ExamGecko

ISC CISSP Practice Test - Questions Answers, Page 121

Question list
Search
Search

List of questions

Search

Question 1201

Report
Export
Collapse

Which of the following is a risk matrix?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1202

Report
Export
Collapse

Which evidence collecting technique would be utilized when it is believed an attacker is employing a rootkit and a quick analysis is needed?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1203

Report
Export
Collapse

A user is allowed to access the file labeled "Financial Forecast," but only between 9:00 a.m. and 5:00 p.m., Monday through Friday. Which type of access mechanism should be used to accomplish this?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1204

Report
Export
Collapse

An organization wants to share data securely with their partners via the Internet. Which standard port is typically used to meet this requirement?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1205

Report
Export
Collapse

Which part of an operating system (OS) is responsible for providing security interfaces among the hardware, OS, and other parts of the computing system?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1206

Report
Export
Collapse

Recently, an unknown event has disrupted a single Layer-2 network that spans between two geographically diverse data centers. The network engineers have asked for assistance in identifying the root cause of the event. Which of the following is the MOST likely cause?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1207

Report
Export
Collapse

What would be the BEST action to take in a situation where collected evidence was left unattended overnight in an unlocked vehicle?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1208

Report
Export
Collapse

Which of the following contributes MOST to the effectiveness of a security officer?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1209

Report
Export
Collapse

An organization wants a service provider to authenticate users via the users' organization domain credentials. Which markup language should the organization's security personnel use to support the integration?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1210

Report
Export
Collapse

A recent security audit is reporting several unsuccessful login attempts being repeated at specific times during the day on an Internet facing authentication server. No alerts have been generated by the security information and event management (SIEM) system. What PRIMARY action should be taken to improve SIEM performance?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member
Total 1.482 questions
Go to page: of 149