ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 139

Question list
Search
Search

List of questions

Search

When configuring Extensible Authentication Protocol (EAP) in a Voice over Internet Protocol (VoIP) network, which of the following authentication types is the MOST secure?

A.
EAP-Transport Layer Security (TLS)
A.
EAP-Transport Layer Security (TLS)
Answers
B.
EAP-Flexible Authentication via Secure Tunneling
B.
EAP-Flexible Authentication via Secure Tunneling
Answers
C.
EAP-Tunneled Transport Layer Security (TLS)
C.
EAP-Tunneled Transport Layer Security (TLS)
Answers
D.
EAP-Protected Extensible Authentication Protocol (PEAP)
D.
EAP-Protected Extensible Authentication Protocol (PEAP)
Answers
Suggested answer: C

An organization would like to ensure that all new users have a predefined departmental access template applied upon creation. The organization would also like additional access for users to be granted on a per-project basis. What type of user access administration is BEST suited to meet the organization's needs?

A.
Hybrid
A.
Hybrid
Answers
B.
Federated
B.
Federated
Answers
C.
Decentralized
C.
Decentralized
Answers
D.
Centralized
D.
Centralized
Answers
Suggested answer: A

A firm within the defense industry has been directed to comply with contractual requirements for encryption of a government client's Controlled Unclassified Information (CUI). What encryption strategy represents how to protect data at rest in the MOST efficient and cost-effective manner?

A.
Perform physical separation of program information and encrypt only information deemed critical by the defense client
A.
Perform physical separation of program information and encrypt only information deemed critical by the defense client
Answers
B.
Perform logical separation of program information, using virtualized storage solutions with built-in encryption at the virtualization layer
B.
Perform logical separation of program information, using virtualized storage solutions with built-in encryption at the virtualization layer
Answers
C.
Perform logical separation of program information, using virtualized storage solutions with encryption management in the back-end disk systems
C.
Perform logical separation of program information, using virtualized storage solutions with encryption management in the back-end disk systems
Answers
D.
Implement data at rest encryption across the entire storage area network (SAN)
D.
Implement data at rest encryption across the entire storage area network (SAN)
Answers
Suggested answer: C

A software developer installs a game on their organization-provided smartphone. Upon installing the game, the software developer is prompted to allow the game access to call logs, Short Message Service (SMS) messaging, and Global

Positioning System (GPS) location dat a. What has the game MOST likely introduced to the smartphone?

A.
Alerting
A.
Alerting
Answers
B.
Vulnerability
B.
Vulnerability
Answers
C.
Geo-fencing
C.
Geo-fencing
Answers
D.
Monitoring
D.
Monitoring
Answers
Suggested answer: B

A developer is creating an application that requires secure logging of all user activity. What is the BEST permission the developer should assign to the log file to ensure requirements are met?

A.
Read
A.
Read
Answers
B.
Execute
B.
Execute
Answers
C.
Write
C.
Write
Answers
D.
Append
D.
Append
Answers
Suggested answer: C

What industry-recognized document could be used as a baseline reference that is related to data security and business operations for conducting a security assessment?

A.
Service Organization Control (SOC) 1 Type 2
A.
Service Organization Control (SOC) 1 Type 2
Answers
B.
Service Organization Control (SOC) 2 Type 1
B.
Service Organization Control (SOC) 2 Type 1
Answers
C.
Service Organization Control (SOC) 1 Type 1
C.
Service Organization Control (SOC) 1 Type 1
Answers
D.
Service Organization Control (SOC) 2 Type 2
D.
Service Organization Control (SOC) 2 Type 2
Answers
Suggested answer: D

A scan report returned multiple vulnerabilities affecting several production servers that are mission critical. Attempts to apply the patches in the development environment have caused the servers to crash. What is the BEST course of action?

A.
Upgrade the software affected by the vulnerability.
A.
Upgrade the software affected by the vulnerability.
Answers
B.
Inform management of possible risks.
B.
Inform management of possible risks.
Answers
C.
Mitigate the risks with compensating controls.
C.
Mitigate the risks with compensating controls.
Answers
D.
Remove the affected software from the servers.
D.
Remove the affected software from the servers.
Answers
Suggested answer: C

Which of the following would be the BEST guideline to follow when attempting to avoid the exposure of sensitive data?

A.
Store sensitive data only when necessary.
A.
Store sensitive data only when necessary.
Answers
B.
Educate end-users on methods of attacks on sensitive data.
B.
Educate end-users on methods of attacks on sensitive data.
Answers
C.
Establish report parameters for sensitive data.
C.
Establish report parameters for sensitive data.
Answers
D.
Monitor mail servers for sensitive data being exfilltrated.
D.
Monitor mail servers for sensitive data being exfilltrated.
Answers
Suggested answer: A

Which application type is considered high risk and provides a common way for malware and viruses to enter a network?

A.
Instant messaging or chat applications
A.
Instant messaging or chat applications
Answers
B.
E-mail applications
B.
E-mail applications
Answers
C.
Peer-to-Peer (P2P) file sharing applications
C.
Peer-to-Peer (P2P) file sharing applications
Answers
D.
End-to-end applications
D.
End-to-end applications
Answers
Suggested answer: A

In a disaster recovery (DR) test, which of the following would be a trait of crisis management?

A.
Wide focus
A.
Wide focus
Answers
B.
Strategic
B.
Strategic
Answers
C.
Anticipate
C.
Anticipate
Answers
D.
Process
D.
Process
Answers
Suggested answer: D
Total 1.482 questions
Go to page: of 149