ExamGecko

ISC CISSP Practice Test - Questions Answers, Page 12

Question list
Search
Search

Question 111

Report
Export
Collapse

The Structured Query Language (SQL) implements Discretionary Access Controls (DAC) using

A.
INSERT and DELETE.
A.
INSERT and DELETE.
Answers
B.
GRANT and REVOKE.
B.
GRANT and REVOKE.
Answers
C.
PUBLIC and PRIVATE.
C.
PUBLIC and PRIVATE.
Answers
D.
ROLLBACK and TERMINATE.
D.
ROLLBACK and TERMINATE.
Answers
Suggested answer: B
asked 18/09/2024
C/1094 WOLOGUEDE COTONOU – BENIN NDENDE
36 questions

Question 112

Report
Export
Collapse

Which layer of the Open Systems Interconnections (OSI) model implementation adds information concerning the logical connection between the sender and receiver?

A.
Physical
A.
Physical
Answers
B.
Session
B.
Session
Answers
C.
Transport
C.
Transport
Answers
D.
Data-Link
D.
Data-Link
Answers
Suggested answer: C
asked 18/09/2024
Marco Morsiani
45 questions

Question 113

Report
Export
Collapse

Which of the following is a network intrusion detection technique?

A.
Statistical anomaly
A.
Statistical anomaly
Answers
B.
Perimeter intrusion
B.
Perimeter intrusion
Answers
C.
Port scanning
C.
Port scanning
Answers
D.
Network spoofing
D.
Network spoofing
Answers
Suggested answer: C
asked 18/09/2024
Amidou Florian TOURE
33 questions

Question 114

Report
Export
Collapse

Internet Protocol (IP) source address spoofing is used to defeat

A.
address-based authentication.
A.
address-based authentication.
Answers
B.
Address Resolution Protocol (ARP).
B.
Address Resolution Protocol (ARP).
Answers
C.
Reverse Address Resolution Protocol (RARP).
C.
Reverse Address Resolution Protocol (RARP).
Answers
D.
Transmission Control Protocol (TCP) hijacking.
D.
Transmission Control Protocol (TCP) hijacking.
Answers
Suggested answer: A
asked 18/09/2024
Carlos Roberto
52 questions

Question 115

Report
Export
Collapse

Which of the following is an authentication protocol in which a new random number is generated uniquely for each login session?

A.
Challenge Handshake Authentication Protocol (CHAP)
A.
Challenge Handshake Authentication Protocol (CHAP)
Answers
B.
Point-to-Point Protocol (PPP)
B.
Point-to-Point Protocol (PPP)
Answers
C.
Extensible Authentication Protocol (EAP)
C.
Extensible Authentication Protocol (EAP)
Answers
D.
Password Authentication Protocol (PAP)
D.
Password Authentication Protocol (PAP)
Answers
Suggested answer: A
asked 18/09/2024
Teste Teste
39 questions

Question 116

Report
Export
Collapse

What security management control is MOST often broken by collusion?

A.
Job rotation
A.
Job rotation
Answers
B.
Separation of duties
B.
Separation of duties
Answers
C.
Least privilege model
C.
Least privilege model
Answers
D.
Increased monitoring
D.
Increased monitoring
Answers
Suggested answer: B
asked 18/09/2024
Akash Makkar
35 questions

Question 117

Report
Export
Collapse

An Intrusion Detection System (IDS) is generating alarms that a user account has over 100 failed login attempts per minute. A sniffer is placed on the network, and a variety of passwords for that user are noted. Which of the following is

MOST likely occurring?

A.
A dictionary attack
A.
A dictionary attack
Answers
B.
A Denial of Service (DoS) attack
B.
A Denial of Service (DoS) attack
Answers
C.
A spoofing attack
C.
A spoofing attack
Answers
D.
A backdoor installation
D.
A backdoor installation
Answers
Suggested answer: A
asked 18/09/2024
Vishal Vitthal Pawar
41 questions

Question 118

Report
Export
Collapse

An engineer in a software company has created a virus creation tool. The tool can generate thousands of polymorphic viruses. The engineer is planning to use the tool in a controlled environment to test the company's next generation virus scanning software. Which would BEST describe the behavior of the engineer and why?

A.
The behavior is ethical because the tool will be used to create a better virus scanner.
A.
The behavior is ethical because the tool will be used to create a better virus scanner.
Answers
B.
The behavior is ethical because any experienced programmer could create such a tool.
B.
The behavior is ethical because any experienced programmer could create such a tool.
Answers
C.
The behavior is not ethical because creating any kind of virus is bad.
C.
The behavior is not ethical because creating any kind of virus is bad.
Answers
D.
The behavior is not ethical because such a tool could be leaked on the Internet.
D.
The behavior is not ethical because such a tool could be leaked on the Internet.
Answers
Suggested answer: A
asked 18/09/2024
Mitesh Patel
32 questions

Question 119

Report
Export
Collapse

Which of the following Disaster Recovery (DR) sites is the MOST difficult to test?

A.
Hot site
A.
Hot site
Answers
B.
Cold site
B.
Cold site
Answers
C.
Warm site
C.
Warm site
Answers
D.
Mobile site
D.
Mobile site
Answers
Suggested answer: B
asked 18/09/2024
Ahmad Zaher Al Ojaili
36 questions

Question 120

Report
Export
Collapse

Which of the following statements is TRUE for point-to-point microwave transmissions?

A.
They are not subject to interception due to encryption.
A.
They are not subject to interception due to encryption.
Answers
B.
Interception only depends on signal strength.
B.
Interception only depends on signal strength.
Answers
C.
They are too highly multiplexed for meaningful interception.
C.
They are too highly multiplexed for meaningful interception.
Answers
D.
They are subject to interception by an antenna within proximity.
D.
They are subject to interception by an antenna within proximity.
Answers
Suggested answer: D
asked 18/09/2024
Ihab ALkasrawi
34 questions
Total 1.482 questions
Go to page: of 149