit team lacked the technical experience and training to make insightful and objective assessments of the data provided to them.
D.
The audit team lacked the technical experience and training to make insightful and objective assessments of the data provided to them.
Answers
Suggested answer: C

A small office is running WiFi 4 APs, and neighboring offices do not want to increase the throughput to associated devices. Which of the following is the MOST cost-efficient way for the office to increase network performance?

A.
Add another AP.
A.
Add another AP.
Answers
B.
Disable the 2.4GHz radios
B.
Disable the 2.4GHz radios
Answers
C.
Enable channel bonding.
C.
Enable channel bonding.
Answers
D.
Upgrade to WiFi 5.
D.
Upgrade to WiFi 5.
Answers
Suggested answer: C

An engineer notices some late collisions on a half-duplex link. The engineer verifies that the devices on both ends of the connection are configured for half duplex. Which of the following is the MOST likely cause of this issue?

A.
The link is improperly terminated
A.
The link is improperly terminated
Answers
B.
One of the devices is misconfigured
B.
One of the devices is misconfigured
Answers
C.
The cable length is excessive.
C.
The cable length is excessive.
Answers
D.
One of the devices has a hardware issue.
D.
One of the devices has a hardware issue.
Answers
Suggested answer: A

Which of the following VPN configurations should be used to separate Internet and corporate traffic?

A.
Split-tunnel
A.
Split-tunnel
Answers
B.
Remote desktop gateway
B.
Remote desktop gateway
Answers
C.
Site-to-site
C.
Site-to-site
Answers
D.
Out-of-band management
D.
Out-of-band management
Answers
Suggested answer: A

A technician wants to install a WAP in the center of a room that provides service in a radius surrounding a radio. Which of the following antenna types should the AP utilize?

A.
Omni
A.
Omni
Answers
B.
Directional
B.
Directional
Answers
C.
Yagi
C.
Yagi
Answers
D.
Parabolic
D.
Parabolic
Answers
Suggested answer: A

To comply with industry requirements, a security assessment on the cloud server should identify which protocols and weaknesses are being exposed to attackers on the Internet. Which of the following tools is the MOST appropriate to complete the assessment?

A.
Use tcpdump and parse the output file in a protocol analyzer.
A.
Use tcpdump and parse the output file in a protocol analyzer.
Answers
B.
Use an IP scanner and target the cloud WAN network addressing
B.
Use an IP scanner and target the cloud WAN network addressing
Answers
C.
Run netstat in each cloud server and retrieve the running processes.
C.
Run netstat in each cloud server and retrieve the running processes.
Answers
D.
Use nmap and set the servers' public IPs as the targets.
D.
Use nmap and set the servers' public IPs as the targets.
Answers
Suggested answer: D

Which of the following uses the destination IP address to forward packets?

A.
A bridge
A.
A bridge
Answers
B.
A Layer 2 switch
B.
A Layer 2 switch
Answers
C.
A router
C.
A router
Answers
D.
A repeater
D.
A repeater
Answers
Suggested answer: C

Which of the following would need to be configured to ensure a device with a specific MAC address is always assigned the same IP address from DHCP?

A.
Scope options
A.
Scope options
Answers
B.
Reservation
B.
Reservation
Answers
C.
Dynamic assignment
C.
Dynamic assignment
Answers
D.
Exclusion
D.
Exclusion
Answers
E.
Static assignment
E.
Static assignment
Answers
Suggested answer: B

Wireless users are reporting intermittent Internet connectivity. Connectivity is restored when the users disconnect and reconnect, utilizing the web authentication process each time.

The network administrator can see the devices connected to the APs at all times. Which of the following steps will MOST likely determine the cause of the issue?

A.
Verify the session time-out configuration on the captive portal settings
A.
Verify the session time-out configuration on the captive portal settings
Answers
B.
Check for encryption protocol mismatch on the client's wireless settings.
B.
Check for encryption protocol mismatch on the client's wireless settings.
Answers
C.
Confirm that a valid passphrase is being used during the web authentication.
C.
Confirm that a valid passphrase is being used during the web authentication.
Answers
D.
Investigate for a client's disassociation caused by an evil twin AP
D.
Investigate for a client's disassociation caused by an evil twin AP
Answers
Suggested answer: A

A fiber link connecting two campus networks is broken. Which of the following tools should an engineer use to detect the exact break point of the fiber link?

A.
OTDR
A.
OTDR
Answers
B.
Tone generator
B.
Tone generator
Answers
C.
Fusion splicer
C.
Fusion splicer
Answers
D.
Cable tester
D.
Cable tester
Answers
E.
PoE injector
E.
PoE injector
Answers
Suggested answer: A
Total 1.482 questions
Go to page: of 149