ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 107

List of questions

Question 1061

Report Export Collapse

Two computers, each with a single connection on the same physical 10 gigabit Ethernet network segment, need to communicate with each other. The first machine has a single Internet Protocol (IP) Classless Inter-Domain Routing (CIDR) address of 192.168.1.3/30 and the second machine has an IP/CIDR address 192.168.1.6/30. Which of the following is correct?

Become a Premium Member for full access
  Unlock Premium Member

Question 1062

Report Export Collapse

The security team is notified that a device on the network is infected with malware. Which of the following is MOST effective in enabling the device to be quickly located and remediated?

Become a Premium Member for full access
  Unlock Premium Member

Question 1063

Report Export Collapse

A corporation does not have a formal data destruction policy. During which phase of a criminal legal proceeding will this have the MOST impact?

Become a Premium Member for full access
  Unlock Premium Member

Question 1064

Report Export Collapse

Which of the following is the MOST common use of the Online Certificate Status Protocol (OCSP)?

Become a Premium Member for full access
  Unlock Premium Member

Question 1065

Report Export Collapse

Why would a system be structured to isolate different classes of information from one another and segregate them by user jurisdiction?

Become a Premium Member for full access
  Unlock Premium Member

Question 1066

Report Export Collapse

A security professional needs to find a secure and efficient method of encrypting data on an endpoint. Which solution includes a root key?

Become a Premium Member for full access
  Unlock Premium Member

Question 1067

Report Export Collapse

What method could be used to prevent passive attacks against secure voice communications between an organization and its vendor?

Become a Premium Member for full access
  Unlock Premium Member

Question 1068

Report Export Collapse

What is the MOST effective response to a hacker who has already gained access to a network and will attempt to pivot to other resources?

Become a Premium Member for full access
  Unlock Premium Member

Question 1069

Report Export Collapse

A Chief Information Officer (CIO) has delegated responsibility of their system security to the head of the information technology (IT) department. While corporate policy dictates that only the CIO can make decisions on the level of data protection required, technical implementation decisions are done by the head of the IT department. Which of the following BEST describes the security role filled by the head of the IT department?

Become a Premium Member for full access
  Unlock Premium Member

Question 1070

Report Export Collapse

Which of the following is a term used to describe maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.482 questions
Go to page: of 149
Search