ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 116

Question list
Search
Search

Which of the following is the top barrier for companies to adopt cloud technology?

A.
Migration period
A.
Migration period
Answers
B.
Data integrity
B.
Data integrity
Answers
C.
Cost
C.
Cost
Answers
D.
Security
D.
Security
Answers
Suggested answer: D

In which of the following scenarios is locking server cabinets and limiting access to keys preferable to locking the server room to prevent unauthorized access?

A.
Server cabinets are located in an unshared workspace.
A.
Server cabinets are located in an unshared workspace.
Answers
B.
Server cabinets are located in an isolated server farm.
B.
Server cabinets are located in an isolated server farm.
Answers
C.
Server hardware is located in a remote area.
C.
Server hardware is located in a remote area.
Answers
D.
Server cabinets share workspace with multiple projects.
D.
Server cabinets share workspace with multiple projects.
Answers
Suggested answer: D

Which of the following criteria ensures information is protected relative to its importance to the organization?

A.
The value of the data to the organization's senior management
A.
The value of the data to the organization's senior management
Answers
B.
Legal requirements, value, criticality, and sensitivity to unauthorized disclosure or modification
B.
Legal requirements, value, criticality, and sensitivity to unauthorized disclosure or modification
Answers
C.
Legal requirements determined by the organization headquarters' location
C.
Legal requirements determined by the organization headquarters' location
Answers
D.
Organizational stakeholders, with classification approved by the management board
D.
Organizational stakeholders, with classification approved by the management board
Answers
Suggested answer: D

What is the FIRST step for an organization to take before allowing personnel to access social media from a corporate device or user account?

A.
Publish a social media guidelines document.
A.
Publish a social media guidelines document.
Answers
B.
Publish an acceptable usage policy.
B.
Publish an acceptable usage policy.
Answers
C.
Document a procedure for accessing social media sites.
C.
Document a procedure for accessing social media sites.
Answers
D.
Deliver security awareness training.
D.
Deliver security awareness training.
Answers
Suggested answer: A

Which of the following is an indicator that a company's new user security awareness training module has been effective?

A.
There are more secure connections to the internal database servers.
A.
There are more secure connections to the internal database servers.
Answers
B.
More incidents of phishing attempts are being reported.
B.
More incidents of phishing attempts are being reported.
Answers
C.
There are more secure connections to internal e-mail servers.
C.
There are more secure connections to internal e-mail servers.
Answers
D.
Fewer incidents of phishing attempts are being reported.
D.
Fewer incidents of phishing attempts are being reported.
Answers
Suggested answer: B

An access control list (ACL) on a router is a feature MOST similar to which type of firewall?

A.
Packet filtering firewall
A.
Packet filtering firewall
Answers
B.
Application gateway firewall
B.
Application gateway firewall
Answers
C.
Heuristic firewall
C.
Heuristic firewall
Answers
D.
Stateful firewall
D.
Stateful firewall
Answers
Suggested answer: B

Which of the following is the BEST way to protect privileged accounts?

A.
Quarterly user access rights audits
A.
Quarterly user access rights audits
Answers
B.
Role-based access control (RBAC)
B.
Role-based access control (RBAC)
Answers
C.
Written supervisory approval
C.
Written supervisory approval
Answers
D.
Multi-factor authentication (MFA)
D.
Multi-factor authentication (MFA)
Answers
Suggested answer: D

Which of the following is the FIRST step for defining Service Level Requirements (SLR)?

A.
Creating a prototype to confirm or refine the customer requirements
A.
Creating a prototype to confirm or refine the customer requirements
Answers
B.
Drafting requirements for the service level agreement (SLA)
B.
Drafting requirements for the service level agreement (SLA)
Answers
C.
Discussing technology and solution requirements with the customer
C.
Discussing technology and solution requirements with the customer
Answers
D.
Capturing and documenting the requirements of the customer
D.
Capturing and documenting the requirements of the customer
Answers
Suggested answer: D

Which software defined networking (SDN) architectural component is responsible for translating network requirements?

A.
SDN Application
A.
SDN Application
Answers
B.
SDN Data path
B.
SDN Data path
Answers
C.
SDN Controller
C.
SDN Controller
Answers
D.
SDN Northbound Interfaces
D.
SDN Northbound Interfaces
Answers
Suggested answer: D

When MUST an organization's information security strategic plan be reviewed?

A.
Quarterly, when the organization's strategic plan is updated
A.
Quarterly, when the organization's strategic plan is updated
Answers
B.
Whenever there are significant changes to a major application
B.
Whenever there are significant changes to a major application
Answers
C.
Every three years, when the organization's strategic plan is updated
C.
Every three years, when the organization's strategic plan is updated
Answers
D.
Whenever there are major changes to the business
D.
Whenever there are major changes to the business
Answers
Suggested answer: D
Total 1.482 questions
Go to page: of 149