ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 13

List of questions

Question 121

Report Export Collapse

The key benefits of a signed and encrypted e-mail include

confidentiality, authentication, and authorization.
confidentiality, authentication, and authorization.
confidentiality, non-repudiation, and authentication.
confidentiality, non-repudiation, and authentication.
non-repudiation, authorization, and authentication.
non-repudiation, authorization, and authentication.
non-repudiation, confidentiality, and authorization.
non-repudiation, confidentiality, and authorization.
Suggested answer: B
asked 18/09/2024
Ismaiel Al-Mufleh
48 questions

Question 122

Report Export Collapse

Copyright provides protection for which of the following?

Ideas expressed in literary works
Ideas expressed in literary works
A particular expression of an idea
A particular expression of an idea
New and non-obvious inventions
New and non-obvious inventions
Discoveries of natural phenomena
Discoveries of natural phenomena
Suggested answer: B
asked 18/09/2024
Siphiwe Soldat
39 questions

Question 123

Report Export Collapse

Which of the following is TRUE about Disaster Recovery Plan (DRP) testing?

Operational networks are usually shut down during testing.
Operational networks are usually shut down during testing.
Testing should continue even if components of the test fail.
Testing should continue even if components of the test fail.
The company is fully prepared for a disaster if all tests pass.
The company is fully prepared for a disaster if all tests pass.
Testing should not be done until the entire disaster plan can be tested.
Testing should not be done until the entire disaster plan can be tested.
Suggested answer: B
asked 18/09/2024
Linda Jannina Sourander
43 questions

Question 124

Report Export Collapse

Which of the following is the FIRST step of a penetration test plan?

Analyzing a network diagram of the target network
Analyzing a network diagram of the target network
Notifying the company's customers
Notifying the company's customers
Obtaining the approval of the company's management
Obtaining the approval of the company's management
Scheduling the penetration test during a period of least impact
Scheduling the penetration test during a period of least impact
Suggested answer: C
asked 18/09/2024
AJ Foraker
41 questions

Question 125

Report Export Collapse

Which of the following actions should be performed when implementing a change to a database schema in a production system?

Test in development, determine dates, notify users, and implement in production
Test in development, determine dates, notify users, and implement in production
Apply change to production, run in parallel, finalize change in production, and develop a back-out strategy
Apply change to production, run in parallel, finalize change in production, and develop a back-out strategy
Perform user acceptance testing in production, have users sign off, and finalize change
Perform user acceptance testing in production, have users sign off, and finalize change
Change in development, perform user acceptance testing, develop a back-out strategy, and implement change
Change in development, perform user acceptance testing, develop a back-out strategy, and implement change
Suggested answer: D
asked 18/09/2024
Arthur Moron
33 questions

Question 126

Report Export Collapse

Which of the following is a method used to prevent Structured Query Language (SQL) injection attacks?

Data compression
Data compression
Data classification
Data classification
Data warehousing
Data warehousing
Data validation
Data validation
Suggested answer: D
asked 18/09/2024
Oliver Mark
42 questions

Question 127

Report Export Collapse

The BEST method of demonstrating a company's security level to potential customers is

a report from an external auditor.
a report from an external auditor.
responding to a customer's security questionnaire.
responding to a customer's security questionnaire.
a formal report from an internal auditor.
a formal report from an internal auditor.
a site visit by a customer's security team.
a site visit by a customer's security team.
Suggested answer: A
asked 18/09/2024
Ahmed Emad
33 questions

Question 128

Report Export Collapse

Which of the following does Temporal Key Integrity Protocol (TKIP) support?

Multicast and broadcast messages
Multicast and broadcast messages
Coordination of IEEE 802.11 protocols
Coordination of IEEE 802.11 protocols
Wired Equivalent Privacy (WEP) systems
Wired Equivalent Privacy (WEP) systems
Synchronization of multiple devices
Synchronization of multiple devices
Suggested answer: C
asked 18/09/2024
Michael Wheeler
35 questions

Question 129

Report Export Collapse

The stringency of an Information Technology (IT) security assessment will be determined by the

system's past security record.
system's past security record.
size of the system's database.
size of the system's database.
sensitivity of the system's datA.
sensitivity of the system's datA.
age of the system.
age of the system.
Suggested answer: C
asked 18/09/2024
Robert Akehurst
35 questions

Question 130

Report Export Collapse

What should be the INITIAL response to Intrusion Detection System/Intrusion Prevention System (IDS/IPS) alerts?

Ensure that the Incident Response Plan is available and current.
Ensure that the Incident Response Plan is available and current.
Determine the traffic's initial source and block the appropriate port.
Determine the traffic's initial source and block the appropriate port.
Disable or disconnect suspected target and source systems.
Disable or disconnect suspected target and source systems.
Verify the threat and determine the scope of the attack.
Verify the threat and determine the scope of the attack.
Suggested answer: D
asked 18/09/2024
Rok Nemec
33 questions
Total 1.482 questions
Go to page: of 149