ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 128

Question list
Search
Search

List of questions

Search

What is the benefit of using Network Admission Control (NAC)?

A.
Operating system (OS) versions can be validated prior to allowing network access.
A.
Operating system (OS) versions can be validated prior to allowing network access.
Answers
B.
NAC supports validation of the endpoint's security posture prior to allowing the session to go into an authorized state.
B.
NAC supports validation of the endpoint's security posture prior to allowing the session to go into an authorized state.
Answers
C.
NAC can require the use of certificates, passwords, or a combination of both before allowing network admission.
C.
NAC can require the use of certificates, passwords, or a combination of both before allowing network admission.
Answers
D.
NAC only supports Windows operating systems (OS).
D.
NAC only supports Windows operating systems (OS).
Answers
Suggested answer: C

The European Union (EU) General Data Protection Regulation (GDPR) requires organizations to implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk. The Data Owner should therefore consider which of the following requirements?

A.
Data masking and encryption of personal data
A.
Data masking and encryption of personal data
Answers
B.
Only to use encryption protocols approved by EU
B.
Only to use encryption protocols approved by EU
Answers
C.
Anonymization of personal data when transmitted to sources outside the EU
C.
Anonymization of personal data when transmitted to sources outside the EU
Answers
D.
Never to store personal data of EU citizens outside the EU
D.
Never to store personal data of EU citizens outside the EU
Answers
Suggested answer: D

Which of the following is the BEST approach to implement multiple servers on a virtual system?

A.
Implement multiple functions per virtual server and apply the same security configuration for each virtual server.
A.
Implement multiple functions per virtual server and apply the same security configuration for each virtual server.
Answers
B.
Implement one primary function per virtual server and apply high security configuration on the host operating system.
B.
Implement one primary function per virtual server and apply high security configuration on the host operating system.
Answers
C.
Implement one primary function per virtual server and apply individual security configuration for each virtual server.
C.
Implement one primary function per virtual server and apply individual security configuration for each virtual server.
Answers
D.
Implement multiple functions within the same virtual server and apply individual security configurations to each function.
D.
Implement multiple functions within the same virtual server and apply individual security configurations to each function.
Answers
Suggested answer: C

Which of the following is the MOST important consideration in selecting a security testing method based on different Radio-Frequency Identification (RFID) vulnerability types?

A.
The performance and resource utilization of tools
A.
The performance and resource utilization of tools
Answers
B.
The quality of results and usability of tools
B.
The quality of results and usability of tools
Answers
C.
An understanding of the attack surface
C.
An understanding of the attack surface
Answers
D.
Adaptability of testing tools to multiple technologies
D.
Adaptability of testing tools to multiple technologies
Answers
Suggested answer: C

A financial services organization has employed a security consultant to review processes used by employees across various teams. The consultant interviewed a member of the application development practice and found gaps in their threat model. Which of the following correctly represents a trigger for when a threat model should be revised?

A.
A new data repository is added.
A.
A new data repository is added.
Answers
B.
is After operating system (OS) patches are applied
B.
is After operating system (OS) patches are applied
Answers
C.
After a modification to the firewall rule policy
C.
After a modification to the firewall rule policy
Answers
D.
A new developer is hired into the team.
D.
A new developer is hired into the team.
Answers
Suggested answer: D

When testing password strength, which of the following is the BEST method for brute forcing passwords?

A.
Conduct an offline attack on the hashed password information.
A.
Conduct an offline attack on the hashed password information.
Answers
B.
Conduct an online password attack until the account being used is locked.
B.
Conduct an online password attack until the account being used is locked.
Answers
C.
Use a comprehensive list of words to attempt to guess the password.
C.
Use a comprehensive list of words to attempt to guess the password.
Answers
D.
Use social engineering methods to attempt to obtain the password.
D.
Use social engineering methods to attempt to obtain the password.
Answers
Suggested answer: C

What is a use for mandatory access control (MAC)?

A.
Allows for labeling of sensitive user accounts for access control
A.
Allows for labeling of sensitive user accounts for access control
Answers
B.
Allows for mandatory user identity and passwords based on sensitivity
B.
Allows for mandatory user identity and passwords based on sensitivity
Answers
C.
Allows for mandatory system administrator access control over objects
C.
Allows for mandatory system administrator access control over objects
Answers
D.
Allows for object security based on sensitivity represented by a label
D.
Allows for object security based on sensitivity represented by a label
Answers
Suggested answer: D

Which of the following MUST be done before a digital forensics investigator may acquire digital evidence?

A.
Inventory the digital evidence.
A.
Inventory the digital evidence.
Answers
B.
Isolate the digital evidence.
B.
Isolate the digital evidence.
Answers
C.
Verify that the investigator has the appropriate legal authority to proceed.
C.
Verify that the investigator has the appropriate legal authority to proceed.
Answers
D.
Perform hashing to verify the integrity of the digital evidence.
D.
Perform hashing to verify the integrity of the digital evidence.
Answers
Suggested answer: C

A security engineer is required to integrate security into a software project that is implemented by small groups test quickly, continuously, and independently develop, test, and deploy code to the cloud. The engineer will MOST likely integrate with which software development process'

A.
Service-oriented architecture (SOA)
A.
Service-oriented architecture (SOA)
Answers
B.
Spiral Methodology
B.
Spiral Methodology
Answers
C.
Structured Waterfall Programming Development
C.
Structured Waterfall Programming Development
Answers
D.
Devops Integrated Product Team (IPT)
D.
Devops Integrated Product Team (IPT)
Answers
Suggested answer: C

An authentication system that uses challenge and response was recently implemented on an organization's network, because the organization conducted an annual penetration test showing that testers were able to move laterally using authenticated credentials. Which attack method was MOST likely used to achieve this?

A.
Cross-Site Scripting (XSS)
A.
Cross-Site Scripting (XSS)
Answers
B.
Pass the ticket
B.
Pass the ticket
Answers
C.
Brute force
C.
Brute force
Answers
D.
Hash collision
D.
Hash collision
Answers
Suggested answer: B
Total 1.482 questions
Go to page: of 149