ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 12

Question list
Search
Search

The Structured Query Language (SQL) implements Discretionary Access Controls (DAC) using

A.
INSERT and DELETE.
A.
INSERT and DELETE.
Answers
B.
GRANT and REVOKE.
B.
GRANT and REVOKE.
Answers
C.
PUBLIC and PRIVATE.
C.
PUBLIC and PRIVATE.
Answers
D.
ROLLBACK and TERMINATE.
D.
ROLLBACK and TERMINATE.
Answers
Suggested answer: B

Which layer of the Open Systems Interconnections (OSI) model implementation adds information concerning the logical connection between the sender and receiver?

A.
Physical
A.
Physical
Answers
B.
Session
B.
Session
Answers
C.
Transport
C.
Transport
Answers
D.
Data-Link
D.
Data-Link
Answers
Suggested answer: C

Which of the following is a network intrusion detection technique?

A.
Statistical anomaly
A.
Statistical anomaly
Answers
B.
Perimeter intrusion
B.
Perimeter intrusion
Answers
C.
Port scanning
C.
Port scanning
Answers
D.
Network spoofing
D.
Network spoofing
Answers
Suggested answer: C

Internet Protocol (IP) source address spoofing is used to defeat

A.
address-based authentication.
A.
address-based authentication.
Answers
B.
Address Resolution Protocol (ARP).
B.
Address Resolution Protocol (ARP).
Answers
C.
Reverse Address Resolution Protocol (RARP).
C.
Reverse Address Resolution Protocol (RARP).
Answers
D.
Transmission Control Protocol (TCP) hijacking.
D.
Transmission Control Protocol (TCP) hijacking.
Answers
Suggested answer: A

Which of the following is an authentication protocol in which a new random number is generated uniquely for each login session?

A.
Challenge Handshake Authentication Protocol (CHAP)
A.
Challenge Handshake Authentication Protocol (CHAP)
Answers
B.
Point-to-Point Protocol (PPP)
B.
Point-to-Point Protocol (PPP)
Answers
C.
Extensible Authentication Protocol (EAP)
C.
Extensible Authentication Protocol (EAP)
Answers
D.
Password Authentication Protocol (PAP)
D.
Password Authentication Protocol (PAP)
Answers
Suggested answer: A

What security management control is MOST often broken by collusion?

A.
Job rotation
A.
Job rotation
Answers
B.
Separation of duties
B.
Separation of duties
Answers
C.
Least privilege model
C.
Least privilege model
Answers
D.
Increased monitoring
D.
Increased monitoring
Answers
Suggested answer: B

An Intrusion Detection System (IDS) is generating alarms that a user account has over 100 failed login attempts per minute. A sniffer is placed on the network, and a variety of passwords for that user are noted. Which of the following is

MOST likely occurring?

A.
A dictionary attack
A.
A dictionary attack
Answers
B.
A Denial of Service (DoS) attack
B.
A Denial of Service (DoS) attack
Answers
C.
A spoofing attack
C.
A spoofing attack
Answers
D.
A backdoor installation
D.
A backdoor installation
Answers
Suggested answer: A

An engineer in a software company has created a virus creation tool. The tool can generate thousands of polymorphic viruses. The engineer is planning to use the tool in a controlled environment to test the company's next generation virus scanning software. Which would BEST describe the behavior of the engineer and why?

A.
The behavior is ethical because the tool will be used to create a better virus scanner.
A.
The behavior is ethical because the tool will be used to create a better virus scanner.
Answers
B.
The behavior is ethical because any experienced programmer could create such a tool.
B.
The behavior is ethical because any experienced programmer could create such a tool.
Answers
C.
The behavior is not ethical because creating any kind of virus is bad.
C.
The behavior is not ethical because creating any kind of virus is bad.
Answers
D.
The behavior is not ethical because such a tool could be leaked on the Internet.
D.
The behavior is not ethical because such a tool could be leaked on the Internet.
Answers
Suggested answer: A

Which of the following Disaster Recovery (DR) sites is the MOST difficult to test?

A.
Hot site
A.
Hot site
Answers
B.
Cold site
B.
Cold site
Answers
C.
Warm site
C.
Warm site
Answers
D.
Mobile site
D.
Mobile site
Answers
Suggested answer: B

Which of the following statements is TRUE for point-to-point microwave transmissions?

A.
They are not subject to interception due to encryption.
A.
They are not subject to interception due to encryption.
Answers
B.
Interception only depends on signal strength.
B.
Interception only depends on signal strength.
Answers
C.
They are too highly multiplexed for meaningful interception.
C.
They are too highly multiplexed for meaningful interception.
Answers
D.
They are subject to interception by an antenna within proximity.
D.
They are subject to interception by an antenna within proximity.
Answers
Suggested answer: D
Total 1.482 questions
Go to page: of 149