ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 136

Question list
Search
Search

List of questions

Search

Which of the following features is MOST effective in mitigating against theft of data on a corporate mobile device which has been stolen?

A.
Mobile Device Management (MDM) with device wipe
A.
Mobile Device Management (MDM) with device wipe
Answers
B.
Whole device encryption with key escrow
B.
Whole device encryption with key escrow
Answers
C.
Virtual private network (VPN) with traffic encryption
C.
Virtual private network (VPN) with traffic encryption
Answers
D.
Mobile device tracking with geolocation
D.
Mobile device tracking with geolocation
Answers
Suggested answer: A

An organization is implementing data encryption using symmetric ciphers and the Chief Information Officer (CIO) is concerned about the risk of using one key to protect all sensitive data, The security practitioner has been tasked with recommending a solution to address the CIO's concerns, Which of the following is the BEST approach to achieving the objective by encrypting all sensitive data?

A.
Use a Secure Hash Algorithm 256 (SHA-256).
A.
Use a Secure Hash Algorithm 256 (SHA-256).
Answers
B.
Use a hierarchy of encryption keys.
B.
Use a hierarchy of encryption keys.
Answers
C.
Use Hash Message Authentication Code (HMAC) keys.
C.
Use Hash Message Authentication Code (HMAC) keys.
Answers
D.
Use Rivest-Shamir-Adleman (RSA) keys.
D.
Use Rivest-Shamir-Adleman (RSA) keys.
Answers
Suggested answer: D

International bodies established a regulatory scheme that defines how weapons are exchanged between the signatories. It also addresses cyber weapons, including malicious software, Command and Control (C2) software, and internet surveillance software. This is a description of which of the following?

A.
General Data Protection Regulation (GDPR)
A.
General Data Protection Regulation (GDPR)
Answers
B.
Palermo convention
B.
Palermo convention
Answers
C.
Wassenaar arrangement
C.
Wassenaar arrangement
Answers
D.
International Traffic in Arms Regulations (ITAR)
D.
International Traffic in Arms Regulations (ITAR)
Answers
Suggested answer: C

In software development, developers should use which type of queries to prevent a Structured Query Language (SQL) injection?

A.
Parameterised
A.
Parameterised
Answers
B.
Dynamic
B.
Dynamic
Answers
C.
Static
C.
Static
Answers
D.
Controlled
D.
Controlled
Answers
Suggested answer: A

Which of the following BEST describes when an organization should conduct a black box security audit on a new software product?

A.
When the organization wishes to check for non-functional compliance
A.
When the organization wishes to check for non-functional compliance
Answers
B.
When the organization wants to enumerate known security vulnerabilities across their infrastructure
B.
When the organization wants to enumerate known security vulnerabilities across their infrastructure
Answers
C.
When the organization has experienced a security incident
C.
When the organization has experienced a security incident
Answers
D.
When the organization is confident the final source code is complete
D.
When the organization is confident the final source code is complete
Answers
Suggested answer: B

The Chief Information Officer (CIO) has decided that as part of business modernization efforts the organization will move towards a cloud architecture. All business-critical data will be migrated to either internal or external cloud services within the next two years. The CIO has a PRIMARY obligation to work with personnel in which role in order to ensure proper protection of data during and after the cloud migration?

A.
Information owner
A.
Information owner
Answers
B.
General Counsel
B.
General Counsel
Answers
C.
Chief Information Security Officer (CISO)
C.
Chief Information Security Officer (CISO)
Answers
D.
Chief Security Officer (CSO)
D.
Chief Security Officer (CSO)
Answers
Suggested answer: A

When reviewing vendor certifications for handling and processing of company data, which of the following is the BEST Service Organization Controls (SOC) certification for the vendor to possess?

A.
SOC 1 Type 1
A.
SOC 1 Type 1
Answers
B.
SOC 2 Type 1
B.
SOC 2 Type 1
Answers
C.
SOC 2 Type 2
C.
SOC 2 Type 2
Answers
D.
SOC 3
D.
SOC 3
Answers
Suggested answer: C

Which of the following is a covert channel type?

A.
Storage
A.
Storage
Answers
B.
Pipe
B.
Pipe
Answers
C.
Memory
C.
Memory
Answers
D.
Monitoring
D.
Monitoring
Answers
Suggested answer: A

Which change management role is responsible for the overall success of the project and supporting the change throughout the organization?

A.
Change driver
A.
Change driver
Answers
B.
Change implementer
B.
Change implementer
Answers
C.
Program sponsor
C.
Program sponsor
Answers
D.
Project manager
D.
Project manager
Answers
Suggested answer: D

Which of the following is a unique feature of attribute-based access control (ABAC)?

A.
A user is granted access to a system based on group affinity.
A.
A user is granted access to a system based on group affinity.
Answers
B.
A user is granted access to a system with biometric authentication.
B.
A user is granted access to a system with biometric authentication.
Answers
C.
A user is granted access to a system at a particular time of day.
C.
A user is granted access to a system at a particular time of day.
Answers
D.
A user is granted access to a system based on username and password.
D.
A user is granted access to a system based on username and password.
Answers
Suggested answer: C
Total 1.482 questions
Go to page: of 149