ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 144

Question list
Search
Search

List of questions

Search

Which of the following should be included in a good defense-in-depth strategy provided by objectoriented programming for software deployment?

A.
Polyinstantiation
A.
Polyinstantiation
Answers
B.
Polymorphism
B.
Polymorphism
Answers
C.
Encapsulation
C.
Encapsulation
Answers
D.
Inheritance
D.
Inheritance
Answers
Suggested answer: A

Which of the following documents specifies services from the client's viewpoint?

A.
Service level report
A.
Service level report
Answers
B.
Business impact analysis (BIA)
B.
Business impact analysis (BIA)
Answers
C.
Service level agreement (SLA)
C.
Service level agreement (SLA)
Answers
D.
Service Level Requirement (SLR)
D.
Service Level Requirement (SLR)
Answers
Suggested answer: C

An organization is planning to have an it audit of its as a Service (SaaS) application to demonstrate to external parties that the security controls around availability are designed. The audit report must also cover a certain period of time to show the operational effectiveness of the controls. Which Service Organization Control (SOC) report would BEST fit their needs?

A.
SOC 1 Type 1
A.
SOC 1 Type 1
Answers
B.
SOC 1 Type 2
B.
SOC 1 Type 2
Answers
C.
SOC 2 Type 1
C.
SOC 2 Type 1
Answers
D.
SOC 2 Type 2
D.
SOC 2 Type 2
Answers
Suggested answer: D

Which Open Systems Interconnection (OSI) layer(s) BEST corresponds to the network access layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model?

A.
Transport Layer
A.
Transport Layer
Answers
B.
Data Link and Physical Layers
B.
Data Link and Physical Layers
Answers
C.
Application, Presentation, and Session Layers
C.
Application, Presentation, and Session Layers
Answers
D.
Session and Network Layers
D.
Session and Network Layers
Answers
Suggested answer: B

An organization is considering partnering with a third-party supplier of cloud services. The organization will only be providing the data and the third-party supplier will be providing the security controls. Which of the following BEST describes this service offering?

A.
Platform as a Service (PaaS)
A.
Platform as a Service (PaaS)
Answers
B.
Infrastructure as a Service (IaaS)
B.
Infrastructure as a Service (IaaS)
Answers
C.
Software as a Service (SaaS)
C.
Software as a Service (SaaS)
Answers
D.
Anything as a Service (XaaS)
D.
Anything as a Service (XaaS)
Answers
Suggested answer: D

Which security audit standard provides the BEST way for an organization to understand a vendor's Information Systems (IS) in relation to confidentiality, integrity, and availability?

A.
Statement on Auditing Standards (SAS) 70
A.
Statement on Auditing Standards (SAS) 70
Answers
B.
Service Organization Control (SOC) 2
B.
Service Organization Control (SOC) 2
Answers
C.
Service Organization Control (SOC) 1
C.
Service Organization Control (SOC) 1
Answers
D.
Statement on Standards for Attestation Engagements (SSAE) 18
D.
Statement on Standards for Attestation Engagements (SSAE) 18
Answers
Suggested answer: B

Which of the following is the MOST appropriate technique for destroying magnetic platter style hard disk drives (HDD) containing data with a "HIGH" security categorization?

A.
Drill through the device and platters.
A.
Drill through the device and platters.
Answers
B.
Mechanically shred the entire HDD.
B.
Mechanically shred the entire HDD.
Answers
C.
Remove the control electronics.
C.
Remove the control electronics.
Answers
D.
HP iProcess the HDD through a degaussing device.
D.
HP iProcess the HDD through a degaussing device.
Answers
Suggested answer: D

employee training, risk management, and data handling procedures and policies could be characterized as which type of security measure?

A.
Non-essential
A.
Non-essential
Answers
B.
Management
B.
Management
Answers
C.
Preventative
C.
Preventative
Answers
D.
Administrative
D.
Administrative
Answers
Suggested answer: D

The Chief Information Security Officer (CISO) of an organization has requested that a Service Organization Control (SOC) report be created to outline the security and availability of a particular system over a 12-month period. Which type of SOC report should be utilized?

A.
SOC 1 Type 1
A.
SOC 1 Type 1
Answers
B.
SOC 2 Type 2
B.
SOC 2 Type 2
Answers
C.
SOC 2 Type 2
C.
SOC 2 Type 2
Answers
D.
SOC 3 Type 1
D.
SOC 3 Type 1
Answers
Suggested answer: C

A security practitioner needs to implementation solution to verify endpoint security protections and operating system (0S) versions. Which of the following is the BEST solution to implement?

A.
An intrusion prevention system (IPS)
A.
An intrusion prevention system (IPS)
Answers
B.
An intrusion prevention system (IPS)
B.
An intrusion prevention system (IPS)
Answers
C.
Network Access Control (NAC)
C.
Network Access Control (NAC)
Answers
D.
A firewall
D.
A firewall
Answers
Suggested answer: B
Total 1.482 questions
Go to page: of 149