ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 119

Question list
Search
Search

Which of the following poses the GREATEST privacy risk to personally identifiable information (PII) when disposing of an office printer or copier?

A.
The device could contain a document with PII on the platen glass
A.
The device could contain a document with PII on the platen glass
Answers
B.
Organizational network configuration information could still be present within the device
B.
Organizational network configuration information could still be present within the device
Answers
C.
A hard disk drive (HDD) in the device could contain PII
C.
A hard disk drive (HDD) in the device could contain PII
Answers
D.
The device transfer roller could contain imprints of PII
D.
The device transfer roller could contain imprints of PII
Answers
Suggested answer: B

Which of the following is a key responsibility for a data steward assigned to manage an enterprise data lake?

A.
Ensure proper business definition, value, and usage of data collected and stored within the enterprise data lake.
A.
Ensure proper business definition, value, and usage of data collected and stored within the enterprise data lake.
Answers
B.
Ensure proper and identifiable data owners for each data element stored within an enterprise data lake.
B.
Ensure proper and identifiable data owners for each data element stored within an enterprise data lake.
Answers
C.
Ensure adequate security controls applied to the enterprise data lake.
C.
Ensure adequate security controls applied to the enterprise data lake.
Answers
D.
Ensure that any data passing within remit is being used in accordance with the rules and regulations of the business.
D.
Ensure that any data passing within remit is being used in accordance with the rules and regulations of the business.
Answers
Suggested answer: A

Which of the following are the three MAIN categories of security controls?

A.
Administrative, technical, physical
A.
Administrative, technical, physical
Answers
B.
Corrective, detective, recovery
B.
Corrective, detective, recovery
Answers
C.
Confidentiality, integrity, availability
C.
Confidentiality, integrity, availability
Answers
D.
Preventative, corrective, detective
D.
Preventative, corrective, detective
Answers
Suggested answer: A

What part of an organization's strategic risk assessment MOST likely includes information on items affecting the success of the organization?

A.
Key Risk Indicator (KRI)
A.
Key Risk Indicator (KRI)
Answers
B.
Threat analysis
B.
Threat analysis
Answers
C.
Vulnerability analysis
C.
Vulnerability analysis
Answers
D.
Key Performance Indicator (KPI)
D.
Key Performance Indicator (KPI)
Answers
Suggested answer: A

An organization has implemented a protection strategy to secure the network from unauthorized external access. The new Chief Information Security Officer (CISO) wants to increase security by better protecting the network from unauthorized internal access. Which Network Access Control (NAC) capability BEST meets this objective?

A.
Application firewall
A.
Application firewall
Answers
B.
Port security
B.
Port security
Answers
C.
Strong passwords
C.
Strong passwords
Answers
D.
Two-factor authentication (2FA)
D.
Two-factor authentication (2FA)
Answers
Suggested answer: D

What is the BEST way to restrict access to a file system on computing systems?

A.
Allow a user group to restrict access.
A.
Allow a user group to restrict access.
Answers
B.
Use a third-party tool to restrict access.
B.
Use a third-party tool to restrict access.
Answers
C.
Use least privilege at each level to restrict access.
C.
Use least privilege at each level to restrict access.
Answers
D.
Restrict access to all users.
D.
Restrict access to all users.
Answers
Suggested answer: C

During testing, where are the requirements to inform parent organizations, law enforcement, and a computer incident response team documented?

A.
Unit test results
A.
Unit test results
Answers
B.
Security assessment plan
B.
Security assessment plan
Answers
C.
System integration plan
C.
System integration plan
Answers
D.
Security Assessment Report (SAR)
D.
Security Assessment Report (SAR)
Answers
Suggested answer: D

What is static analysis intended to do when analyzing an executable file?

A.
Collect evidence of the executable file's usage, including dates of creation and last use.
A.
Collect evidence of the executable file's usage, including dates of creation and last use.
Answers
B.
Search the documents and files associated with the executable file.
B.
Search the documents and files associated with the executable file.
Answers
C.
Analyze the position of the file in the file system and the executable file's libraries.
C.
Analyze the position of the file in the file system and the executable file's libraries.
Answers
D.
Disassemble the file to gather information about the executable file's function.
D.
Disassemble the file to gather information about the executable file's function.
Answers
Suggested answer: D

In addition to life, protection of which of the following elements is MOST important when planning a data center site?

A.
Data and hardware
A.
Data and hardware
Answers
B.
Property and operations
B.
Property and operations
Answers
C.
Profits and assets
C.
Profits and assets
Answers
D.
Resources and reputation
D.
Resources and reputation
Answers
Suggested answer: D

In an IDEAL encryption system, who has sole access to the decryption key?

A.
System owner
A.
System owner
Answers
B.
Data owner
B.
Data owner
Answers
C.
Data custodian
C.
Data custodian
Answers
D.
System administrator
D.
System administrator
Answers
Suggested answer: B
Total 1.482 questions
Go to page: of 149