ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 142

Question list
Search
Search

A digitally-signed e-mail was delivered over a wireless network protected with Wired Equivalent Privacy (WEP) protocol. Which of the following principles is at risk?

A.
Availability
A.
Availability
Answers
B.
Non-Repudiation
B.
Non-Repudiation
Answers
C.
Confidentiality
C.
Confidentiality
Answers
D.
Integrity
D.
Integrity
Answers
Suggested answer: B

When determining data and information asset handling, regardless of the specific toolset being used, which of the following is one of the common components of big data?

A.
Consolidated data collection
A.
Consolidated data collection
Answers
B.
Distributed storage locations
B.
Distributed storage locations
Answers
C.
Distributed data collection
C.
Distributed data collection
Answers
D.
Centralized processing location
D.
Centralized processing location
Answers
Suggested answer: C

In a DevOps environment, which of the following actions is MOST necessary to have confidence in the quality of the changes being made?

A.
Prepare to take corrective actions quickly.
A.
Prepare to take corrective actions quickly.
Answers
B.
Receive approval from the change review board.
B.
Receive approval from the change review board.
Answers
C.
Review logs for any anomalies.
C.
Review logs for any anomalies.
Answers
D.
Automate functionality testing.
D.
Automate functionality testing.
Answers
Suggested answer: B

Which of the following is TRUE for an organization that is using a third-party federated identity service?

A.
The organization enforces the rules to other organization's user provisioning
A.
The organization enforces the rules to other organization's user provisioning
Answers
B.
The organization establishes a trust relationship with the other organizations
B.
The organization establishes a trust relationship with the other organizations
Answers
C.
The organization defines internal standard for overall user identification
C.
The organization defines internal standard for overall user identification
Answers
D.
The organization specifies alone how to authenticate other organization's users
D.
The organization specifies alone how to authenticate other organization's users
Answers
Suggested answer: C

Computer forensics requires which of the following MAIN steps?

A.
Announce the incident to responsible sections, analyze the data, assimilate the data for correlation
A.
Announce the incident to responsible sections, analyze the data, assimilate the data for correlation
Answers
B.
Take action to contain the damage, announce the incident to responsible sections, analyze the data
B.
Take action to contain the damage, announce the incident to responsible sections, analyze the data
Answers
C.
Acquire the data without altering, authenticate the recovered data, analyze the data
C.
Acquire the data without altering, authenticate the recovered data, analyze the data
Answers
D.
Access the data before destruction, assimilate the data for correlation, take action to contain the damage
D.
Access the data before destruction, assimilate the data for correlation, take action to contain the damage
Answers
Suggested answer: B

Which of the following is the MAIN benefit of off-site storage?

A.
Cost effectiveness
A.
Cost effectiveness
Answers
B.
Backup simplicity
B.
Backup simplicity
Answers
C.
Fast recovery
C.
Fast recovery
Answers
D.
Data availability
D.
Data availability
Answers
Suggested answer: A

Which type of disaster recovery plan (DRP) testing carries the MOST operational risk?

A.
Cutover
A.
Cutover
Answers
B.
Walkthrough
B.
Walkthrough
Answers
C.
Tabletop
C.
Tabletop
Answers
D.
Parallel
D.
Parallel
Answers
Suggested answer: C

If an employee transfers from one role to another, which of the following actions should this trigger within the identity and access management (IAM) lifecycle?

A.
New account creation
A.
New account creation
Answers
B.
User access review and adjustment
B.
User access review and adjustment
Answers
C.
Deprovisioning
C.
Deprovisioning
Answers
D.
System account access review and adjustment
D.
System account access review and adjustment
Answers
Suggested answer: B

What is the PRIMARY objective of business continuity planning?

A.
Establishing a cost estimate for business continuity recovery operations
A.
Establishing a cost estimate for business continuity recovery operations
Answers
B.
Restoring computer systems to normal operations as soon as possible
B.
Restoring computer systems to normal operations as soon as possible
Answers
C.
Strengthening the perceived importance of business continuity planning among senior management
C.
Strengthening the perceived importance of business continuity planning among senior management
Answers
D.
Ensuring timely recovery of mission-critical business processes
D.
Ensuring timely recovery of mission-critical business processes
Answers
Suggested answer: B

What Is a risk of using commercial off-the-shelf (COTS) products?

A.
COTS products may not map directly to an organization's security requirements.
A.
COTS products may not map directly to an organization's security requirements.
Answers
B.
COTS products are typically more expensive than developing software in-house.
B.
COTS products are typically more expensive than developing software in-house.
Answers
C.
Cost to implement COTS products is difficult to predict.
C.
Cost to implement COTS products is difficult to predict.
Answers
D.
Vendors are often hesitant to share their source code.
D.
Vendors are often hesitant to share their source code.
Answers
Suggested answer: A
Total 1.482 questions
Go to page: of 149