ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 124

Question list
Search
Search

List of questions

Search

Which of the following virtual network configuration options is BEST to protect virtual machines (VM)?

A.
Traffic filtering
A.
Traffic filtering
Answers
B.
Data encryption
B.
Data encryption
Answers
C.
Data segmentation
C.
Data segmentation
Answers
D.
Traffic throttling
D.
Traffic throttling
Answers
Suggested answer: D

Which of the following is the BEST method to validate secure coding techniques against injection and overflow attacks?

A.
Scheduled team review of coding style and techniques for vulnerability patterns
A.
Scheduled team review of coding style and techniques for vulnerability patterns
Answers
B.
Using automated programs to test for the latest known vulnerability patterns
B.
Using automated programs to test for the latest known vulnerability patterns
Answers
C.
The regular use of production code routines from similar applications already in use
C.
The regular use of production code routines from similar applications already in use
Answers
D.
Ensure code editing tools are updated against known vulnerability patterns
D.
Ensure code editing tools are updated against known vulnerability patterns
Answers
Suggested answer: B

A Distributed Denial of Service (DDoS) attack was carried out using malware called Mirai to create a large-scale command and control system to launch a botnet. Which of the following devices were the PRIMARY sources used to generate the attack traffic?

A.
Internet of Things (IoT) devices
A.
Internet of Things (IoT) devices
Answers
B.
Microsoft Windows hosts
B.
Microsoft Windows hosts
Answers
C.
Web servers running open source operating systems (OS)
C.
Web servers running open source operating systems (OS)
Answers
D.
Mobile devices running Android
D.
Mobile devices running Android
Answers
Suggested answer: A

An establish information technology (IT) consulting firm is considering acquiring a successful local startup. To gain a comprehensive understanding of the startup's security posture' which type of assessment provides the BEST information?

A.
A security audit
A.
A security audit
Answers
B.
A penetration test
B.
A penetration test
Answers
C.
A tabletop exercise
C.
A tabletop exercise
Answers
D.
A security threat model
D.
A security threat model
Answers
Suggested answer: A

As a design principle, which one of the following actors is responsible for identifying and approving data security requirements in a cloud ecosystem?

A.
Cloud broker
A.
Cloud broker
Answers
B.
Cloud provider
B.
Cloud provider
Answers
C.
Cloud consumer
C.
Cloud consumer
Answers
D.
Cloud auditor
D.
Cloud auditor
Answers
Suggested answer: C

A company is enrolled in a hard drive reuse program where decommissioned equipment is sold back to the vendor when it is no longer needed. The vendor pays more money for functioning drives than equipment that is no longer operational. Which method of data sanitization would provide the most secure means of preventing unauthorized data loss, while also receiving the most money from the vendor?

A.
Pinning
A.
Pinning
Answers
B.
Single-pass wipe
B.
Single-pass wipe
Answers
C.
Degaussing
C.
Degaussing
Answers
D.
Multi-pass wipes
D.
Multi-pass wipes
Answers
Suggested answer: C

In supervisory control and data acquisition (SCADA) systems, which of the following controls can be used to reduce device exposure to malware?

A.
Disable all command line interfaces.
A.
Disable all command line interfaces.
Answers
B.
Disallow untested code in the execution space of the SCADA device.
B.
Disallow untested code in the execution space of the SCADA device.
Answers
C.
Prohibit the use of unsecure scripting languages.
C.
Prohibit the use of unsecure scripting languages.
Answers
D.
Disable Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) port 138 and 139 on the SCADA device.
D.
Disable Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) port 138 and 139 on the SCADA device.
Answers
Suggested answer: B

What is considered a compensating control for not having electrical surge protectors installed?

A.
Having dual lines to network service providers built to the site
A.
Having dual lines to network service providers built to the site
Answers
B.
Having backup diesel generators installed to the site
B.
Having backup diesel generators installed to the site
Answers
C.
Having a hot disaster recovery (DR) environment for the site
C.
Having a hot disaster recovery (DR) environment for the site
Answers
D.
Having network equipment in active-active clusters at the site
D.
Having network equipment in active-active clusters at the site
Answers
Suggested answer: D

What is considered the BEST when determining whether to provide remote network access to a third-party security service?

A.
Contract negotiation
A.
Contract negotiation
Answers
B.
Vendor demonstration
B.
Vendor demonstration
Answers
C.
Supplier request
C.
Supplier request
Answers
D.
Business need
D.
Business need
Answers
Suggested answer: D

When network management is outsourced to third parties, which of the following is the MOST effective method of protecting critical data assets?

A.
Provide links to security policies
A.
Provide links to security policies
Answers
B.
Log all activities associated with sensitive systems
B.
Log all activities associated with sensitive systems
Answers
C.
Employ strong access controls
C.
Employ strong access controls
Answers
D.
Confirm that confidentiality agreements are signed
D.
Confirm that confidentiality agreements are signed
Answers
Suggested answer: C
Total 1.482 questions
Go to page: of 149