ISC CISSP Practice Test - Questions Answers, Page 107
List of questions
Related questions
Two computers, each with a single connection on the same physical 10 gigabit Ethernet network segment, need to communicate with each other. The first machine has a single Internet Protocol (IP) Classless Inter-Domain Routing (CIDR) address of 192.168.1.3/30 and the second machine has an IP/CIDR address 192.168.1.6/30. Which of the following is correct?
The security team is notified that a device on the network is infected with malware. Which of the following is MOST effective in enabling the device to be quickly located and remediated?
A corporation does not have a formal data destruction policy. During which phase of a criminal legal proceeding will this have the MOST impact?
Which of the following is the MOST common use of the Online Certificate Status Protocol (OCSP)?
Why would a system be structured to isolate different classes of information from one another and segregate them by user jurisdiction?
A security professional needs to find a secure and efficient method of encrypting data on an endpoint. Which solution includes a root key?
What method could be used to prevent passive attacks against secure voice communications between an organization and its vendor?
What is the MOST effective response to a hacker who has already gained access to a network and will attempt to pivot to other resources?
A Chief Information Officer (CIO) has delegated responsibility of their system security to the head of the information technology (IT) department. While corporate policy dictates that only the CIO can make decisions on the level of data protection required, technical implementation decisions are done by the head of the IT department. Which of the following BEST describes the security role filled by the head of the IT department?
Which of the following is a term used to describe maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions?
Question