ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 118

Question list
Search
Search

In the "Do" phase of the Plan-Do-Check-Act model, which of the following is performed?

A.
Monitor and review performance against business continuity policy and objectives, report the results to management for review, and determine and authorize actions for remediation and improvement.
A.
Monitor and review performance against business continuity policy and objectives, report the results to management for review, and determine and authorize actions for remediation and improvement.
Answers
B.
Maintain and improve the Business Continuity Management (BCM) system by taking corrective action, based on the results of management review.
B.
Maintain and improve the Business Continuity Management (BCM) system by taking corrective action, based on the results of management review.
Answers
C.
Ensure the business continuity policy, controls, processes, and procedures have been implemented.
C.
Ensure the business continuity policy, controls, processes, and procedures have been implemented.
Answers
D.
Ensure that business continuity policy, objectives, targets, controls, processes and procedures relevant to improving business continuity have been established.
D.
Ensure that business continuity policy, objectives, targets, controls, processes and procedures relevant to improving business continuity have been established.
Answers
Suggested answer: D

Commercial off-the-shelf (COTS) software presents which of the following additional security concerns?

A.
Vendors take on the liability for COTS software vulnerabilities.
A.
Vendors take on the liability for COTS software vulnerabilities.
Answers
B.
In-house developed software is inherently less secure.
B.
In-house developed software is inherently less secure.
Answers
C.
Exploits for COTS software are well documented and publicly available.
C.
Exploits for COTS software are well documented and publicly available.
Answers
D.
COTS software is inherently less secure.
D.
COTS software is inherently less secure.
Answers
Suggested answer: C

What is the correct order of execution for security architecture?

A.
Governance, strategy and program management, project delivery, operations
A.
Governance, strategy and program management, project delivery, operations
Answers
B.
Strategy and program management, governance, project delivery, operations
B.
Strategy and program management, governance, project delivery, operations
Answers
C.
Governance, strategy and program management, operations, project delivery
C.
Governance, strategy and program management, operations, project delivery
Answers
D.
Strategy and program management, project delivery, governance, operations
D.
Strategy and program management, project delivery, governance, operations
Answers
Suggested answer: A

Which of the following is the PRIMARY purpose of due diligence when an organization embarks on a merger or acquisition?

A.
Assess the business risks.
A.
Assess the business risks.
Answers
B.
Formulate alternative strategies.
B.
Formulate alternative strategies.
Answers
C.
Determine that all parties are equally protected.
C.
Determine that all parties are equally protected.
Answers
D.
Provide adequate capability for all parties.
D.
Provide adequate capability for all parties.
Answers
E.
Strategy and program management, project delivery, governance, operations
E.
Strategy and program management, project delivery, governance, operations
Answers
Suggested answer: A

What should be used to determine the risks associated with using Software as a Service (SaaS) for collaboration and email?

A.
Cloud access security broker (CASB)
A.
Cloud access security broker (CASB)
Answers
B.
Open Web Application Security Project (OWASP)
B.
Open Web Application Security Project (OWASP)
Answers
C.
Process for Attack Simulation and Threat Analysis (PASTA)
C.
Process for Attack Simulation and Threat Analysis (PASTA)
Answers
D.
Common Security Framework (CSF)
D.
Common Security Framework (CSF)
Answers
Suggested answer: A

A federal agency has hired an auditor to perform penetration testing on a critical system as part of the mandatory, annual Federal Information Security Management Act (FISMA) security assessments.

The auditor is new to this system but has extensive experience with all types of penetration testing.

The auditor has decided to begin with sniffing network traffic. What type of penetration testing is the auditor conducting?

A.
White box testing
A.
White box testing
Answers
B.
Black box testing
B.
Black box testing
Answers
C.
Gray box testing
C.
Gray box testing
Answers
D.
Red box testing
D.
Red box testing
Answers
Suggested answer: C

A software developer wishes to write code that will execute safely and only as intended. Which of the following programming language types is MOST likely to achieve this goal?

A.
Statically typed
A.
Statically typed
Answers
B.
Weakly typed
B.
Weakly typed
Answers
C.
Strongly typed
C.
Strongly typed
Answers
D.
Dynamically typed
D.
Dynamically typed
Answers
Suggested answer: D

A security professional has been assigned to assess a web application. The assessment report recommends switching to Security Assertion Markup Language (SAML). What is the PRIMARY security benefit in switching to SAML?

A.
It uses Transport Layer Security (TLS) to address confidentiality.
A.
It uses Transport Layer Security (TLS) to address confidentiality.
Answers
B.
it enables single sign-on (SSO) for web applications.
B.
it enables single sign-on (SSO) for web applications.
Answers
C.
The users' password Is not passed during authentication.
C.
The users' password Is not passed during authentication.
Answers
D.
It limits unnecessary data entry on web forms.
D.
It limits unnecessary data entry on web forms.
Answers
Suggested answer: B

What is the MOST common security risk of a mobile device?

A.
Insecure communications link
A.
Insecure communications link
Answers
B.
Data leakage
B.
Data leakage
Answers
C.
Malware infection
C.
Malware infection
Answers
D.
Data spoofing
D.
Data spoofing
Answers
Suggested answer: C

Which of the following protection is provided when using a Virtual Private Network (VPN) with Authentication Header (AH)?

A.
Payload encryption
A.
Payload encryption
Answers
B.
Sender confidentiality
B.
Sender confidentiality
Answers
C.
Sender non-repudiation
C.
Sender non-repudiation
Answers
D.
Multi-factor authentication (MFA)
D.
Multi-factor authentication (MFA)
Answers
Suggested answer: C
Total 1.482 questions
Go to page: of 149