ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 13

Question list
Search
Search

The key benefits of a signed and encrypted e-mail include

A.
confidentiality, authentication, and authorization.
A.
confidentiality, authentication, and authorization.
Answers
B.
confidentiality, non-repudiation, and authentication.
B.
confidentiality, non-repudiation, and authentication.
Answers
C.
non-repudiation, authorization, and authentication.
C.
non-repudiation, authorization, and authentication.
Answers
D.
non-repudiation, confidentiality, and authorization.
D.
non-repudiation, confidentiality, and authorization.
Answers
Suggested answer: B

Copyright provides protection for which of the following?

A.
Ideas expressed in literary works
A.
Ideas expressed in literary works
Answers
B.
A particular expression of an idea
B.
A particular expression of an idea
Answers
C.
New and non-obvious inventions
C.
New and non-obvious inventions
Answers
D.
Discoveries of natural phenomena
D.
Discoveries of natural phenomena
Answers
Suggested answer: B

Which of the following is TRUE about Disaster Recovery Plan (DRP) testing?

A.
Operational networks are usually shut down during testing.
A.
Operational networks are usually shut down during testing.
Answers
B.
Testing should continue even if components of the test fail.
B.
Testing should continue even if components of the test fail.
Answers
C.
The company is fully prepared for a disaster if all tests pass.
C.
The company is fully prepared for a disaster if all tests pass.
Answers
D.
Testing should not be done until the entire disaster plan can be tested.
D.
Testing should not be done until the entire disaster plan can be tested.
Answers
Suggested answer: B

Which of the following is the FIRST step of a penetration test plan?

A.
Analyzing a network diagram of the target network
A.
Analyzing a network diagram of the target network
Answers
B.
Notifying the company's customers
B.
Notifying the company's customers
Answers
C.
Obtaining the approval of the company's management
C.
Obtaining the approval of the company's management
Answers
D.
Scheduling the penetration test during a period of least impact
D.
Scheduling the penetration test during a period of least impact
Answers
Suggested answer: C

Which of the following actions should be performed when implementing a change to a database schema in a production system?

A.
Test in development, determine dates, notify users, and implement in production
A.
Test in development, determine dates, notify users, and implement in production
Answers
B.
Apply change to production, run in parallel, finalize change in production, and develop a back-out strategy
B.
Apply change to production, run in parallel, finalize change in production, and develop a back-out strategy
Answers
C.
Perform user acceptance testing in production, have users sign off, and finalize change
C.
Perform user acceptance testing in production, have users sign off, and finalize change
Answers
D.
Change in development, perform user acceptance testing, develop a back-out strategy, and implement change
D.
Change in development, perform user acceptance testing, develop a back-out strategy, and implement change
Answers
Suggested answer: D

Which of the following is a method used to prevent Structured Query Language (SQL) injection attacks?

A.
Data compression
A.
Data compression
Answers
B.
Data classification
B.
Data classification
Answers
C.
Data warehousing
C.
Data warehousing
Answers
D.
Data validation
D.
Data validation
Answers
Suggested answer: D

The BEST method of demonstrating a company's security level to potential customers is

A.
a report from an external auditor.
A.
a report from an external auditor.
Answers
B.
responding to a customer's security questionnaire.
B.
responding to a customer's security questionnaire.
Answers
C.
a formal report from an internal auditor.
C.
a formal report from an internal auditor.
Answers
D.
a site visit by a customer's security team.
D.
a site visit by a customer's security team.
Answers
Suggested answer: A

Which of the following does Temporal Key Integrity Protocol (TKIP) support?

A.
Multicast and broadcast messages
A.
Multicast and broadcast messages
Answers
B.
Coordination of IEEE 802.11 protocols
B.
Coordination of IEEE 802.11 protocols
Answers
C.
Wired Equivalent Privacy (WEP) systems
C.
Wired Equivalent Privacy (WEP) systems
Answers
D.
Synchronization of multiple devices
D.
Synchronization of multiple devices
Answers
Suggested answer: C

The stringency of an Information Technology (IT) security assessment will be determined by the

A.
system's past security record.
A.
system's past security record.
Answers
B.
size of the system's database.
B.
size of the system's database.
Answers
C.
sensitivity of the system's datA.
C.
sensitivity of the system's datA.
Answers
D.
age of the system.
D.
age of the system.
Answers
Suggested answer: C

What should be the INITIAL response to Intrusion Detection System/Intrusion Prevention System (IDS/IPS) alerts?

A.
Ensure that the Incident Response Plan is available and current.
A.
Ensure that the Incident Response Plan is available and current.
Answers
B.
Determine the traffic's initial source and block the appropriate port.
B.
Determine the traffic's initial source and block the appropriate port.
Answers
C.
Disable or disconnect suspected target and source systems.
C.
Disable or disconnect suspected target and source systems.
Answers
D.
Verify the threat and determine the scope of the attack.
D.
Verify the threat and determine the scope of the attack.
Answers
Suggested answer: D
Total 1.482 questions
Go to page: of 149