ISC CISSP Practice Test - Questions Answers, Page 107
List of questions
Question 1061

Two computers, each with a single connection on the same physical 10 gigabit Ethernet network segment, need to communicate with each other. The first machine has a single Internet Protocol (IP) Classless Inter-Domain Routing (CIDR) address of 192.168.1.3/30 and the second machine has an IP/CIDR address 192.168.1.6/30. Which of the following is correct?
Question 1062

The security team is notified that a device on the network is infected with malware. Which of the following is MOST effective in enabling the device to be quickly located and remediated?
Question 1063

A corporation does not have a formal data destruction policy. During which phase of a criminal legal proceeding will this have the MOST impact?
Question 1064

Which of the following is the MOST common use of the Online Certificate Status Protocol (OCSP)?
Question 1065

Why would a system be structured to isolate different classes of information from one another and segregate them by user jurisdiction?
Question 1066

A security professional needs to find a secure and efficient method of encrypting data on an endpoint. Which solution includes a root key?
Question 1067

What method could be used to prevent passive attacks against secure voice communications between an organization and its vendor?
Question 1068

What is the MOST effective response to a hacker who has already gained access to a network and will attempt to pivot to other resources?
Question 1069

A Chief Information Officer (CIO) has delegated responsibility of their system security to the head of the information technology (IT) department. While corporate policy dictates that only the CIO can make decisions on the level of data protection required, technical implementation decisions are done by the head of the IT department. Which of the following BEST describes the security role filled by the head of the IT department?
Question 1070

Which of the following is a term used to describe maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions?
Question