ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 122

Question list
Search
Search

List of questions

Search

What is a security concern when considering implementing software-defined networking (SDN)?

A.
It increases the attack footprint.
A.
It increases the attack footprint.
Answers
B.
It uses open source protocols.
B.
It uses open source protocols.
Answers
C.
It has a decentralized architecture.
C.
It has a decentralized architecture.
Answers
D.
It is cloud based.
D.
It is cloud based.
Answers
Suggested answer: C

Which of the following is the MOST important rule for digital investigations?

A.
Ensure event logs are rotated.
A.
Ensure event logs are rotated.
Answers
B.
Ensure original data is never modified.
B.
Ensure original data is never modified.
Answers
C.
Ensure individual privacy is protected.
C.
Ensure individual privacy is protected.
Answers
D.
Ensure systems are powered on.
D.
Ensure systems are powered on.
Answers
Suggested answer: C

A cybersecurity engineer has been tasked to research and implement an ultra-secure communications channel to protect the organization's most valuable intellectual property (IP). The primary directive in this initiative is to ensure there Is no possible way the communications can be intercepted without detection. Which of the following Is the only way to ensure this 'outcome?

A.
Diffie-Hellman key exchange
A.
Diffie-Hellman key exchange
Answers
B.
Symmetric key cryptography
B.
Symmetric key cryptography
Answers
C.
[Public key infrastructure (PKI)
C.
[Public key infrastructure (PKI)
Answers
D.
Quantum Key Distribution
D.
Quantum Key Distribution
Answers
Suggested answer: C

An organization is trying to secure instant messaging (IM) communications through its network perimeter. Which of the following is the MOST significant challenge?

A.
IM clients can interoperate between multiple vendors.
A.
IM clients can interoperate between multiple vendors.
Answers
B.
IM clients can run without administrator privileges.
B.
IM clients can run without administrator privileges.
Answers
C.
IM clients can utilize random port numbers.
C.
IM clients can utilize random port numbers.
Answers
D.
IM clients can run as executable that do not require installation.
D.
IM clients can run as executable that do not require installation.
Answers
Suggested answer: B

A company wants to store data related to users on an offsite server. What method can be deployed to protect the privacy of the user's information while maintaining the field-level configuration of the database?

A.
{Encryption
A.
{Encryption
Answers
B.
Encoding
B.
Encoding
Answers
C.
Tokenization
C.
Tokenization
Answers
D.
Hashing
D.
Hashing
Answers
Suggested answer: A

What is the FIRST step in developing a patch management plan?

A.
Subscribe to a vulnerability subscription service.
A.
Subscribe to a vulnerability subscription service.
Answers
B.
Develop a patch testing procedure.
B.
Develop a patch testing procedure.
Answers
C.
Inventory the hardware and software used.
C.
Inventory the hardware and software used.
Answers
D.
Identify unnecessary services installed on systems.
D.
Identify unnecessary services installed on systems.
Answers
Suggested answer: B

When resolving ethical conflicts, the information security professional MUST consider many factors.

In what order should these considerations be prioritized?

A.
Public safety, duties to individuals, duties to the profession, and duties to principals
A.
Public safety, duties to individuals, duties to the profession, and duties to principals
Answers
B.
Public safety, duties to principals, duties to individuals, and duties to the profession
B.
Public safety, duties to principals, duties to individuals, and duties to the profession
Answers
C.
Public safety, duties to the profession, duties to principals, and duties to individuals
C.
Public safety, duties to the profession, duties to principals, and duties to individuals
Answers
D.
Public safety, duties to principals, duties to the profession, and duties to individuals
D.
Public safety, duties to principals, duties to the profession, and duties to individuals
Answers
Suggested answer: C

An organization is implementing security review as part of system development. Which of the following is the BEST technique to follow?

A.
Engage a third-party auditing firm.
A.
Engage a third-party auditing firm.
Answers
B.
Review security architecture.
B.
Review security architecture.
Answers
C.
Perform incremental assessments.
C.
Perform incremental assessments.
Answers
D.
Conduct penetration testing.
D.
Conduct penetration testing.
Answers
Suggested answer: C

How does Radio-Frequency Identification (RFID) assist with asset management?

A.
It uses biometric information for system identification.
A.
It uses biometric information for system identification.
Answers
B.
It uses two-factor authentication (2FA) for system identification.
B.
It uses two-factor authentication (2FA) for system identification.
Answers
C.
It transmits unique Media Access Control (MAC) addresses wirelessly.
C.
It transmits unique Media Access Control (MAC) addresses wirelessly.
Answers
D.
It transmits unique serial numbers wirelessly.
D.
It transmits unique serial numbers wirelessly.
Answers
Suggested answer: B

Which of the following services can be deployed via a cloud service or on-premises to integrate with Identity as a Service (IDaaS) as the authoritative source of user identities?

A.
Directory
A.
Directory
Answers
B.
User database
B.
User database
Answers
C.
Multi-factor authentication (MFA)
C.
Multi-factor authentication (MFA)
Answers
D.
Single sign-on (SSO)
D.
Single sign-on (SSO)
Answers
Suggested answer: A
Total 1.482 questions
Go to page: of 149