ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 14

List of questions

Question 131

Report Export Collapse

At a MINIMUM, a formal review of any Disaster Recovery Plan (DRP) should be conducted

monthly.
monthly.
quarterly.
quarterly.
annually.
annually.
bi-annually.
bi-annually.
Suggested answer: C
asked 18/09/2024
Anna Panagiotidou
37 questions

Question 132

Report Export Collapse

Checking routing information on e-mail to determine it is in a valid format and contains valid information is an example of which of the following anti-spam approaches?

Simple Mail Transfer Protocol (SMTP) blacklist
Simple Mail Transfer Protocol (SMTP) blacklist
Reverse Domain Name System (DNS) lookup
Reverse Domain Name System (DNS) lookup
Hashing algorithm
Hashing algorithm
Header analysis
Header analysis
Suggested answer: D
asked 18/09/2024
Nick Endrikat
32 questions

Question 133

Report Export Collapse

During an audit of system management, auditors find that the system administrator has not been trained. What actions need to be taken at once to ensure the integrity of systems?

A review of hiring policies and methods of verification of new employees
A review of hiring policies and methods of verification of new employees
A review of all departmental procedures
A review of all departmental procedures
A review of all training procedures to be undertaken
A review of all training procedures to be undertaken
A review of all systems by an experienced administrator
A review of all systems by an experienced administrator
Suggested answer: D
asked 18/09/2024
Sai C H
37 questions

Question 134

Report Export Collapse

An internal Service Level Agreement (SLA) covering security is signed by senior managers and is in place. When should compliance to the SLA be reviewed to ensure that a good security posture is being delivered?

As part of the SLA renewal process
As part of the SLA renewal process
Prior to a planned security audit
Prior to a planned security audit
Immediately after a security breach
Immediately after a security breach
At regularly scheduled meetings
At regularly scheduled meetings
Suggested answer: D
asked 18/09/2024
Amar Lojo
39 questions

Question 135

Report Export Collapse

Which of the following is the best practice for testing a Business Continuity Plan (BCP)?

Test before the IT Audit
Test before the IT Audit
Test when environment changes
Test when environment changes
Test after installation of security patches
Test after installation of security patches
Test after implementation of system patches
Test after implementation of system patches
Suggested answer: B
asked 18/09/2024
Salman Hashmi
46 questions

Question 136

Report Export Collapse

Which of the following MUST be done when promoting a security awareness program to senior management?

Show the need for security; identify the message and the audience
Show the need for security; identify the message and the audience
Ensure that the security presentation is designed to be all-inclusive
Ensure that the security presentation is designed to be all-inclusive
Notify them that their compliance is mandatory
Notify them that their compliance is mandatory
Explain how hackers have enhanced information security
Explain how hackers have enhanced information security
Suggested answer: D
asked 18/09/2024
Luis Morales
32 questions

Question 137

Report Export Collapse

Which of the following is a security feature of Global Systems for Mobile Communications (GSM)?

It uses a Subscriber Identity Module (SIM) for authentication.
It uses a Subscriber Identity Module (SIM) for authentication.
It uses encrypting techniques for all communications.
It uses encrypting techniques for all communications.
The radio spectrum is divided with multiple frequency carriers.
The radio spectrum is divided with multiple frequency carriers.
The signal is difficult to read as it provides end-to-end encryption.
The signal is difficult to read as it provides end-to-end encryption.
Suggested answer: A
asked 18/09/2024
Tim baxter
45 questions

Question 138

Report Export Collapse

A disadvantage of an application filtering firewall is that it can lead to

a crash of the network as a result of user activities.
a crash of the network as a result of user activities.
performance degradation due to the rules applied.
performance degradation due to the rules applied.
loss of packets on the network due to insufficient bandwidth.
loss of packets on the network due to insufficient bandwidth.
Internet Protocol (IP) spoofing by hackers.
Internet Protocol (IP) spoofing by hackers.
Suggested answer: B
asked 18/09/2024
Yuwadee Srisathan
43 questions

Question 139

Report Export Collapse

What is the MOST important purpose of testing the Disaster Recovery Plan (DRP)?

Evaluating the efficiency of the plan
Evaluating the efficiency of the plan
Identifying the benchmark required for restoration
Identifying the benchmark required for restoration
Validating the effectiveness of the plan
Validating the effectiveness of the plan
Determining the Recovery Time Objective (RTO)
Determining the Recovery Time Objective (RTO)
Suggested answer: C
asked 18/09/2024
martijn Spelt
46 questions

Question 140

Report Export Collapse

Following the completion of a network security assessment, which of the following can BEST be demonstrated?

The effectiveness of controls can be accurately measured
The effectiveness of controls can be accurately measured
A penetration test of the network will fail
A penetration test of the network will fail
The network is compliant to industry standards
The network is compliant to industry standards
All unpatched vulnerabilities have been identified
All unpatched vulnerabilities have been identified
Suggested answer: A
asked 18/09/2024
Alysson Rodrigo Freires Neto
49 questions
Total 1.482 questions
Go to page: of 149