ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 11

Question list
Search
Search

Which one of the following describes granularity?

A.
Maximum number of entries available in an Access Control List (ACL)
A.
Maximum number of entries available in an Access Control List (ACL)
Answers
B.
Fineness to which a trusted system can authenticate users
B.
Fineness to which a trusted system can authenticate users
Answers
C.
Number of violations divided by the number of total accesses
C.
Number of violations divided by the number of total accesses
Answers
D.
Fineness to which an access control system can be adjusted
D.
Fineness to which an access control system can be adjusted
Answers
Suggested answer: D

In a basic SYN flood attack, what is the attacker attempting to achieve?

A.
Exceed the threshold limit of the connection queue for a given service
A.
Exceed the threshold limit of the connection queue for a given service
Answers
B.
Set the threshold to zero for a given service
B.
Set the threshold to zero for a given service
Answers
C.
Cause the buffer to overflow, allowing root access
C.
Cause the buffer to overflow, allowing root access
Answers
D.
Flush the register stack, allowing hijacking of the root account
D.
Flush the register stack, allowing hijacking of the root account
Answers
Suggested answer: A

The FIRST step in building a firewall is to

A.
assign the roles and responsibilities of the firewall administrators.
A.
assign the roles and responsibilities of the firewall administrators.
Answers
B.
define the intended audience who will read the firewall policy.
B.
define the intended audience who will read the firewall policy.
Answers
C.
identify mechanisms to encourage compliance with the policy.
C.
identify mechanisms to encourage compliance with the policy.
Answers
D.
perform a risk analysis to identify issues to be addressed.
D.
perform a risk analysis to identify issues to be addressed.
Answers
Suggested answer: D

A system has been scanned for vulnerabilities and has been found to contain a number of communication ports that have been opened without authority. To which of the following might this system have been subjected?

A.
Trojan horse
A.
Trojan horse
Answers
B.
Denial of Service (DoS)
B.
Denial of Service (DoS)
Answers
C.
Spoofing
C.
Spoofing
Answers
D.
Man-in-the-Middle (MITM)
D.
Man-in-the-Middle (MITM)
Answers
Suggested answer: A

Which type of control recognizes that a transaction amount is excessive in accordance with corporate policy?

A.
Detection
A.
Detection
Answers
B.
Prevention
B.
Prevention
Answers
C.
Investigation
C.
Investigation
Answers
D.
Correction
D.
Correction
Answers
Suggested answer: A

Which of the following defines the key exchange for Internet Protocol Security (IPSec)?

A.
Secure Sockets Layer (SSL) key exchange
A.
Secure Sockets Layer (SSL) key exchange
Answers
B.
Internet Key Exchange (IKE)
B.
Internet Key Exchange (IKE)
Answers
C.
Security Key Exchange (SKE)
C.
Security Key Exchange (SKE)
Answers
D.
Internet Control Message Protocol (ICMP)
D.
Internet Control Message Protocol (ICMP)
Answers
Suggested answer: B

The overall goal of a penetration test is to determine a system's

A.
ability to withstand an attack.
A.
ability to withstand an attack.
Answers
B.
capacity management.
B.
capacity management.
Answers
C.
error recovery capabilities.
C.
error recovery capabilities.
Answers
D.
reliability under stress.
D.
reliability under stress.
Answers
Suggested answer: A

When constructing an Information Protection Policy (IPP), it is important that the stated rules are necessary, adequate, and

A.
flexible.
A.
flexible.
Answers
B.
confidential.
B.
confidential.
Answers
C.
focused.
C.
focused.
Answers
D.
achievable.
D.
achievable.
Answers
Suggested answer: D

Which of the following is a security limitation of File Transfer Protocol (FTP)?

A.
Passive FTP is not compatible with web browsers.
A.
Passive FTP is not compatible with web browsers.
Answers
B.
Anonymous access is allowed.
B.
Anonymous access is allowed.
Answers
C.
FTP uses Transmission Control Protocol (TCP) ports 20 and 21.
C.
FTP uses Transmission Control Protocol (TCP) ports 20 and 21.
Answers
D.
Authentication is not encrypted.
D.
Authentication is not encrypted.
Answers
Suggested answer: D

In Business Continuity Planning (BCP), what is the importance of documenting business processes?

A.
Provides senior management with decision-making tools
A.
Provides senior management with decision-making tools
Answers
B.
Establishes and adopts ongoing testing and maintenance strategies
B.
Establishes and adopts ongoing testing and maintenance strategies
Answers
C.
Defines who will perform which functions during a disaster or emergency
C.
Defines who will perform which functions during a disaster or emergency
Answers
D.
Provides an understanding of the organization's interdependencies
D.
Provides an understanding of the organization's interdependencies
Answers
Suggested answer: D
Total 1.482 questions
Go to page: of 149