ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 110

Question list
Search
Search

List of questions

Search

What level of Redundant Array of Independent Disks (RAID) is configured PRIMARILY for highperformance data reads and writes?

A.
RAID-0
A.
RAID-0
Answers
B.
RAID-1
B.
RAID-1
Answers
C.
RAID-5
C.
RAID-5
Answers
D.
RAID-6
D.
RAID-6
Answers
Suggested answer: A

A retail company is looking to start a development project that will utilize open source components in its code for the first time. The development team has already acquired several 'open source components and utilized them in proof of concept (POC) code. The team recognizes that the legal and operational risks are outweighed by the benefits of open-source software use. What MUST the organization do next?

A.
Mandate that all open-source components be approved by the Information Security Manager (ISM).
A.
Mandate that all open-source components be approved by the Information Security Manager (ISM).
Answers
B.
Scan all open-source components for security vulnerabilities.
B.
Scan all open-source components for security vulnerabilities.
Answers
C.
Establish an open-source compliance policy.
C.
Establish an open-source compliance policy.
Answers
D.
Require commercial support for all open-source components.
D.
Require commercial support for all open-source components.
Answers
Suggested answer: C

Upon commencement of an audit within an organization, which of the following actions is MOST important for the auditor(s) to take?

A.
Understand circumstances which may delay the overall audit timelines.
A.
Understand circumstances which may delay the overall audit timelines.
Answers
B.
Review all prior audit results to remove all areas of potential concern from the audit scope.
B.
Review all prior audit results to remove all areas of potential concern from the audit scope.
Answers
C.
Meet with stakeholders to review methodology, people to be interviewed, and audit scope.
C.
Meet with stakeholders to review methodology, people to be interviewed, and audit scope.
Answers
D.
Meet with stakeholders to understand which types of audits have been completed.
D.
Meet with stakeholders to understand which types of audits have been completed.
Answers
Suggested answer: C

An organization is planning a penetration test that simulates the malicious actions of a former network administrator. What kind of penetration test is needed?

A.
Functional test
A.
Functional test
Answers
B.
Unit test
B.
Unit test
Answers
C.
Grey box
C.
Grey box
Answers
D.
White box
D.
White box
Answers
Suggested answer: C

An organization has discovered that organizational data is posted by employees to data storage accessible to the general public. What is the PRIMARY step an organization must take to ensure data is properly protected from public release?

A.
Implement a data classification policy.
A.
Implement a data classification policy.
Answers
B.
Implement a data encryption policy.
B.
Implement a data encryption policy.
Answers
C.
Implement a user training policy.
C.
Implement a user training policy.
Answers
D.
Implement a user reporting policy.
D.
Implement a user reporting policy.
Answers
Suggested answer: C

What is the PRIMARY reason that a bit-level copy is more desirable than a file-level copy when replicating a hard drive's contents for an e-discovery investigation?

A.
Files that have been deleted will be transferred.
A.
Files that have been deleted will be transferred.
Answers
B.
The file and directory structure is retained.
B.
The file and directory structure is retained.
Answers
C.
File-level security settings will be preserved.
C.
File-level security settings will be preserved.
Answers
D.
The corruption of files is less likely.
D.
The corruption of files is less likely.
Answers
Suggested answer: A

While reviewing the financial reporting risks of a third-party application, which of the following Service Organization Control (SOC) reports will be the MOST useful?

A.
ISIsOC 1
A.
ISIsOC 1
Answers
B.
SOC 2
B.
SOC 2
Answers
C.
SOC 3
C.
SOC 3
Answers
D.
SOC for cybersecurity
D.
SOC for cybersecurity
Answers
Suggested answer: A

A large manufacturing organization arranges to buy an industrial machine system to produce a new line of products. The system includes software provided to the vendor by a thirdparty organization.

The financial risk to the manufacturing organization starting production is high. What step should the manufacturing organization take to minimize its financial risk in the new venture prior to the purchase?

A.
Hire a performance tester to execute offline tests on a system.
A.
Hire a performance tester to execute offline tests on a system.
Answers
B.
Calculate the possible loss in revenue to the organization due to software bugs and vulnerabilities, and compare that to the system's overall price.
B.
Calculate the possible loss in revenue to the organization due to software bugs and vulnerabilities, and compare that to the system's overall price.
Answers
C.
Place the machine behind a Layer 3 firewall.
C.
Place the machine behind a Layer 3 firewall.
Answers
D.
Require that the software be thoroughly tested by an accredited independent software testing company.
D.
Require that the software be thoroughly tested by an accredited independent software testing company.
Answers
Suggested answer: B

Which of the following types of hosts should be operating in the demilitarized zone (DMZ)?

A.
Hosts intended to provide limited access to public resources
A.
Hosts intended to provide limited access to public resources
Answers
B.
Database servers that can provide useful information to the public
B.
Database servers that can provide useful information to the public
Answers
C.
Hosts that store unimportant data such as demographical information
C.
Hosts that store unimportant data such as demographical information
Answers
D.
File servers containing organizational data
D.
File servers containing organizational data
Answers
Suggested answer: A

In systems security engineering, what does the security principle of modularity provide?

A.
Documentation of functions
A.
Documentation of functions
Answers
B.
Isolated functions and data
B.
Isolated functions and data
Answers
C.
Secure distribution of programs and data
C.
Secure distribution of programs and data
Answers
D.
Minimal access to perform a function
D.
Minimal access to perform a function
Answers
Suggested answer: A
Total 1.482 questions
Go to page: of 149