ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 134

Question list
Search
Search

List of questions

Search

A Chief Information Security Officer (CISO) of a firm which decided to migrate to cloud has been tasked with ensuring an optimal level of security. Which of the following would be the FIRST consideration?

A.
Define the cloud migration roadmap and set out which applications and data repositories should be moved into the cloud.
A.
Define the cloud migration roadmap and set out which applications and data repositories should be moved into the cloud.
Answers
B.
Ensure that the contract between the cloud vendor and the firm clearly defines responsibilities for operating security controls.
B.
Ensure that the contract between the cloud vendor and the firm clearly defines responsibilities for operating security controls.
Answers
C.
Analyze the firm's applications and data repositories to determine the relevant control requirements.
C.
Analyze the firm's applications and data repositories to determine the relevant control requirements.
Answers
D.
Request a security risk assessment of the cloud vendor be completed by an independent third- party.
D.
Request a security risk assessment of the cloud vendor be completed by an independent third- party.
Answers
Suggested answer: A

Which technique helps system designers consider potential security concerns of their systems and applications?

A.
Penetration testing
A.
Penetration testing
Answers
B.
Threat modeling
B.
Threat modeling
Answers
C.
Manual inspections and reviews
C.
Manual inspections and reviews
Answers
D.
Source code review
D.
Source code review
Answers
Suggested answer: B

What is the MOST important goal of conducting security assessments?

A.
To prepare the organization for an external audit, particularly by a regulatory entity
A.
To prepare the organization for an external audit, particularly by a regulatory entity
Answers
B.
To discover unmitigated security vulnerabilities, and propose paths for mitigating them
B.
To discover unmitigated security vulnerabilities, and propose paths for mitigating them
Answers
C.
To align the security program with organizational risk appetite
C.
To align the security program with organizational risk appetite
Answers
D.
To demonstrate proper function of security controls and processes to senior management
D.
To demonstrate proper function of security controls and processes to senior management
Answers
Suggested answer: B

A hospital's building controls system monitors and operates the environmental equipment to maintain a safe and comfortable environment. Which of the following could be used to minimize the risk of utility supply interruption?

A.
Digital devices that can turn equipment off and continuously cycle rapidly in order to increase supplies and conceal activity on the hospital network
A.
Digital devices that can turn equipment off and continuously cycle rapidly in order to increase supplies and conceal activity on the hospital network
Answers
B.
Standardized building controls system software with high connectivity to hospital networks
B.
Standardized building controls system software with high connectivity to hospital networks
Answers
C.
Lock out maintenance personnel from the building controls system access that can impact critical utility supplies
C.
Lock out maintenance personnel from the building controls system access that can impact critical utility supplies
Answers
D.
Digital protection and control devices capable of minimizing the adverse impact to critical utility
D.
Digital protection and control devices capable of minimizing the adverse impact to critical utility
Answers
Suggested answer: D

To monitor the security of buried data lines inside the perimeter of a facility, which of the following is the MOST effective control?

A.
Fencing around the facility with closed-circuit television (CCTV) cameras at all entry points
A.
Fencing around the facility with closed-circuit television (CCTV) cameras at all entry points
Answers
B.
Ground sensors installed and reporting to a security event management (SEM) system
B.
Ground sensors installed and reporting to a security event management (SEM) system
Answers
C.
Steel casing around the facility ingress points
C.
Steel casing around the facility ingress points
Answers
D.
regular sweeps of the perimeter, including manual inspection of the cable ingress points
D.
regular sweeps of the perimeter, including manual inspection of the cable ingress points
Answers
Suggested answer: D

What is the BEST method to use for assessing the security impact of acquired software?

A.
Common vulnerability review
A.
Common vulnerability review
Answers
B.
Software security compliance validation
B.
Software security compliance validation
Answers
C.
Threat modeling
C.
Threat modeling
Answers
D.
Vendor assessment
D.
Vendor assessment
Answers
Suggested answer: B

Which of the following is the MOST effective way to ensure the endpoint devices used by remote users are compliant with an organization's approved policies before being allowed on the network?

A.
Group Policy Object (GPO)
A.
Group Policy Object (GPO)
Answers
B.
Network Access Control (NAC)
B.
Network Access Control (NAC)
Answers
C.
Mobile Device Management (MDM)
C.
Mobile Device Management (MDM)
Answers
D.
Privileged Access Management (PAM)
D.
Privileged Access Management (PAM)
Answers
Suggested answer: B

Which of the following factors should be considered characteristics of Attribute Based Access Control (ABAC) in terms of the attributes used?

A.
Mandatory Access Control (MAC) and Discretionary Access Control (DAC)
A.
Mandatory Access Control (MAC) and Discretionary Access Control (DAC)
Answers
B.
Discretionary Access Control (DAC) and Access Control List (ACL)
B.
Discretionary Access Control (DAC) and Access Control List (ACL)
Answers
C.
Role Based Access Control (RBAC) and Mandatory Access Control (MAC)
C.
Role Based Access Control (RBAC) and Mandatory Access Control (MAC)
Answers
D.
Role Based Access Control (RBAC) and Access Control List (ACL)
D.
Role Based Access Control (RBAC) and Access Control List (ACL)
Answers
Suggested answer: D

A security architect is developing an information system for a client. One of the requirements is to deliver a platform that mitigates against common vulnerabilities and attacks, What is the MOST efficient option used to prevent buffer overflow attacks?

A.
Process isolation
A.
Process isolation
Answers
B.
Address Space Layout Randomization (ASLR)
B.
Address Space Layout Randomization (ASLR)
Answers
C.
Processor states
C.
Processor states
Answers
D.
Access control mechanisms
D.
Access control mechanisms
Answers
Suggested answer: B

A security engineer is assigned to work with the patch and vulnerability management group. The deployment of a new patch has been approved and needs to be applied.

The research is complete, and the security engineer has provided recommendations. Where should the patch be applied FIRST?

A.
Server environment
A.
Server environment
Answers
B.
Desktop environment
B.
Desktop environment
Answers
C.
Lower environment
C.
Lower environment
Answers
D.
Production environment
D.
Production environment
Answers
Suggested answer: C
Total 1.482 questions
Go to page: of 149