ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 121

Question list
Search
Search

List of questions

Search

Which of the following is a risk matrix?

A.
A database of risks associated with a specific information system.
A.
A database of risks associated with a specific information system.
Answers
B.
A table of risk management factors for management to consider.
B.
A table of risk management factors for management to consider.
Answers
C.
A two-dimensional picture of risk for organizations, products, projects, or other items of interest.
C.
A two-dimensional picture of risk for organizations, products, projects, or other items of interest.
Answers
D.
A tool for determining risk management decisions for an activity or system.
D.
A tool for determining risk management decisions for an activity or system.
Answers
Suggested answer: C

Which evidence collecting technique would be utilized when it is believed an attacker is employing a rootkit and a quick analysis is needed?

A.
Memory collection
A.
Memory collection
Answers
B.
Forensic disk imaging
B.
Forensic disk imaging
Answers
C.
Malware analysis
C.
Malware analysis
Answers
D.
Live response
D.
Live response
Answers
Suggested answer: A

A user is allowed to access the file labeled "Financial Forecast," but only between 9:00 a.m. and 5:00 p.m., Monday through Friday. Which type of access mechanism should be used to accomplish this?

A.
Minimum access control
A.
Minimum access control
Answers
B.
Rule-based access control
B.
Rule-based access control
Answers
C.
Limited role-based access control (RBAC)
C.
Limited role-based access control (RBAC)
Answers
D.
Access control list (ACL)
D.
Access control list (ACL)
Answers
Suggested answer: B

An organization wants to share data securely with their partners via the Internet. Which standard port is typically used to meet this requirement?

A.
Setup a server on User Datagram Protocol (UDP) port 69
A.
Setup a server on User Datagram Protocol (UDP) port 69
Answers
B.
Setup a server on Transmission Control Protocol (TCP) port 21
B.
Setup a server on Transmission Control Protocol (TCP) port 21
Answers
C.
Setup a server on Transmission Control Protocol (TCP) port 22
C.
Setup a server on Transmission Control Protocol (TCP) port 22
Answers
D.
Setup a server on Transmission Control Protocol (TCP) port 80
D.
Setup a server on Transmission Control Protocol (TCP) port 80
Answers
Suggested answer: C

Which part of an operating system (OS) is responsible for providing security interfaces among the hardware, OS, and other parts of the computing system?

A.
Time separation
A.
Time separation
Answers
B.
Trusted Computing Base (TCB)
B.
Trusted Computing Base (TCB)
Answers
C.
Reference monitor
C.
Reference monitor
Answers
D.
Security kernel
D.
Security kernel
Answers
Suggested answer: D

Recently, an unknown event has disrupted a single Layer-2 network that spans between two geographically diverse data centers. The network engineers have asked for assistance in identifying the root cause of the event. Which of the following is the MOST likely cause?

A.
Misconfigured routing protocol
A.
Misconfigured routing protocol
Answers
B.
Smurf attack
B.
Smurf attack
Answers
C.
Broadcast domain too large
C.
Broadcast domain too large
Answers
D.
Address spoofing
D.
Address spoofing
Answers
Suggested answer: D

What would be the BEST action to take in a situation where collected evidence was left unattended overnight in an unlocked vehicle?

A.
Report the matter to the local police authorities.
A.
Report the matter to the local police authorities.
Answers
B.
Move evidence to a climate-controlled environment.
B.
Move evidence to a climate-controlled environment.
Answers
C.
Re-inventory the evidence and provide it to the evidence custodian.
C.
Re-inventory the evidence and provide it to the evidence custodian.
Answers
D.
Immediately report the matter to the case supervisor.
D.
Immediately report the matter to the case supervisor.
Answers
Suggested answer: D

Which of the following contributes MOST to the effectiveness of a security officer?

A.
Understanding the regulatory environment
A.
Understanding the regulatory environment
Answers
B.
Developing precise and practical security plans
B.
Developing precise and practical security plans
Answers
C.
Integrating security into the business strategies
C.
Integrating security into the business strategies
Answers
D.
Analyzing the strengths and weakness of the organization
D.
Analyzing the strengths and weakness of the organization
Answers
Suggested answer: A

An organization wants a service provider to authenticate users via the users' organization domain credentials. Which markup language should the organization's security personnel use to support the integration?

A.
Security Assertion Markup Language (SAML)
A.
Security Assertion Markup Language (SAML)
Answers
B.
YAML Ain't Markup Language (YAML)
B.
YAML Ain't Markup Language (YAML)
Answers
C.
Hypertext Markup Language (HTML)
C.
Hypertext Markup Language (HTML)
Answers
D.
Extensible Markup Language (XML)
D.
Extensible Markup Language (XML)
Answers
Suggested answer: A

A recent security audit is reporting several unsuccessful login attempts being repeated at specific times during the day on an Internet facing authentication server. No alerts have been generated by the security information and event management (SIEM) system. What PRIMARY action should be taken to improve SIEM performance?

A.
Implement role-based system monitoring
A.
Implement role-based system monitoring
Answers
B.
Audit firewall logs to identify the source of login attempts
B.
Audit firewall logs to identify the source of login attempts
Answers
C.
Enhance logging detail
C.
Enhance logging detail
Answers
D.
Confirm alarm thresholds
D.
Confirm alarm thresholds
Answers
Suggested answer: B
Total 1.482 questions
Go to page: of 149