ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 113

Question list
Search
Search

List of questions

Search

A software development company found odd behavior in some recently developed software, creating a need for a more thorough code review. What is the MOST effective argument for a more thorough code review?

A.
It will increase flexibility of the applications developed.
A.
It will increase flexibility of the applications developed.
Answers
B.
It will increase accountability with the customers.
B.
It will increase accountability with the customers.
Answers
C.
It will impede the development process.
C.
It will impede the development process.
Answers
D.
lt will reduce the potential for vulnerabilities.
D.
lt will reduce the potential for vulnerabilities.
Answers
Suggested answer: D

A new site's gateway isn't able to form a tunnel to the existing site-to-site Internet Protocol Security (IPsec) virtual private network (VPN) device at headquarters. Devices at the new site have no problem accessing resources on the Internet. When testing connectivity between the remote site's gateway, it was observed that the external Internet Protocol (IP) address of the gateway was set to 192.168.1.1. and was configured to send outbound traffic to the Internet Service Provider (ISP) gateway at4 192.168.1.2. Which of the following would be the BEST way to resolve the issue and get the remote site connected?

A.
Enable IPSec tunnel mode on the VPN devices at the new site and the corporate headquarters.
A.
Enable IPSec tunnel mode on the VPN devices at the new site and the corporate headquarters.
Answers
B.
Enable Layer 2 Tunneling Protocol (L2TP) on the VPN devices at the new site and the corporate headquarters.
B.
Enable Layer 2 Tunneling Protocol (L2TP) on the VPN devices at the new site and the corporate headquarters.
Answers
C.
Enable Point-to-Point Tunneling Protocol (PPTP) on the VPN devices at the new site and the corporate headquarters.
C.
Enable Point-to-Point Tunneling Protocol (PPTP) on the VPN devices at the new site and the corporate headquarters.
Answers
D.
Enable Network Address Translation (NAT) - Traversal on the VPN devices at the new site and the corporate headquarters.
D.
Enable Network Address Translation (NAT) - Traversal on the VPN devices at the new site and the corporate headquarters.
Answers
Suggested answer: A

Which of the following examples is BEST to minimize the attack surface for a customer's private information?

A.
Obfuscation
A.
Obfuscation
Answers
B.
Collection limitation
B.
Collection limitation
Answers
C.
Authentication
C.
Authentication
Answers
D.
Data masking
D.
Data masking
Answers
Suggested answer: A

What are the essential elements of a Risk Assessment Report (RAR)?

A.
Table of contents, testing criteria, and index
A.
Table of contents, testing criteria, and index
Answers
B.
Table of contents, chapters, and executive summary
B.
Table of contents, chapters, and executive summary
Answers
C.
Executive summary, graph of risks, and process
C.
Executive summary, graph of risks, and process
Answers
D.
Executive summary, body of the report, and appendices
D.
Executive summary, body of the report, and appendices
Answers
Suggested answer: D

What is the PRIMARY benefit of incident reporting and computer crime investigations?

A.
Providing evidence to law enforcement
A.
Providing evidence to law enforcement
Answers
B.
Repairing the damage and preventing future occurrences
B.
Repairing the damage and preventing future occurrences
Answers
C.
Appointing a computer emergency response team
C.
Appointing a computer emergency response team
Answers
D.
Complying with security policy
D.
Complying with security policy
Answers
Suggested answer: D

Which of the following determines how traffic should flow based on the status of the infrastructure layer?

A.
Traffic plane
A.
Traffic plane
Answers
B.
Application plane
B.
Application plane
Answers
C.
Data plane
C.
Data plane
Answers
D.
Control plane
D.
Control plane
Answers
Suggested answer: A

In a multi-tenant cloud environment, what approach will secure logical access to assets?

A.
Hybrid cloud
A.
Hybrid cloud
Answers
B.
Transparency/Auditability of administrative access
B.
Transparency/Auditability of administrative access
Answers
C.
Controlled configuration management (CM)
C.
Controlled configuration management (CM)
Answers
D.
Virtual private cloud (VPC)
D.
Virtual private cloud (VPC)
Answers
Suggested answer: D

A company hired an external vendor to perform a penetration test ofa new payroll system. The company's internal test team had already performed an in-depth application and security test of the system and determined that it met security requirements. However, the external vendor uncovered significant security weaknesses where sensitive personal data was being sent unencrypted to the tax processing systems. What is the MOST likely cause of the security issues?

A.
Failure to perform interface testing
A.
Failure to perform interface testing
Answers
B.
Failure to perform negative testing
B.
Failure to perform negative testing
Answers
C.
Inadequate performance testing
C.
Inadequate performance testing
Answers
D.
Inadequate application level testing
D.
Inadequate application level testing
Answers
Suggested answer: A

Which of the following is the MOST effective method of detecting vulnerabilities in web-based applications early in the secure Software Development Life Cycle (SDLC)?

A.
Web application vulnerability scanning
A.
Web application vulnerability scanning
Answers
B.
Application fuzzing
B.
Application fuzzing
Answers
C.
Code review
C.
Code review
Answers
D.
Penetration testing
D.
Penetration testing
Answers
Suggested answer: C

A malicious user gains access to unprotected directories on a web server. Which of the following is MOST likely the cause for this information disclosure?

A.
Security misconfiguration
A.
Security misconfiguration
Answers
B.
Cross-site request forgery (CSRF)
B.
Cross-site request forgery (CSRF)
Answers
C.
Structured Query Language injection (SQLi)
C.
Structured Query Language injection (SQLi)
Answers
D.
Broken authentication management
D.
Broken authentication management
Answers
Suggested answer: A
Total 1.482 questions
Go to page: of 149