ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 14

Question list
Search
Search

At a MINIMUM, a formal review of any Disaster Recovery Plan (DRP) should be conducted

A.
monthly.
A.
monthly.
Answers
B.
quarterly.
B.
quarterly.
Answers
C.
annually.
C.
annually.
Answers
D.
bi-annually.
D.
bi-annually.
Answers
Suggested answer: C

Checking routing information on e-mail to determine it is in a valid format and contains valid information is an example of which of the following anti-spam approaches?

A.
Simple Mail Transfer Protocol (SMTP) blacklist
A.
Simple Mail Transfer Protocol (SMTP) blacklist
Answers
B.
Reverse Domain Name System (DNS) lookup
B.
Reverse Domain Name System (DNS) lookup
Answers
C.
Hashing algorithm
C.
Hashing algorithm
Answers
D.
Header analysis
D.
Header analysis
Answers
Suggested answer: D

During an audit of system management, auditors find that the system administrator has not been trained. What actions need to be taken at once to ensure the integrity of systems?

A.
A review of hiring policies and methods of verification of new employees
A.
A review of hiring policies and methods of verification of new employees
Answers
B.
A review of all departmental procedures
B.
A review of all departmental procedures
Answers
C.
A review of all training procedures to be undertaken
C.
A review of all training procedures to be undertaken
Answers
D.
A review of all systems by an experienced administrator
D.
A review of all systems by an experienced administrator
Answers
Suggested answer: D

An internal Service Level Agreement (SLA) covering security is signed by senior managers and is in place. When should compliance to the SLA be reviewed to ensure that a good security posture is being delivered?

A.
As part of the SLA renewal process
A.
As part of the SLA renewal process
Answers
B.
Prior to a planned security audit
B.
Prior to a planned security audit
Answers
C.
Immediately after a security breach
C.
Immediately after a security breach
Answers
D.
At regularly scheduled meetings
D.
At regularly scheduled meetings
Answers
Suggested answer: D

Which of the following is the best practice for testing a Business Continuity Plan (BCP)?

A.
Test before the IT Audit
A.
Test before the IT Audit
Answers
B.
Test when environment changes
B.
Test when environment changes
Answers
C.
Test after installation of security patches
C.
Test after installation of security patches
Answers
D.
Test after implementation of system patches
D.
Test after implementation of system patches
Answers
Suggested answer: B

Which of the following MUST be done when promoting a security awareness program to senior management?

A.
Show the need for security; identify the message and the audience
A.
Show the need for security; identify the message and the audience
Answers
B.
Ensure that the security presentation is designed to be all-inclusive
B.
Ensure that the security presentation is designed to be all-inclusive
Answers
C.
Notify them that their compliance is mandatory
C.
Notify them that their compliance is mandatory
Answers
D.
Explain how hackers have enhanced information security
D.
Explain how hackers have enhanced information security
Answers
Suggested answer: D

Which of the following is a security feature of Global Systems for Mobile Communications (GSM)?

A.
It uses a Subscriber Identity Module (SIM) for authentication.
A.
It uses a Subscriber Identity Module (SIM) for authentication.
Answers
B.
It uses encrypting techniques for all communications.
B.
It uses encrypting techniques for all communications.
Answers
C.
The radio spectrum is divided with multiple frequency carriers.
C.
The radio spectrum is divided with multiple frequency carriers.
Answers
D.
The signal is difficult to read as it provides end-to-end encryption.
D.
The signal is difficult to read as it provides end-to-end encryption.
Answers
Suggested answer: A

A disadvantage of an application filtering firewall is that it can lead to

A.
a crash of the network as a result of user activities.
A.
a crash of the network as a result of user activities.
Answers
B.
performance degradation due to the rules applied.
B.
performance degradation due to the rules applied.
Answers
C.
loss of packets on the network due to insufficient bandwidth.
C.
loss of packets on the network due to insufficient bandwidth.
Answers
D.
Internet Protocol (IP) spoofing by hackers.
D.
Internet Protocol (IP) spoofing by hackers.
Answers
Suggested answer: B

What is the MOST important purpose of testing the Disaster Recovery Plan (DRP)?

A.
Evaluating the efficiency of the plan
A.
Evaluating the efficiency of the plan
Answers
B.
Identifying the benchmark required for restoration
B.
Identifying the benchmark required for restoration
Answers
C.
Validating the effectiveness of the plan
C.
Validating the effectiveness of the plan
Answers
D.
Determining the Recovery Time Objective (RTO)
D.
Determining the Recovery Time Objective (RTO)
Answers
Suggested answer: C

Following the completion of a network security assessment, which of the following can BEST be demonstrated?

A.
The effectiveness of controls can be accurately measured
A.
The effectiveness of controls can be accurately measured
Answers
B.
A penetration test of the network will fail
B.
A penetration test of the network will fail
Answers
C.
The network is compliant to industry standards
C.
The network is compliant to industry standards
Answers
D.
All unpatched vulnerabilities have been identified
D.
All unpatched vulnerabilities have been identified
Answers
Suggested answer: A
Total 1.482 questions
Go to page: of 149