ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 127

Question list
Search
Search

List of questions

Search

Information security practitioners are in the midst of implementing a new firewall. Which of the following failure methods would BEST prioritize security in the event of failure?

A.
Fail-Closed
A.
Fail-Closed
Answers
B.
Fail-Open
B.
Fail-Open
Answers
C.
Fail-Safe
C.
Fail-Safe
Answers
D.
Failover
D.
Failover
Answers
Suggested answer: A

Which of the following is a PRIMARY security weakness in the design of Domain Name System (DNS)?

A.
A DNS server can be disabled in a denial-of-service (DoS) attack.
A.
A DNS server can be disabled in a denial-of-service (DoS) attack.
Answers
B.
A DNS server does not authenticate source of information.
B.
A DNS server does not authenticate source of information.
Answers
C.
Each DNS server must hold the address of the root servers.
C.
Each DNS server must hold the address of the root servers.
Answers
D.
A DNS server database can be injected with falsified checksums.
D.
A DNS server database can be injected with falsified checksums.
Answers
Suggested answer: A

Which of the following BEST describes the purpose of the reference monitor when defining access control to enforce the security model?

A.
Quality design principles to ensure quality by design
A.
Quality design principles to ensure quality by design
Answers
B.
Policies to validate organization rules
B.
Policies to validate organization rules
Answers
C.
Cyber hygiene to ensure organizations can keep systems healthy
C.
Cyber hygiene to ensure organizations can keep systems healthy
Answers
D.
Strong operational security to keep unit members safe
D.
Strong operational security to keep unit members safe
Answers
Suggested answer: B

A project manager for a large software firm has acquired a government contract that generates large amounts of Controlled Unclassified Information (CUI). The organization's information security manager has received a request to transfer project-related CUI between systems of differing security classifications. What role provides the authoritative guidance for this transfer?

A.
Information owner
A.
Information owner
Answers
B.
PM
B.
PM
Answers
C.
Data Custodian
C.
Data Custodian
Answers
D.
Mission/Business Owner
D.
Mission/Business Owner
Answers
Suggested answer: C

Which of the following protects personally identifiable information (PII) used by financial services organizations?

A.
National Institute of Standards and Technology (NIST) SP 800-53
A.
National Institute of Standards and Technology (NIST) SP 800-53
Answers
B.
Gramm-Leach-Bliley Act (GLBA)
B.
Gramm-Leach-Bliley Act (GLBA)
Answers
C.
Payment Card Industry Data Security Standard (PCI-DSS)
C.
Payment Card Industry Data Security Standard (PCI-DSS)
Answers
D.
Health Insurance Portability and Accountability Act (HIPAA)
D.
Health Insurance Portability and Accountability Act (HIPAA)
Answers
Suggested answer: B

Which of the following is a common term for log reviews, synthetic transactions, and code reviews?

A.
Security control testing
A.
Security control testing
Answers
B.
Application development
B.
Application development
Answers
C.
Spiral development functional testing
C.
Spiral development functional testing
Answers
D.
DevOps Integrated Product Team (IPT) development
D.
DevOps Integrated Product Team (IPT) development
Answers
Suggested answer: B

At what stage of the Software Development Life Cycle (SDLC) does software vulnerability remediation MOST likely cost the least to implement?

A.
Development
A.
Development
Answers
B.
Testing
B.
Testing
Answers
C.
Deployme
C.
Deployme
Answers
D.
Design
D.
Design
Answers
Suggested answer: D

Clothing retailer employees are provisioned with user accounts that provide access to resources at partner businesses. All partner businesses use common identity and access management (IAM) protocols and differing technologies. Under the Extended Identity principle, what is the process flow between partner businesses to allow this TAM action?

A.
Clothing retailer acts as identity provider (IdP), confirms identity of user using industry standards, then sends credentials to partner businesses that act as a Service Provider and allows access to services.
A.
Clothing retailer acts as identity provider (IdP), confirms identity of user using industry standards, then sends credentials to partner businesses that act as a Service Provider and allows access to services.
Answers
B.
Clothing retailer acts as User Self Service, confirms identity of user using industry standards, then sends credentials to partner businesses that act as a Service Provider and allows access to services.
B.
Clothing retailer acts as User Self Service, confirms identity of user using industry standards, then sends credentials to partner businesses that act as a Service Provider and allows access to services.
Answers
C.
Clothing retailer acts as Service Provider, confirms identity of user using industry standards, then sends credentials to partner businesses that act as an identity provider (IdP) and allows access to resources.
C.
Clothing retailer acts as Service Provider, confirms identity of user using industry standards, then sends credentials to partner businesses that act as an identity provider (IdP) and allows access to resources.
Answers
D.
Clothing retailer acts as Access Control Provider, confirms access of user using industry standards, then sends credentials to partner businesses that act as a Service Provider and allows access to resources.
D.
Clothing retailer acts as Access Control Provider, confirms access of user using industry standards, then sends credentials to partner businesses that act as a Service Provider and allows access to resources.
Answers
Suggested answer: A

Using Address Space Layout Randomization (ASLR) reduces the potential for which of the following attacks?

A.
SQL injection (SQLi)
A.
SQL injection (SQLi)
Answers
B.
Man-in-the-middle (MITM)
B.
Man-in-the-middle (MITM)
Answers
C.
Cross-Site Scripting (XSS)
C.
Cross-Site Scripting (XSS)
Answers
D.
Heap overflow
D.
Heap overflow
Answers
Suggested answer: D

Which of the following ensures old log data is not overwritten?

A.
Increase log file size
A.
Increase log file size
Answers
B.
Implement Syslog
B.
Implement Syslog
Answers
C.
Log preservation
C.
Log preservation
Answers
D.
Log retention
D.
Log retention
Answers
Suggested answer: D
Total 1.482 questions
Go to page: of 149